Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-10-2024 17:44
Static task
static1
Behavioral task
behavioral1
Sample
da457d69f37782526f9a253e305e10ccf5c10320f930879b33e30475adf061ec.dll
Resource
win7-20240903-en
General
-
Target
da457d69f37782526f9a253e305e10ccf5c10320f930879b33e30475adf061ec.dll
-
Size
716KB
-
MD5
e85e1ec50007aaefe8a569d3931bccf9
-
SHA1
fbddb1fd526afad1be106f3ac1790fa75866a995
-
SHA256
da457d69f37782526f9a253e305e10ccf5c10320f930879b33e30475adf061ec
-
SHA512
691a3e2b10e5c9a0edb8d51a9fc0df29246232cc6c7b67539b3c9256a9be6e0cef58022abef8dbd7e49e8e3c0d21b60dc8b68e484684e0c9e6da9c0cad332766
-
SSDEEP
12288:NqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4BaedN:NqGBHTxvt+g2gYedN
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1284-4-0x0000000002DF0000-0x0000000002DF1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/1680-0-0x0000000140000000-0x00000001400B3000-memory.dmp dridex_payload behavioral1/memory/1284-22-0x0000000140000000-0x00000001400B3000-memory.dmp dridex_payload behavioral1/memory/1284-33-0x0000000140000000-0x00000001400B3000-memory.dmp dridex_payload behavioral1/memory/1284-34-0x0000000140000000-0x00000001400B3000-memory.dmp dridex_payload behavioral1/memory/1680-42-0x0000000140000000-0x00000001400B3000-memory.dmp dridex_payload behavioral1/memory/2844-52-0x0000000140000000-0x00000001400BA000-memory.dmp dridex_payload behavioral1/memory/2844-56-0x0000000140000000-0x00000001400BA000-memory.dmp dridex_payload behavioral1/memory/1416-69-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral1/memory/1416-73-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral1/memory/2944-89-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
shrpubw.exedccw.exeComputerDefaults.exepid process 2844 shrpubw.exe 1416 dccw.exe 2944 ComputerDefaults.exe -
Loads dropped DLL 7 IoCs
Processes:
shrpubw.exedccw.exeComputerDefaults.exepid process 1284 2844 shrpubw.exe 1284 1416 dccw.exe 1284 2944 ComputerDefaults.exe 1284 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rtunysabu = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Crypto\\4aXd\\dccw.exe" -
Processes:
shrpubw.exedccw.exeComputerDefaults.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA shrpubw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dccw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ComputerDefaults.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exepid process 1680 regsvr32.exe 1680 regsvr32.exe 1680 regsvr32.exe 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 1284 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1284 wrote to memory of 2736 1284 shrpubw.exe PID 1284 wrote to memory of 2736 1284 shrpubw.exe PID 1284 wrote to memory of 2736 1284 shrpubw.exe PID 1284 wrote to memory of 2844 1284 shrpubw.exe PID 1284 wrote to memory of 2844 1284 shrpubw.exe PID 1284 wrote to memory of 2844 1284 shrpubw.exe PID 1284 wrote to memory of 2684 1284 dccw.exe PID 1284 wrote to memory of 2684 1284 dccw.exe PID 1284 wrote to memory of 2684 1284 dccw.exe PID 1284 wrote to memory of 1416 1284 dccw.exe PID 1284 wrote to memory of 1416 1284 dccw.exe PID 1284 wrote to memory of 1416 1284 dccw.exe PID 1284 wrote to memory of 1140 1284 ComputerDefaults.exe PID 1284 wrote to memory of 1140 1284 ComputerDefaults.exe PID 1284 wrote to memory of 1140 1284 ComputerDefaults.exe PID 1284 wrote to memory of 2944 1284 ComputerDefaults.exe PID 1284 wrote to memory of 2944 1284 ComputerDefaults.exe PID 1284 wrote to memory of 2944 1284 ComputerDefaults.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\da457d69f37782526f9a253e305e10ccf5c10320f930879b33e30475adf061ec.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:1680
-
C:\Windows\system32\shrpubw.exeC:\Windows\system32\shrpubw.exe1⤵PID:2736
-
C:\Users\Admin\AppData\Local\gl2nk\shrpubw.exeC:\Users\Admin\AppData\Local\gl2nk\shrpubw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2844
-
C:\Windows\system32\dccw.exeC:\Windows\system32\dccw.exe1⤵PID:2684
-
C:\Users\Admin\AppData\Local\VcNnc\dccw.exeC:\Users\Admin\AppData\Local\VcNnc\dccw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1416
-
C:\Windows\system32\ComputerDefaults.exeC:\Windows\system32\ComputerDefaults.exe1⤵PID:1140
-
C:\Users\Admin\AppData\Local\pDR4T\ComputerDefaults.exeC:\Users\Admin\AppData\Local\pDR4T\ComputerDefaults.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2944
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
720KB
MD59abbf3f4f6a32b15fab456d040f3b3b7
SHA1314528ea40e94cf3a0826fbe5738b49de071e492
SHA256ed5404f7ec1462bc33551a3be9e64bba16ba63c71c27e752d9bd40df32af418f
SHA512e77a1b4243e45204947c0f928ca88c41420c74f49edcd5cf05ec427b84dc59c39c4338c72a0daeb9d2d08e7cc515700bae003493d352789e749dce20ef44dae1
-
Filesize
744KB
MD57d117b1dce38ffbf700f69951961cecc
SHA1ac76b52713114b1f86468b21e05dd938a8d74ff4
SHA256c6f89eb2a1d66acd6458752e026f550e89739de06f1b60b7a9f5293f01238473
SHA512bd962bf219eebd38278dce1f62a3c61551f297b5a3c27d5183ba4c941149696f13da4b1a85cc9e76fc236b724a9beaae7edb38e24553b5ba5e1f9f21e8cf3623
-
Filesize
720KB
MD522b1e73c2b8e60c367e42d8948d14e8e
SHA1d181b77b046d57323be2230e80fe8be0030fe927
SHA25664230b1ef2137d3d37184a6b331f25b839a1e9a1c632b4419a100eeb5145a191
SHA5121875e0876197e685f05cb91b13fadb1439aa35d841638c35fa88796bdd774845d1b366c790e711cedcf9df050b1468ba760bad1070563d27a1b88ad2575ad4b1
-
Filesize
1KB
MD59b30537d9513321d4d919543195ea8dc
SHA11ad14daac5470c2ef73eafdb91ae125c165883c5
SHA2567b1aefc36b0c91470e2df476d9ec0bf3ef5036f255b6c217a49dbc6696338cb7
SHA5129a4f020671da033eecc0c8e0bf4e63d118a510716f63381f5d8f1d9b9845e8cd387233f8e2bf4daca7359f355f9f376bd86cf80e59cdb060df3c34ee6bc2a0ba
-
Filesize
861KB
MD5a46cee731351eb4146db8e8a63a5c520
SHA18ea441e4a77642e12987ac842b36034230edd731
SHA256283526a98a83524d21ff23f9109754c6587380b67f74cc02a9a4cd56fdb720d5
SHA5123573c0ae21406db0c6fdda7c065fabde03235bde7f5589910822500bdfa37144f59f6e58e753e7347b899998db1dcb28050ac5a4e2c611558ae5fa405fbbc5cc
-
Filesize
398KB
MD529e6d0016611c8f948db5ea71372f76c
SHA101d007a01020370709cd6580717f9ace049647e8
SHA25653c868882ebc9e0d4f703afeccb172043069ccc0b5b6f7cac1d2aad9c4640930
SHA512300216ab47ee44b8f68d4835bf26641f949039522b680af00fb602f57d31c38812428dc624461bc2cc7d6384cad396bc033718e41e11a65f7dd0eeb36ed924e4
-
Filesize
36KB
MD586bd981f55341273753ac42ea200a81e
SHA114fe410efc9aeb0a905b984ac27719ff0dd10ea7
SHA25640b194be2bad2d3d4d1b69f9aec2853c8b663130810a11607ff72a9e3a06d5b3
SHA51249bb6d4bf7a9356fadde7f6165af6973630827d28b69db10ad477a84d98b08fb82e4daae777166e1ddddb5b5efcdf634e4e9bd34b255dae87462ba32e8bba143