Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2024 17:26
Static task
static1
Behavioral task
behavioral1
Sample
ee92609ef4b2d72fbd598a3ae26ab5e94ecee615e0666e9040d5f58d280ae17d.dll
Resource
win7-20240708-en
General
-
Target
ee92609ef4b2d72fbd598a3ae26ab5e94ecee615e0666e9040d5f58d280ae17d.dll
-
Size
720KB
-
MD5
5774c50c00067b08c38d3585dec17637
-
SHA1
e001beca0128d6c8ddd1c7ebc38e73c6244d2eb9
-
SHA256
ee92609ef4b2d72fbd598a3ae26ab5e94ecee615e0666e9040d5f58d280ae17d
-
SHA512
2a06a15cd17f32185e1b60095512a2420d0a5537e701fa7603dcb702c7cd3c5a7d8a43f553c3b6ca43f82f1af15ae09a53fa4795c1768e58508c7f485cbe4d7a
-
SSDEEP
12288:1qJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:1qGBHTxvt+g2gYed
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3504-3-0x00000000023F0000-0x00000000023F1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/3028-1-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral2/memory/3504-34-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral2/memory/3504-23-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral2/memory/3028-37-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral2/memory/728-49-0x0000000140000000-0x00000001400B5000-memory.dmp dridex_payload behavioral2/memory/728-44-0x0000000140000000-0x00000001400B5000-memory.dmp dridex_payload behavioral2/memory/4264-65-0x0000000140000000-0x00000001400B5000-memory.dmp dridex_payload behavioral2/memory/3464-76-0x0000000140000000-0x00000001400B6000-memory.dmp dridex_payload behavioral2/memory/3464-80-0x0000000140000000-0x00000001400B6000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
MoUsoCoreWorker.exemsra.exeRdpSaUacHelper.exepid process 728 MoUsoCoreWorker.exe 4264 msra.exe 3464 RdpSaUacHelper.exe -
Loads dropped DLL 3 IoCs
Processes:
MoUsoCoreWorker.exemsra.exeRdpSaUacHelper.exepid process 728 MoUsoCoreWorker.exe 4264 msra.exe 3464 RdpSaUacHelper.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Qhmytabp = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Vault\\MI\\msra.exe" -
Processes:
MoUsoCoreWorker.exemsra.exeRdpSaUacHelper.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MoUsoCoreWorker.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msra.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RdpSaUacHelper.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 3028 rundll32.exe 3028 rundll32.exe 3028 rundll32.exe 3028 rundll32.exe 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 3504 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3504 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3504 wrote to memory of 3908 3504 MoUsoCoreWorker.exe PID 3504 wrote to memory of 3908 3504 MoUsoCoreWorker.exe PID 3504 wrote to memory of 728 3504 MoUsoCoreWorker.exe PID 3504 wrote to memory of 728 3504 MoUsoCoreWorker.exe PID 3504 wrote to memory of 4472 3504 msra.exe PID 3504 wrote to memory of 4472 3504 msra.exe PID 3504 wrote to memory of 4264 3504 msra.exe PID 3504 wrote to memory of 4264 3504 msra.exe PID 3504 wrote to memory of 3004 3504 RdpSaUacHelper.exe PID 3504 wrote to memory of 3004 3504 RdpSaUacHelper.exe PID 3504 wrote to memory of 3464 3504 RdpSaUacHelper.exe PID 3504 wrote to memory of 3464 3504 RdpSaUacHelper.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ee92609ef4b2d72fbd598a3ae26ab5e94ecee615e0666e9040d5f58d280ae17d.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:3028
-
C:\Windows\system32\MoUsoCoreWorker.exeC:\Windows\system32\MoUsoCoreWorker.exe1⤵PID:3908
-
C:\Users\Admin\AppData\Local\0DfELZTz\MoUsoCoreWorker.exeC:\Users\Admin\AppData\Local\0DfELZTz\MoUsoCoreWorker.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:728
-
C:\Windows\system32\msra.exeC:\Windows\system32\msra.exe1⤵PID:4472
-
C:\Users\Admin\AppData\Local\5QfCeI\msra.exeC:\Users\Admin\AppData\Local\5QfCeI\msra.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4264
-
C:\Windows\system32\RdpSaUacHelper.exeC:\Windows\system32\RdpSaUacHelper.exe1⤵PID:3004
-
C:\Users\Admin\AppData\Local\Qen\RdpSaUacHelper.exeC:\Users\Admin\AppData\Local\Qen\RdpSaUacHelper.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD547c6b45ff22b73caf40bb29392386ce3
SHA17e29a8d98fbb9b02d3d22e3576f4fd61ab50ffe9
SHA256cbccb642725edb42e749e26ded68a16b3aa20e291a1a7793a2d4efebb75f99c0
SHA512c919ab84a497616e7969d58c251f4e6efc337b41ef6956864b86d66ae1437294c124232fec54433eab3a6518ed529f8445dd0b23706b2f42f3fa42e69711f331
-
Filesize
724KB
MD5b9569e73354957344f0f80d65679d564
SHA13e59e689a9e51658726298692ddd861563dc0785
SHA25653a9b0b9f4a0fb331d93272ec0501d6aa3ba82b8183d9b0269bc4eef4f238195
SHA51285e1e5c8723237a04f4d2b12c032cf44874346af1b3f633a411ad93b344a677d7c42edbbead3b332f2e088c3b824ef285c70e8a3980031e525dabf13996c4551
-
Filesize
724KB
MD56843b9907a3bca693f2565cc42b2e81c
SHA19d1d9a076dc5d67f9300025901dbe2fb0ae2fa8d
SHA256b090c7010b06f328740f302f3c91aebf3e76dcd8f76677fa7478c81a90afea09
SHA5126e9563db2e2a95526cc65fd1ce85a3a16c782d4f5a64729ea8fe5b3c6e35358fedb20949232da638d292664e035039539e8314d9aab8c9b07632ee4050180d54
-
Filesize
579KB
MD5dcda3b7b8eb0bfbccb54b4d6a6844ad6
SHA1316a2925e451f739f45e31bc233a95f91bf775fa
SHA256011e1decd6683afe5f1e397fe9697f2cf592ae21766a7629e234682f721658ae
SHA51218e8c99f8b86375627aba0d2b10cf4db24ee5ac61a3d6a73d382a83ec63217c7e455570d4fa7dcdbb188dcc73988689661f8cab2337ae8c615fa6bc9a08f71f5
-
Filesize
33KB
MD50d5b016ac7e7b6257c069e8bb40845de
SHA15282f30e90cbd1be8da95b73bc1b6a7d041e43c2
SHA2566a6fdd834af9c79c5ffc5e6b51700030259aeae535f8626df84b07b7d2cee067
SHA512cd44d8b70fc67c692e6966b4ad86a7de9c96df0bade1b3a80cb4767be159d64f3cc04dc5934f7d843b15101865089e43b8aecabddc370b22caf0c48b56b3430e
-
Filesize
728KB
MD56c9a1ad154b64807887b59aba36716ca
SHA18d0e2d50ea0e2f72cb3c4bd43c3c8b0852919eb9
SHA256f9e3cb9bb54c10daf98200d2669d8072ca9835ff993dec56c0e230f2510061dc
SHA512bb5e4b7b35f603cf986fd2d1f34e5b5dfec827b668ce8c3f45827b94a48cdc39c21e21fd34de0bc277088a2cd6641182321e363773077881795e054f135f0338
-
Filesize
1KB
MD53cf4c0da544f3e67973f5ed0a911c1cc
SHA180ae39943dfa6710081962d1fb7b9c5790ce2a5f
SHA25641951d9e56f1e655cbc03a3f8498352d7218924a19a56e6fc8c3f765685333a9
SHA512c2faac629511e6c7a7134e4e4290188a840225975ce851f5f6b6193be3d77621c62285a9ff6804b4f83843f284e7640313b91c72816fa614b92be08d12b69634