Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 00:07
Static task
static1
Behavioral task
behavioral1
Sample
aa1b8808ff9218215966c40200f6c4364ccfeeac09577d53e4070ac340c921f7.dll
Resource
win7-20240903-en
General
-
Target
aa1b8808ff9218215966c40200f6c4364ccfeeac09577d53e4070ac340c921f7.dll
-
Size
668KB
-
MD5
98dc96aa9c3710d257132e09fb20d7be
-
SHA1
d88827076938c59663be2404e1d3b225b39b677c
-
SHA256
aa1b8808ff9218215966c40200f6c4364ccfeeac09577d53e4070ac340c921f7
-
SHA512
57c1b0de9117d953848428b8e77e0a08d66f04472f337d028138476ec7b57ac7cf28121d8ee47a3c430cdf13fc0865fd11eeb6050db3e80d83453dd8eb3ddce0
-
SSDEEP
6144:434xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:4IKp/UWCZdCDh2IZDwAFRpR6Au
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1200-4-0x0000000002A50000-0x0000000002A51000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral1/memory/2600-1-0x000007FEF6BE0000-0x000007FEF6C87000-memory.dmp dridex_payload behavioral1/memory/1200-16-0x0000000140000000-0x00000001400A7000-memory.dmp dridex_payload behavioral1/memory/1200-24-0x0000000140000000-0x00000001400A7000-memory.dmp dridex_payload behavioral1/memory/1200-35-0x0000000140000000-0x00000001400A7000-memory.dmp dridex_payload behavioral1/memory/1200-36-0x0000000140000000-0x00000001400A7000-memory.dmp dridex_payload behavioral1/memory/2600-44-0x000007FEF6BE0000-0x000007FEF6C87000-memory.dmp dridex_payload behavioral1/memory/2676-53-0x000007FEF6C90000-0x000007FEF6D38000-memory.dmp dridex_payload behavioral1/memory/2676-58-0x000007FEF6C90000-0x000007FEF6D38000-memory.dmp dridex_payload behavioral1/memory/2064-70-0x000007FEF5B90000-0x000007FEF5C38000-memory.dmp dridex_payload behavioral1/memory/2064-74-0x000007FEF5B90000-0x000007FEF5C38000-memory.dmp dridex_payload behavioral1/memory/2500-86-0x000007FEF6190000-0x000007FEF6238000-memory.dmp dridex_payload behavioral1/memory/2500-90-0x000007FEF6190000-0x000007FEF6238000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 2676 mblctr.exe 2064 msdtc.exe 2500 cmstp.exe -
Loads dropped DLL 7 IoCs
pid Process 1200 Process not Found 2676 mblctr.exe 1200 Process not Found 2064 msdtc.exe 1200 Process not Found 2500 cmstp.exe 1200 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gazvzzjnt = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\TQunq\\msdtc.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mblctr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msdtc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmstp.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2600 rundll32.exe 2600 rundll32.exe 2600 rundll32.exe 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 1200 Process not Found 2676 mblctr.exe 2676 mblctr.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1200 wrote to memory of 2248 1200 Process not Found 31 PID 1200 wrote to memory of 2248 1200 Process not Found 31 PID 1200 wrote to memory of 2248 1200 Process not Found 31 PID 1200 wrote to memory of 2676 1200 Process not Found 32 PID 1200 wrote to memory of 2676 1200 Process not Found 32 PID 1200 wrote to memory of 2676 1200 Process not Found 32 PID 1200 wrote to memory of 2572 1200 Process not Found 33 PID 1200 wrote to memory of 2572 1200 Process not Found 33 PID 1200 wrote to memory of 2572 1200 Process not Found 33 PID 1200 wrote to memory of 2064 1200 Process not Found 34 PID 1200 wrote to memory of 2064 1200 Process not Found 34 PID 1200 wrote to memory of 2064 1200 Process not Found 34 PID 1200 wrote to memory of 2736 1200 Process not Found 35 PID 1200 wrote to memory of 2736 1200 Process not Found 35 PID 1200 wrote to memory of 2736 1200 Process not Found 35 PID 1200 wrote to memory of 2500 1200 Process not Found 36 PID 1200 wrote to memory of 2500 1200 Process not Found 36 PID 1200 wrote to memory of 2500 1200 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\aa1b8808ff9218215966c40200f6c4364ccfeeac09577d53e4070ac340c921f7.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2600
-
C:\Windows\system32\mblctr.exeC:\Windows\system32\mblctr.exe1⤵PID:2248
-
C:\Users\Admin\AppData\Local\pvcBC\mblctr.exeC:\Users\Admin\AppData\Local\pvcBC\mblctr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2676
-
C:\Windows\system32\msdtc.exeC:\Windows\system32\msdtc.exe1⤵PID:2572
-
C:\Users\Admin\AppData\Local\pGHO\msdtc.exeC:\Users\Admin\AppData\Local\pGHO\msdtc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2064
-
C:\Windows\system32\cmstp.exeC:\Windows\system32\cmstp.exe1⤵PID:2736
-
C:\Users\Admin\AppData\Local\u10HeuBte\cmstp.exeC:\Users\Admin\AppData\Local\u10HeuBte\cmstp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
672KB
MD5df5999774ba99f24d95840558ac2258d
SHA18c42393eabb65a58f73acf611567128f9ef17952
SHA256bc9b430b92013945134315287d97e6c0cea597f2bd8f4c7ba5522ed6d02f07bb
SHA51221b8336e7084c47d3aeb018c365fbe615721311fe1e9f627a175e963113704e287097d0661e58c3a20edaa5c9b8d03354ebcb1d757d35ec351492b7eecb43147
-
Filesize
672KB
MD51bcbca9ef3f89eadfc94de4cd066d9cb
SHA1e0b261645589db6975dc5afaeaac94bc36854c79
SHA256e4302d6bfe8458c23dce50b332d3919862d46f47235cce9083ced6d123a25837
SHA51284c292f5778ee6a4ebffced0d5ca807a81bf9340f33be1ee016e28a9a0ec7128b9b1096729d4340b5caafea990f6352a4a63f274de989070c6a1f8b69addf2e5
-
Filesize
672KB
MD5c80ef317f509ec5877f52992d653a45b
SHA193d7d72a535b384da8ee77123298763bf22b7da2
SHA256d903f2edaa2387bf49b141c8a52c2bb3cab5799ed04e758afb8a2604277a8cf1
SHA5124878c789c69bd170ab56f88b5bf0fe99686399c97f677f23d9bc15812ee5f7dd80c48a60789cb1b62f873bc5b975fb5e9d2633e08d6e5499bcdb64b9e2bbd247
-
Filesize
1010B
MD55dc25528b36cf0589cf5c49dad354019
SHA12f6d89eb0d51fe290f10b09a786bb201dd637a84
SHA25680e6390f22098bab46c4e0ecac2a2be26d9af8561c95b5a5345105cbbca777ea
SHA512ff6150c628d0d28abf7df1af03b61f365281e84ada5cef0adbcb7e53bb7662aa12c0254285f2b8c0c8ff9d4211fc656b8dcdf7863602d014ee2f55feffae70d3
-
Filesize
138KB
MD5de0ece52236cfa3ed2dbfc03f28253a8
SHA184bbd2495c1809fcd19b535d41114e4fb101466c
SHA2562fbbec4cacb5161f68d7c2935852a5888945ca0f107cf8a1c01f4528ce407de3
SHA51269386134667626c60c99d941c8ab52f8e5235e3897b5af76965572287afd5dcd42b8207a520587844a57a268e4decb3f3c550e5b7a06230ee677dc5e40c50bb3
-
Filesize
935KB
MD5fa4c36b574bf387d9582ed2c54a347a8
SHA1149077715ee56c668567e3a9cb9842284f4fe678
SHA256b71cdf708d4a4f045f784de5e5458ebf9a4fa2b188c3f7422e2fbfe19310be3f
SHA5121f04ce0440eec7477153ebc2ce56eaabcbbac58d9d703c03337f030e160d22cd635ae201752bc2962643c75bbf2036afdd69d97e8cbc81260fd0e2f55946bb55
-
Filesize
90KB
MD574c6da5522f420c394ae34b2d3d677e3
SHA1ba135738ef1fb2f4c2c6c610be2c4e855a526668
SHA25651d298b1a8a2d00d5c608c52dba0655565d021e9798ee171d7fa92cc0de729a6
SHA512bfd76b1c3e677292748f88bf595bfef0b536eb22f2583b028cbf08f6ae4eda1aa3787c4e892aad12b7681fc2363f99250430a0e7019a7498e24db391868e787a