Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2024 17:44
Static task
static1
Behavioral task
behavioral1
Sample
da457d69f37782526f9a253e305e10ccf5c10320f930879b33e30475adf061ec.dll
Resource
win7-20240903-en
General
-
Target
da457d69f37782526f9a253e305e10ccf5c10320f930879b33e30475adf061ec.dll
-
Size
716KB
-
MD5
e85e1ec50007aaefe8a569d3931bccf9
-
SHA1
fbddb1fd526afad1be106f3ac1790fa75866a995
-
SHA256
da457d69f37782526f9a253e305e10ccf5c10320f930879b33e30475adf061ec
-
SHA512
691a3e2b10e5c9a0edb8d51a9fc0df29246232cc6c7b67539b3c9256a9be6e0cef58022abef8dbd7e49e8e3c0d21b60dc8b68e484684e0c9e6da9c0cad332766
-
SSDEEP
12288:NqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4BaedN:NqGBHTxvt+g2gYedN
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3528-3-0x0000000002ED0000-0x0000000002ED1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/448-1-0x0000000140000000-0x00000001400B3000-memory.dmp dridex_payload behavioral2/memory/3528-22-0x0000000140000000-0x00000001400B3000-memory.dmp dridex_payload behavioral2/memory/3528-33-0x0000000140000000-0x00000001400B3000-memory.dmp dridex_payload behavioral2/memory/448-36-0x0000000140000000-0x00000001400B3000-memory.dmp dridex_payload behavioral2/memory/3268-44-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral2/memory/3268-48-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral2/memory/3020-59-0x0000000140000000-0x00000001400F9000-memory.dmp dridex_payload behavioral2/memory/3020-63-0x0000000140000000-0x00000001400F9000-memory.dmp dridex_payload behavioral2/memory/4224-78-0x0000000140000000-0x00000001400F9000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
DeviceEnroller.exeSystemSettingsAdminFlows.exeCameraSettingsUIHost.exepid process 3268 DeviceEnroller.exe 3020 SystemSettingsAdminFlows.exe 4224 CameraSettingsUIHost.exe -
Loads dropped DLL 3 IoCs
Processes:
DeviceEnroller.exeSystemSettingsAdminFlows.exeCameraSettingsUIHost.exepid process 3268 DeviceEnroller.exe 3020 SystemSettingsAdminFlows.exe 4224 CameraSettingsUIHost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Nzvdnevrdk = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\3hMh\\SYSTEM~1.EXE" -
Processes:
DeviceEnroller.exeSystemSettingsAdminFlows.exeCameraSettingsUIHost.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DeviceEnroller.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemSettingsAdminFlows.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CameraSettingsUIHost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exepid process 448 regsvr32.exe 448 regsvr32.exe 448 regsvr32.exe 448 regsvr32.exe 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 3528 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3528 wrote to memory of 3212 3528 DeviceEnroller.exe PID 3528 wrote to memory of 3212 3528 DeviceEnroller.exe PID 3528 wrote to memory of 3268 3528 DeviceEnroller.exe PID 3528 wrote to memory of 3268 3528 DeviceEnroller.exe PID 3528 wrote to memory of 2884 3528 SystemSettingsAdminFlows.exe PID 3528 wrote to memory of 2884 3528 SystemSettingsAdminFlows.exe PID 3528 wrote to memory of 3020 3528 SystemSettingsAdminFlows.exe PID 3528 wrote to memory of 3020 3528 SystemSettingsAdminFlows.exe PID 3528 wrote to memory of 4800 3528 CameraSettingsUIHost.exe PID 3528 wrote to memory of 4800 3528 CameraSettingsUIHost.exe PID 3528 wrote to memory of 4224 3528 CameraSettingsUIHost.exe PID 3528 wrote to memory of 4224 3528 CameraSettingsUIHost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\da457d69f37782526f9a253e305e10ccf5c10320f930879b33e30475adf061ec.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:448
-
C:\Windows\system32\DeviceEnroller.exeC:\Windows\system32\DeviceEnroller.exe1⤵PID:3212
-
C:\Users\Admin\AppData\Local\FVWsIRS\DeviceEnroller.exeC:\Users\Admin\AppData\Local\FVWsIRS\DeviceEnroller.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3268
-
C:\Windows\system32\SystemSettingsAdminFlows.exeC:\Windows\system32\SystemSettingsAdminFlows.exe1⤵PID:2884
-
C:\Users\Admin\AppData\Local\6Qkr\SystemSettingsAdminFlows.exeC:\Users\Admin\AppData\Local\6Qkr\SystemSettingsAdminFlows.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3020
-
C:\Windows\system32\CameraSettingsUIHost.exeC:\Windows\system32\CameraSettingsUIHost.exe1⤵PID:4800
-
C:\Users\Admin\AppData\Local\5QcH\CameraSettingsUIHost.exeC:\Users\Admin\AppData\Local\5QcH\CameraSettingsUIHost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD59e98636523a653c7a648f37be229cf69
SHA1bd4da030e7cf4d55b7c644dfacd26b152e6a14c4
SHA2563bf20bc5a208dfa1ea26a042fd0010b1268dcfedc94ed775f11890bc1d95e717
SHA51241966166e2ddfe40e6f4e6da26bc490775caac9997465c6dd94ba6a664d3a797ffc2aa5684c95702e8657e5cea62a46a75aee3e7d5e07a47dcaaa5c4da565e78
-
Filesize
996KB
MD52977e8891a6a30a33719e253ca8d0a1a
SHA186a642fe751ed61f5dbcc773acf4c74eb6d70b59
SHA256631ab48c0096fc19d2d8d12449ffe5f3677a30a12d377a60afbbc477b1aa9fc4
SHA512f0e3301b5024da00aa0d0f362c9a1cdfcb3fe3869a106bd9192f8d55b48a5e9486db6530bf057b9888ca980f9db6e422a08bb9d0f0935345c6a3fc157927a553
-
Filesize
996KB
MD5e12a845a16e42c68432336f9a1dbb098
SHA18af66e6deff5427a19946ac2fff59137fc176f91
SHA256b8139beb2af0d45ce326f45a836e9a9c975fe4baeba6cbc378ce530c11a83100
SHA512f0e67f274a3314f1ece7ee2a65d92701c691f89c06b67fc5f49113dc32bfb0f93351656ecace7113a519edc6e6e5b4d41a6777e3edd3613b8f2e92b0f961d3f6
-
Filesize
506KB
MD550adb2c7c145c729b9de8b7cf967dd24
SHA1a31757f08da6f95156777c1132b6d5f1db3d8f30
SHA256a7a2e7122d27308df37b7ab718ef3ac239e4216669f51331e34e205f59fb0aec
SHA512715b4c93e79e896da1cf86cf4455a84cba1aeac34b6fd72d2afdf203a2034f6f8fac1d6501f0dd277a17bd1d7ab73ddd1887e01a99f2d26f39efeb94d0aac9b0
-
Filesize
448KB
MD5946d9474533f58d2613078fd14ca7473
SHA1c2620ac9522fa3702a6a03299b930d6044aa5e49
SHA256cf5f5fe084f172e9c435615c1dc6ae7d3bd8c5ec8ea290caa0627c2f392760cb
SHA5123653d41a0553ee63a43490f682c9b528651a6336f28adafc333d4d148577351122db8279ff83ee59bb0a9c17bb384e9f6c9c78677c8c5ed671a42036dec1f8c1
-
Filesize
720KB
MD55c306146d480992f4ca94cb6d4cb28a7
SHA1a0f80ebf18a81b9fb2e6714a7688a5cd2f49384f
SHA2566671e5decec24242959f35be5b47b840f547b42339e46c7ad7ee1773a86fee61
SHA512078be88244d3919d8bc62e07f336da664b3d14af204bd2c8927ee0f0ed2aabdf3bad022e09c9b48263712cfc1261148b3f8a3d952f224d8b6c5867cfe597f7c2
-
Filesize
1KB
MD575ff4f46fac9b5827aa27e18d76248d2
SHA1115fcfd3f190a9480e4053b5245a4916d7884310
SHA256cb34010b7910cd91724bf27d70a3fa8969c28687c84678557330d35b2fb25db6
SHA512a579c94a19bf731e4649bf80722744b3d46b71a5728770174850f0c498808084263589f829cc9283c99b2a6200049fc36b4844982bf36beffcd46966fbfc1dc0