Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 00:07
Static task
static1
Behavioral task
behavioral1
Sample
915e01432b35339df657eb6eee139103d98a0a8b37a91fd3851e01781a7b041c.dll
Resource
win7-20240903-en
General
-
Target
915e01432b35339df657eb6eee139103d98a0a8b37a91fd3851e01781a7b041c.dll
-
Size
676KB
-
MD5
4158ed3f73bf010337896f8458e8fde9
-
SHA1
26329d87c00bcad276e278003d19995a5425053f
-
SHA256
915e01432b35339df657eb6eee139103d98a0a8b37a91fd3851e01781a7b041c
-
SHA512
7099602f413fa9dbb91ef2dc3208b106a264bba1e96e466ca32cb0772faf90f3358f82eebd5f5fc4b1675bc472bee9baedd68aa2c735fd87800f97da9f703800
-
SSDEEP
6144:j34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:jIKp/UWCZdCDh2IZDwAFRpR6Au
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3408-3-0x0000000002450000-0x0000000002451000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral2/memory/2592-0-0x00007FF8268D0000-0x00007FF826979000-memory.dmp dridex_payload behavioral2/memory/3408-16-0x0000000140000000-0x00000001400A9000-memory.dmp dridex_payload behavioral2/memory/3408-24-0x0000000140000000-0x00000001400A9000-memory.dmp dridex_payload behavioral2/memory/3408-35-0x0000000140000000-0x00000001400A9000-memory.dmp dridex_payload behavioral2/memory/2592-38-0x00007FF8268D0000-0x00007FF826979000-memory.dmp dridex_payload behavioral2/memory/1812-46-0x00007FF825C00000-0x00007FF825CAA000-memory.dmp dridex_payload behavioral2/memory/1812-50-0x00007FF825C00000-0x00007FF825CAA000-memory.dmp dridex_payload behavioral2/memory/4220-61-0x00007FF825BC0000-0x00007FF825CAF000-memory.dmp dridex_payload behavioral2/memory/4220-66-0x00007FF825BC0000-0x00007FF825CAF000-memory.dmp dridex_payload behavioral2/memory/412-81-0x00007FF825C00000-0x00007FF825CAA000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 1812 unregmp2.exe 4220 CameraSettingsUIHost.exe 412 SystemPropertiesPerformance.exe -
Loads dropped DLL 3 IoCs
pid Process 1812 unregmp2.exe 4220 CameraSettingsUIHost.exe 412 SystemPropertiesPerformance.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Sarxmtvezib = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Libraries\\RxcBo\\CameraSettingsUIHost.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA unregmp2.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CameraSettingsUIHost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesPerformance.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 2592 rundll32.exe 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found 3408 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 3408 Process not Found Token: SeCreatePagefilePrivilege 3408 Process not Found Token: SeShutdownPrivilege 3408 Process not Found Token: SeCreatePagefilePrivilege 3408 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3408 Process not Found 3408 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3408 wrote to memory of 4772 3408 Process not Found 94 PID 3408 wrote to memory of 4772 3408 Process not Found 94 PID 3408 wrote to memory of 1812 3408 Process not Found 95 PID 3408 wrote to memory of 1812 3408 Process not Found 95 PID 3408 wrote to memory of 2512 3408 Process not Found 96 PID 3408 wrote to memory of 2512 3408 Process not Found 96 PID 3408 wrote to memory of 4220 3408 Process not Found 97 PID 3408 wrote to memory of 4220 3408 Process not Found 97 PID 3408 wrote to memory of 1608 3408 Process not Found 98 PID 3408 wrote to memory of 1608 3408 Process not Found 98 PID 3408 wrote to memory of 412 3408 Process not Found 99 PID 3408 wrote to memory of 412 3408 Process not Found 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\915e01432b35339df657eb6eee139103d98a0a8b37a91fd3851e01781a7b041c.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2592
-
C:\Windows\system32\unregmp2.exeC:\Windows\system32\unregmp2.exe1⤵PID:4772
-
C:\Users\Admin\AppData\Local\hW2FO\unregmp2.exeC:\Users\Admin\AppData\Local\hW2FO\unregmp2.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1812
-
C:\Windows\system32\CameraSettingsUIHost.exeC:\Windows\system32\CameraSettingsUIHost.exe1⤵PID:2512
-
C:\Users\Admin\AppData\Local\dLgr\CameraSettingsUIHost.exeC:\Users\Admin\AppData\Local\dLgr\CameraSettingsUIHost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4220
-
C:\Windows\system32\SystemPropertiesPerformance.exeC:\Windows\system32\SystemPropertiesPerformance.exe1⤵PID:1608
-
C:\Users\Admin\AppData\Local\2d4dgJ\SystemPropertiesPerformance.exeC:\Users\Admin\AppData\Local\2d4dgJ\SystemPropertiesPerformance.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:412
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
680KB
MD53dd2be91983c2038036e3e1f7b714fdf
SHA1b68873f7bbb017e96ccc3e9aba9125a93011ac1a
SHA256c4e455fd0ab972f5f1009d9fe55513351ea805350f739a0e01e7be7b68fd32b5
SHA5127ec05b0a7364613ff121bb5e0db6b56ca66a42a8b298d6dd20d3c68479ef74bde8a7e5a8dde4c6150cdf9790255583e324d5bae6859fa0a89fce74ceae6a16cb
-
Filesize
82KB
MD5e4fbf7cab8669c7c9cef92205d2f2ffc
SHA1adbfa782b7998720fa85678cc85863b961975e28
SHA256b266318d45a4245556a2e39b763f2f11eca780969105f6f103e53dd0a492bb30
SHA512c5c62578d04133352d6cb7b018df96a7b55c18d6111ab8bf2bfe232a3315a63b07047fa5b0b88551d152085776c66169b47566242c8c4c5e0333c55adc64e1b6
-
Filesize
31KB
MD59e98636523a653c7a648f37be229cf69
SHA1bd4da030e7cf4d55b7c644dfacd26b152e6a14c4
SHA2563bf20bc5a208dfa1ea26a042fd0010b1268dcfedc94ed775f11890bc1d95e717
SHA51241966166e2ddfe40e6f4e6da26bc490775caac9997465c6dd94ba6a664d3a797ffc2aa5684c95702e8657e5cea62a46a75aee3e7d5e07a47dcaaa5c4da565e78
-
Filesize
956KB
MD5d067b58fde720cddd02b546478207bca
SHA17ff018c1bcc039aa44e45d30155592a8d0aeca80
SHA25669e315fb8d45311693f5a91b9b9d3c2c0eb9629255896a203754e2a7219ebe02
SHA512a4bb94b22c45a34278f2095f5f45dfcae7d7b54230e1c67b3da616c6fa7ea20e5bde15f744e82a4c7d5fb6390a326adedc21a06bdce2c912b1852eaf4090aafe
-
Filesize
680KB
MD531be6b48c77f201ea987eafcc35ffbc7
SHA1859c5bb945def507b5dd5093ce69522ad7ee7224
SHA256e3791b7974f82a3bdf8e8cc3b5ab69395756c64e6f5d51473082d7c1f020e1b9
SHA512cc708fd86a9b3a6e3ea8702fcedacea77ece2aecd68289bcf511d3bee950bd32558cbf8247ef8dd988c4977b6b0057a6ee601672dd06803402dc9ed2c369366b
-
Filesize
259KB
MD5a6fc8ce566dec7c5873cb9d02d7b874e
SHA1a30040967f75df85a1e3927bdce159b102011a61
SHA25621f41fea24dddc8a32f902af7b0387a53a745013429d8fd3f5fa6916eadc839d
SHA512f83e17dd305eb1bc24cca1f197e2440f9b501eafb9c9d44ede7c88b1520030a87d059bdcb8eadeac1eaedabcbc4fe50206821965d73f0f6671e27edd55c01cbc
-
Filesize
1KB
MD5455aac5c6ab5d864b0ccc62f4b32a8d5
SHA1f0cda1ea42efc88576f6cce5f60dc5297c66a03c
SHA25652302c48250d0ce40617dffff650734ce252bf4c77515dbf32c486248991e77a
SHA5123a15ae3473ecdd88a3e040f5e368b5413b0841632483ae40e2e3677cc9b927fac5794d20b49afa301a2b111b44d5df58855cb9864ce59a155555a759dee061ad