Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2024 17:26
Static task
static1
Behavioral task
behavioral1
Sample
bbd6d896a535b1e9b382eda903972c62e1aeb045c9fb4057a8aae51feb85eeca.dll
Resource
win7-20240903-en
General
-
Target
bbd6d896a535b1e9b382eda903972c62e1aeb045c9fb4057a8aae51feb85eeca.dll
-
Size
720KB
-
MD5
f859e1567e45f47b3b3746c4fb49e3f5
-
SHA1
e824cabc3b25fe5173ff02fbb4b3e7912bd71a72
-
SHA256
bbd6d896a535b1e9b382eda903972c62e1aeb045c9fb4057a8aae51feb85eeca
-
SHA512
bc5b15dbe0dbb3f77dca8839123c95e77a2733af33827fc911e24404ab1dd793f04cab91669a075ab7fef7f6fa1d64ef6c8888d642a862c07a90c41ea3ebc29b
-
SSDEEP
12288:ZqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:ZqGBHTxvt+g2gYed
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3356-3-0x00000000032B0000-0x00000000032B1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/3592-1-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral2/memory/3356-34-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral2/memory/3356-23-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral2/memory/3592-37-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral2/memory/4748-52-0x0000000140000000-0x00000001400BB000-memory.dmp dridex_payload behavioral2/memory/4748-57-0x0000000140000000-0x00000001400BB000-memory.dmp dridex_payload behavioral2/memory/916-69-0x0000000140000000-0x00000001400B5000-memory.dmp dridex_payload behavioral2/memory/916-73-0x0000000140000000-0x00000001400B5000-memory.dmp dridex_payload behavioral2/memory/4412-88-0x0000000140000000-0x00000001400B5000-memory.dmp dridex_payload -
Executes dropped EXE 4 IoCs
Processes:
wermgr.exeFXSCOVER.exeNetplwiz.exeDxpserver.exepid process 3764 wermgr.exe 4748 FXSCOVER.exe 916 Netplwiz.exe 4412 Dxpserver.exe -
Loads dropped DLL 3 IoCs
Processes:
FXSCOVER.exeNetplwiz.exeDxpserver.exepid process 4748 FXSCOVER.exe 916 Netplwiz.exe 4412 Dxpserver.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rrsphmonwo = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\UserData\\Pe8Df\\Netplwiz.exe" -
Processes:
rundll32.exeFXSCOVER.exeNetplwiz.exeDxpserver.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FXSCOVER.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Netplwiz.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dxpserver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 3592 rundll32.exe 3592 rundll32.exe 3592 rundll32.exe 3592 rundll32.exe 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 3356 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3356 -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
description pid process target process PID 3356 wrote to memory of 4284 3356 wermgr.exe PID 3356 wrote to memory of 4284 3356 wermgr.exe PID 3356 wrote to memory of 3764 3356 wermgr.exe PID 3356 wrote to memory of 3764 3356 wermgr.exe PID 3356 wrote to memory of 2000 3356 FXSCOVER.exe PID 3356 wrote to memory of 2000 3356 FXSCOVER.exe PID 3356 wrote to memory of 4748 3356 FXSCOVER.exe PID 3356 wrote to memory of 4748 3356 FXSCOVER.exe PID 3356 wrote to memory of 3872 3356 Netplwiz.exe PID 3356 wrote to memory of 3872 3356 Netplwiz.exe PID 3356 wrote to memory of 916 3356 Netplwiz.exe PID 3356 wrote to memory of 916 3356 Netplwiz.exe PID 3356 wrote to memory of 1328 3356 Dxpserver.exe PID 3356 wrote to memory of 1328 3356 Dxpserver.exe PID 3356 wrote to memory of 4412 3356 Dxpserver.exe PID 3356 wrote to memory of 4412 3356 Dxpserver.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bbd6d896a535b1e9b382eda903972c62e1aeb045c9fb4057a8aae51feb85eeca.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:3592
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe1⤵PID:4284
-
C:\Users\Admin\AppData\Local\FTZ\wermgr.exeC:\Users\Admin\AppData\Local\FTZ\wermgr.exe1⤵
- Executes dropped EXE
PID:3764
-
C:\Windows\system32\FXSCOVER.exeC:\Windows\system32\FXSCOVER.exe1⤵PID:2000
-
C:\Users\Admin\AppData\Local\mWF\FXSCOVER.exeC:\Users\Admin\AppData\Local\mWF\FXSCOVER.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4748
-
C:\Windows\system32\Netplwiz.exeC:\Windows\system32\Netplwiz.exe1⤵PID:3872
-
C:\Users\Admin\AppData\Local\FPC\Netplwiz.exeC:\Users\Admin\AppData\Local\FPC\Netplwiz.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:916
-
C:\Windows\system32\Dxpserver.exeC:\Windows\system32\Dxpserver.exe1⤵PID:1328
-
C:\Users\Admin\AppData\Local\t1mSN\Dxpserver.exeC:\Users\Admin\AppData\Local\t1mSN\Dxpserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
724KB
MD5a0b8771ca40de00f80f331f29af97786
SHA13b556fe9d6ce703254346313235c221d200be328
SHA256c1a166c9f21795923a63f3b7f88ea2e4d972b7f9bd1d2d3d496cc11fcce50855
SHA5122e9ca72b74f70a0af80be6ddab736a52c46e33e43a506ce86257d936d0ce35ec6c74066405ad785659d29fae42508365065470838998335e3b0929c2ed0fa840
-
Filesize
40KB
MD5520a7b7065dcb406d7eca847b81fd4ec
SHA1d1b3b046a456630f65d482ff856c71dfd2f335c8
SHA2568323b44b6e69f02356a5ab0d03a4fc87b953edcbd85c2b6281bf92bc0a3b224d
SHA5127aea2810f38d1640d4aa87efbbe20783fe7b8e7f588864a3a384a37c91108d906abd89b235672608c98c46ed76db2b0039462098a1064ebe4108ec37b6087914
-
Filesize
223KB
MD5f7991343cf02ed92cb59f394e8b89f1f
SHA1573ad9af63a6a0ab9b209ece518fd582b54cfef5
SHA2561c09759dcd31fdc81bcd6685438d7efb34e0229f1096bfd57d41ecfe614d07dc
SHA512fa3cf314100f5340c7d0f6a70632a308fcadb4b48785753310a053a510169979a89637b8b4fedf4d3690db6b8b55146e323cad70d704c4e2ede4edff5284237d
-
Filesize
242KB
MD55769f78d00f22f76a4193dc720d0b2bd
SHA1d62b6cab057e88737cba43fe9b0c6d11a28b53e8
SHA25640e8e6dabfa1485b11cdccf220eb86eeaa8256e99e344cf2b2098d4cdb788a31
SHA512b4b3448a2635b21690c71254d964832e89bf947f7a0d32e79dcc84730f11d4afb4149a810a768878e52f88fc8baec45f1a2fec8e22c5301e9f39fe4fc6a57e3f
-
Filesize
748KB
MD59e64ad8f75b0c0f9ac46c617cecaeb5f
SHA1e1d2a2942a99ba50fc54f34ba4cb1b7062daaf34
SHA2565ea9875064b302ebd81518bea4eb4ce6537121dc26bb7cb5710f508a8093be2f
SHA512e77de1b9e09e55cf053c1cb458de6dc0bad0bac7c79f3c7e701ec10d93f4a0fff5e084d456e89aa47a3e07aaea33d44d3b2792b548218bec4c8c369b882b63f2
-
Filesize
310KB
MD56344f1a7d50da5732c960e243c672165
SHA1b6d0236f79d4f988640a8445a5647aff5b5410f7
SHA256b1081651ac33610824e2088ff64d1655993dd3d6073af1e5ffe0b4a0027f502f
SHA51273f6fa01b880e6619fafa065c171bd0a2b7b2d908762b5aca15f2b8d856b5501b3884e3566ef9b8032c8cbf9bb15116e60c22fded4656c8857c974cda4213d65
-
Filesize
724KB
MD5acfc44e1ff7c1cd0284df1c64a1be7e4
SHA1130bb1916a6783fd4ececf7486e0254d9142431c
SHA256268d618e8289e4c08352f566169820e509b111f5141db217068ccdcbb0b7b4de
SHA512cedb86624ccdb011fb06a07217657d0dd03b0fe30b69a4dc0261846f8db113eadddbbaa0a086789d99d2a3bfc687257b7d802d2e516d0e4f8167ac8dceb58c19
-
Filesize
1KB
MD55b9b4d61f8696fa0cc2bc4994c8f33e0
SHA193ef0ca5b044a7b679e5f09239e34ccbcdec763d
SHA256400852ada9be86b0a1b7abb11c093e574a4505cdd8db0443e089bc32332accb3
SHA5127b820b7884f5d717c3377d934c016c35dd5f91b5635548e8b39592db018061e76d887fa187e7d8f50bdf3cc1696f95d3d2a5c53ec9ffe8890e44aea85e373a6f