Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16-10-2024 17:26
Static task
static1
Behavioral task
behavioral1
Sample
ee92609ef4b2d72fbd598a3ae26ab5e94ecee615e0666e9040d5f58d280ae17d.dll
Resource
win7-20240708-en
General
-
Target
ee92609ef4b2d72fbd598a3ae26ab5e94ecee615e0666e9040d5f58d280ae17d.dll
-
Size
720KB
-
MD5
5774c50c00067b08c38d3585dec17637
-
SHA1
e001beca0128d6c8ddd1c7ebc38e73c6244d2eb9
-
SHA256
ee92609ef4b2d72fbd598a3ae26ab5e94ecee615e0666e9040d5f58d280ae17d
-
SHA512
2a06a15cd17f32185e1b60095512a2420d0a5537e701fa7603dcb702c7cd3c5a7d8a43f553c3b6ca43f82f1af15ae09a53fa4795c1768e58508c7f485cbe4d7a
-
SSDEEP
12288:1qJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:1qGBHTxvt+g2gYed
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1216-4-0x0000000002D90000-0x0000000002D91000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/2552-1-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral1/memory/1216-23-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral1/memory/1216-34-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral1/memory/1216-35-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral1/memory/2552-43-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral1/memory/1464-52-0x0000000140000000-0x00000001400B5000-memory.dmp dridex_payload behavioral1/memory/1464-57-0x0000000140000000-0x00000001400B5000-memory.dmp dridex_payload behavioral1/memory/1056-74-0x0000000140000000-0x00000001400B5000-memory.dmp dridex_payload behavioral1/memory/2924-90-0x0000000140000000-0x00000001400B5000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
WindowsAnytimeUpgradeResults.exeWindowsAnytimeUpgradeResults.exespreview.exepid process 1464 WindowsAnytimeUpgradeResults.exe 1056 WindowsAnytimeUpgradeResults.exe 2924 spreview.exe -
Loads dropped DLL 7 IoCs
Processes:
WindowsAnytimeUpgradeResults.exeWindowsAnytimeUpgradeResults.exespreview.exepid process 1216 1464 WindowsAnytimeUpgradeResults.exe 1216 1056 WindowsAnytimeUpgradeResults.exe 1216 2924 spreview.exe 1216 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mcbsdqtxprcnbm = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Crypto\\RSA\\S-1-5-21-3551809350-4263495960-1443967649-1000\\DCn\\WindowsAnytimeUpgradeResults.exe" -
Processes:
rundll32.exeWindowsAnytimeUpgradeResults.exeWindowsAnytimeUpgradeResults.exespreview.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WindowsAnytimeUpgradeResults.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WindowsAnytimeUpgradeResults.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spreview.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exeWindowsAnytimeUpgradeResults.exepid process 2552 rundll32.exe 2552 rundll32.exe 2552 rundll32.exe 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1216 1464 WindowsAnytimeUpgradeResults.exe 1464 WindowsAnytimeUpgradeResults.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1216 wrote to memory of 2656 1216 WindowsAnytimeUpgradeResults.exe PID 1216 wrote to memory of 2656 1216 WindowsAnytimeUpgradeResults.exe PID 1216 wrote to memory of 2656 1216 WindowsAnytimeUpgradeResults.exe PID 1216 wrote to memory of 1464 1216 WindowsAnytimeUpgradeResults.exe PID 1216 wrote to memory of 1464 1216 WindowsAnytimeUpgradeResults.exe PID 1216 wrote to memory of 1464 1216 WindowsAnytimeUpgradeResults.exe PID 1216 wrote to memory of 1812 1216 WindowsAnytimeUpgradeResults.exe PID 1216 wrote to memory of 1812 1216 WindowsAnytimeUpgradeResults.exe PID 1216 wrote to memory of 1812 1216 WindowsAnytimeUpgradeResults.exe PID 1216 wrote to memory of 1056 1216 WindowsAnytimeUpgradeResults.exe PID 1216 wrote to memory of 1056 1216 WindowsAnytimeUpgradeResults.exe PID 1216 wrote to memory of 1056 1216 WindowsAnytimeUpgradeResults.exe PID 1216 wrote to memory of 1840 1216 spreview.exe PID 1216 wrote to memory of 1840 1216 spreview.exe PID 1216 wrote to memory of 1840 1216 spreview.exe PID 1216 wrote to memory of 2924 1216 spreview.exe PID 1216 wrote to memory of 2924 1216 spreview.exe PID 1216 wrote to memory of 2924 1216 spreview.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ee92609ef4b2d72fbd598a3ae26ab5e94ecee615e0666e9040d5f58d280ae17d.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2552
-
C:\Windows\system32\WindowsAnytimeUpgradeResults.exeC:\Windows\system32\WindowsAnytimeUpgradeResults.exe1⤵PID:2656
-
C:\Users\Admin\AppData\Local\xUsSleZS\WindowsAnytimeUpgradeResults.exeC:\Users\Admin\AppData\Local\xUsSleZS\WindowsAnytimeUpgradeResults.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1464
-
C:\Windows\system32\WindowsAnytimeUpgradeResults.exeC:\Windows\system32\WindowsAnytimeUpgradeResults.exe1⤵PID:1812
-
C:\Users\Admin\AppData\Local\0xluv\WindowsAnytimeUpgradeResults.exeC:\Users\Admin\AppData\Local\0xluv\WindowsAnytimeUpgradeResults.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1056
-
C:\Windows\system32\spreview.exeC:\Windows\system32\spreview.exe1⤵PID:1840
-
C:\Users\Admin\AppData\Local\qTLZ\spreview.exeC:\Users\Admin\AppData\Local\qTLZ\spreview.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2924
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
724KB
MD5c3a91a73d40414d40fe41a34129f3479
SHA17ead8458482113e4b229be00fff4bef100dccaaa
SHA2561209605c3136f767f5763384197097e1789eb1af9bb6a5f275b597f81797e6be
SHA512a2b9f2a4f56955c7825bd2f58bc16d8307b5e23bb224c45bd1ff640a67714df1e5cac93481068ce1753fce92a6003b665c8f95629a2610bd09572839fa6718f3
-
Filesize
724KB
MD5b5bb7ee28eeba0c479a15a782c9abe0f
SHA1212c39044b8cb04de67619358e9bf1a2a10033ef
SHA256a424c6831b6f962352a526d01549a3132ddef693651c75fc006927a095cd1e70
SHA512bab1c40d9ec5408ed9dd9fbf8a34f83c37c147f13e1b2164aafc72dcae18b67deb4d509fd3bacd56ffad23e9e4b1e1aed228ff970a934cdd747d53b7dedf749e
-
Filesize
288KB
MD56f3f29905f0ec4ce22c1fd8acbf6c6de
SHA168bdfefe549dfa6262ad659f1578f3e87d862773
SHA256e9c4d718d09a28de8a99386b0dd65429f433837c712314e98ec4f01031af595b
SHA51216a9ad3183d7e11d9f0dd3c79363aa9a7af306f4f35a6f1e0cc1e175ef254e8052ec94dfd600dbe882f9ab41254d482cce9190ab7b0c005a34e46c66e8ff5f9e
-
Filesize
1KB
MD5849495a04cfe113a699b59bc30f86491
SHA1fdd04ec6cc030e70f3fcbbb3cafda2b79fff83ba
SHA25624f27dc1e603198872ac904e58bb9477deaa4a10a2cea87dee88cfab8dfbb3d8
SHA512c8f2021c24e76f830a81e3ef96067aafab7c835f62a50c20de2872264c0779e4936ef1a878e10bbfedaa300dcd20c5e721f53677d231935a15e28c7e2effa9ae
-
Filesize
294KB
MD5704cd4cac010e8e6d8de9b778ed17773
SHA181856abf70640f102b8b3defe2cf65669fe8e165
SHA2564307f21d3ec3b51cba6a905a80045314ffccb4c60c11d99a3d77cc8103014208
SHA512b380264276bad01d619a5f1f112791d6bf73dc52cdd5cca0cc1f726a6f66eefc5a78a37646792987c508f9cb5049f0eb86c71fb4c7a2d3e670c0c8623f0522ee
-
Filesize
724KB
MD5569ffb104004114fc5a8cf688fbde92e
SHA1292f8981ead0f301f42895638402d8ed4fce12a8
SHA256efe6ae3e472c2221278516bc52e08ac1ca7ce681ffb56d4c460c16bb9f73ef34
SHA5127fb073dec4e4c970192080def28e471da7da2f0be2389fb50913b31b285c3258e108461f1c2c1accfb7d2efcd1b8bce843927ada719475e6fa2a7925e7d4467d