Analysis
-
max time kernel
149s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 00:07
Static task
static1
Behavioral task
behavioral1
Sample
e36e53073055480f0401b56d3149b60bb3e47a95237eee92ba62f659b875e33a.dll
Resource
win7-20240708-en
General
-
Target
e36e53073055480f0401b56d3149b60bb3e47a95237eee92ba62f659b875e33a.dll
-
Size
668KB
-
MD5
180c0aa7fe397e299b050b5a9fa20041
-
SHA1
7c6f6b915e18f322b65187b831cbb5f68ed02c09
-
SHA256
e36e53073055480f0401b56d3149b60bb3e47a95237eee92ba62f659b875e33a
-
SHA512
822daa11c3f169efb36848e9ac0e0ad391d9401cb8d329cd3b9d1a0dc3d5aae029f356bded5dd625e44ba364fb615b861846c5d580dc7d65b4faeccc9ff5fea7
-
SSDEEP
6144:o34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:oIKp/UWCZdCDh2IZDwAFRpR6Au
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1220-4-0x0000000002B00000-0x0000000002B01000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral1/memory/964-2-0x000007FEF7D10000-0x000007FEF7DB7000-memory.dmp dridex_payload behavioral1/memory/1220-16-0x0000000140000000-0x00000001400A7000-memory.dmp dridex_payload behavioral1/memory/1220-24-0x0000000140000000-0x00000001400A7000-memory.dmp dridex_payload behavioral1/memory/1220-35-0x0000000140000000-0x00000001400A7000-memory.dmp dridex_payload behavioral1/memory/1220-36-0x0000000140000000-0x00000001400A7000-memory.dmp dridex_payload behavioral1/memory/964-44-0x000007FEF7D10000-0x000007FEF7DB7000-memory.dmp dridex_payload behavioral1/memory/2716-54-0x000007FEFB110000-0x000007FEFB1B8000-memory.dmp dridex_payload behavioral1/memory/2716-58-0x000007FEFB110000-0x000007FEFB1B8000-memory.dmp dridex_payload behavioral1/memory/2928-75-0x000007FEFB110000-0x000007FEFB1B8000-memory.dmp dridex_payload behavioral1/memory/1316-91-0x000007FEFB110000-0x000007FEFB1B8000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 2716 calc.exe 2928 BdeUISrv.exe 1316 fvenotify.exe -
Loads dropped DLL 7 IoCs
pid Process 1220 Process not Found 2716 calc.exe 1220 Process not Found 2928 BdeUISrv.exe 1220 Process not Found 1316 fvenotify.exe 1220 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wqbazsgxtjodx = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\6G8T8N~1\\BdeUISrv.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA calc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BdeUISrv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fvenotify.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 964 rundll32.exe 964 rundll32.exe 964 rundll32.exe 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1220 wrote to memory of 2708 1220 Process not Found 30 PID 1220 wrote to memory of 2708 1220 Process not Found 30 PID 1220 wrote to memory of 2708 1220 Process not Found 30 PID 1220 wrote to memory of 2716 1220 Process not Found 31 PID 1220 wrote to memory of 2716 1220 Process not Found 31 PID 1220 wrote to memory of 2716 1220 Process not Found 31 PID 1220 wrote to memory of 2488 1220 Process not Found 32 PID 1220 wrote to memory of 2488 1220 Process not Found 32 PID 1220 wrote to memory of 2488 1220 Process not Found 32 PID 1220 wrote to memory of 2928 1220 Process not Found 33 PID 1220 wrote to memory of 2928 1220 Process not Found 33 PID 1220 wrote to memory of 2928 1220 Process not Found 33 PID 1220 wrote to memory of 1744 1220 Process not Found 34 PID 1220 wrote to memory of 1744 1220 Process not Found 34 PID 1220 wrote to memory of 1744 1220 Process not Found 34 PID 1220 wrote to memory of 1316 1220 Process not Found 35 PID 1220 wrote to memory of 1316 1220 Process not Found 35 PID 1220 wrote to memory of 1316 1220 Process not Found 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e36e53073055480f0401b56d3149b60bb3e47a95237eee92ba62f659b875e33a.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:964
-
C:\Windows\system32\calc.exeC:\Windows\system32\calc.exe1⤵PID:2708
-
C:\Users\Admin\AppData\Local\2UP\calc.exeC:\Users\Admin\AppData\Local\2UP\calc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2716
-
C:\Windows\system32\BdeUISrv.exeC:\Windows\system32\BdeUISrv.exe1⤵PID:2488
-
C:\Users\Admin\AppData\Local\AdGLyMw\BdeUISrv.exeC:\Users\Admin\AppData\Local\AdGLyMw\BdeUISrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2928
-
C:\Windows\system32\fvenotify.exeC:\Windows\system32\fvenotify.exe1⤵PID:1744
-
C:\Users\Admin\AppData\Local\mPo7d4j2\fvenotify.exeC:\Users\Admin\AppData\Local\mPo7d4j2\fvenotify.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
672KB
MD5f8defc064075e84042afb4bdccb7aae3
SHA1148355ef8f72a18f0a4da76401084730e7a40272
SHA256058f2fe03ff227c3ea7980d8b014f5b1bb4fab1f7e54cf552b836c5542dc0c06
SHA5128079f86fdcd35e62e749380433914a041d3eca9ad1dc26642fafab048f167409fdce9d6d11ca4e77699ab5f771bb266f8f164911af72d8891eccee4c29485ec8
-
Filesize
672KB
MD5d0619aec474835eff33d1c579b1c791c
SHA1f416db7540ead3e7a9ac1f629f30e5b26924cc79
SHA256e7c944fa64cc1c6026c97c6f8aeb4736d7ab2f743f68ec2aff316e2837bc5da0
SHA512857d9653bbb3d32c95c118beaf3c1b662900c9d62a09c275199b4e5e94701bfcb44b600549ca50ffd4adc52c27fb08bafc6969ddc67b59acfbac7985237d9d47
-
Filesize
672KB
MD5947975c619ccb5681f781f18d04e6a54
SHA10b239868e42e5ce46ad30889633f7f35beef581a
SHA256dde88d1896e001eb700a5dba3616b28b5f19b8c54c0e1dae09a0a43a3ca2eb83
SHA512306731666ececd31f740def2edf8d1f8bc48fd1b4713dda28ccfe13bbd0b84199b9cbd61a0866f89e70949e3f80dcd7aef98bb9d2b17abec892535babf016580
-
Filesize
1KB
MD5b04a9ca6d30cde06d8eb66c0c453af95
SHA1851a89e2a0f58aa85e161befb5492f23530dbe4a
SHA25609f24e71204b1d9a017dcd5748507f940fcf902bdc3d1d25d1cbbfcc4f94845b
SHA512efe90b7bb2666c609147339ab801948690d3aad68b277e417e937c10feb9e3d3f8d75fbf0d2ac6083b8f416cb866136e10b92d41b23401e81998d7b236dc4ebc
-
Filesize
897KB
MD510e4a1d2132ccb5c6759f038cdb6f3c9
SHA142d36eeb2140441b48287b7cd30b38105986d68f
SHA256c6a91cba00bf87cdb064c49adaac82255cbec6fdd48fd21f9b3b96abf019916b
SHA5129bd44afb164ab3e09a784c765cd03838d2e5f696c549fc233eb5a69cada47a8e1fb62095568cb272a80da579d9d0e124b1c27cf61bb2ac8cf6e584a722d8864d
-
Filesize
47KB
MD51da6b19be5d4949c868a264bc5e74206
SHA1d5ee86ba03a03ef8c93d93accafe40461084c839
SHA25600330a0e0eb1dbb6ee84997963f8e15c7c15c1df787f1c7f109609d7b31bd35c
SHA5129cee858c55eb0852e5bad53a675a094ae591b46b07afe9fb4224cac32e0be577fe36c1ed3e9f6bda4d4eb0c924a773d00e3181cd97f07e24c6c68c70f2b002c6
-
Filesize
117KB
MD5e61d644998e07c02f0999388808ac109
SHA1183130ad81ff4c7997582a484e759bf7769592d6
SHA25615a85cd6fbcb1ec57d78f986d6dd8908bd56231ce0cf65775075512303f7e5fa
SHA512310141b73394ae12a35f8d4f0c097868ee8a8045a62dd402a5dfbe2151980dd4fe18409ae3ca9422e3b88b2fa9afb04c1acbf8ec23a937a0a242b32a9a1e9272