Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 00:07
Static task
static1
Behavioral task
behavioral1
Sample
0e11ca1228cbc474d5f0fd149fd3615d7caeadc4421cd478bb281716958e5a72.dll
Resource
win7-20240903-en
General
-
Target
0e11ca1228cbc474d5f0fd149fd3615d7caeadc4421cd478bb281716958e5a72.dll
-
Size
664KB
-
MD5
bca074a7366a91b631507914afcac0c1
-
SHA1
d15420166ea0070adb76b254deac7e50188b12a3
-
SHA256
0e11ca1228cbc474d5f0fd149fd3615d7caeadc4421cd478bb281716958e5a72
-
SHA512
ff9c141437aa1cd6a7176b2943ae1a134be32d5711eb03aee64cad8650b013c0c54895b4de3cb1229fa8bf2b940caac2fabca9e90d99c86075dc57adaecc5094
-
SSDEEP
6144:O34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:OIKp/UWCZdCDh2IZDwAFRpR6Au
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1232-4-0x0000000002530000-0x0000000002531000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral1/memory/1088-1-0x000007FEF7680000-0x000007FEF7726000-memory.dmp dridex_payload behavioral1/memory/1232-15-0x0000000140000000-0x00000001400A6000-memory.dmp dridex_payload behavioral1/memory/1232-23-0x0000000140000000-0x00000001400A6000-memory.dmp dridex_payload behavioral1/memory/1232-34-0x0000000140000000-0x00000001400A6000-memory.dmp dridex_payload behavioral1/memory/1232-35-0x0000000140000000-0x00000001400A6000-memory.dmp dridex_payload behavioral1/memory/1088-43-0x000007FEF7680000-0x000007FEF7726000-memory.dmp dridex_payload behavioral1/memory/3052-53-0x000007FEFA800000-0x000007FEFA8A7000-memory.dmp dridex_payload behavioral1/memory/3052-57-0x000007FEFA800000-0x000007FEFA8A7000-memory.dmp dridex_payload behavioral1/memory/2904-74-0x000007FEFA800000-0x000007FEFA8A7000-memory.dmp dridex_payload behavioral1/memory/2056-90-0x000007FEFA800000-0x000007FEFA8A7000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 3052 TpmInit.exe 2904 iexpress.exe 2056 rdpinit.exe -
Loads dropped DLL 7 IoCs
pid Process 1232 Process not Found 3052 TpmInit.exe 1232 Process not Found 2904 iexpress.exe 1232 Process not Found 2056 rdpinit.exe 1232 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Zoekctxdbskyzr = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\CRLs\\1RBK\\iexpress.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA TpmInit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexpress.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpinit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1088 rundll32.exe 1088 rundll32.exe 1088 rundll32.exe 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 1232 Process not Found 3052 TpmInit.exe 3052 TpmInit.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1232 wrote to memory of 2660 1232 Process not Found 30 PID 1232 wrote to memory of 2660 1232 Process not Found 30 PID 1232 wrote to memory of 2660 1232 Process not Found 30 PID 1232 wrote to memory of 3052 1232 Process not Found 31 PID 1232 wrote to memory of 3052 1232 Process not Found 31 PID 1232 wrote to memory of 3052 1232 Process not Found 31 PID 1232 wrote to memory of 2480 1232 Process not Found 32 PID 1232 wrote to memory of 2480 1232 Process not Found 32 PID 1232 wrote to memory of 2480 1232 Process not Found 32 PID 1232 wrote to memory of 2904 1232 Process not Found 33 PID 1232 wrote to memory of 2904 1232 Process not Found 33 PID 1232 wrote to memory of 2904 1232 Process not Found 33 PID 1232 wrote to memory of 2456 1232 Process not Found 34 PID 1232 wrote to memory of 2456 1232 Process not Found 34 PID 1232 wrote to memory of 2456 1232 Process not Found 34 PID 1232 wrote to memory of 2056 1232 Process not Found 35 PID 1232 wrote to memory of 2056 1232 Process not Found 35 PID 1232 wrote to memory of 2056 1232 Process not Found 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0e11ca1228cbc474d5f0fd149fd3615d7caeadc4421cd478bb281716958e5a72.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1088
-
C:\Windows\system32\TpmInit.exeC:\Windows\system32\TpmInit.exe1⤵PID:2660
-
C:\Users\Admin\AppData\Local\TYbplVMM\TpmInit.exeC:\Users\Admin\AppData\Local\TYbplVMM\TpmInit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:3052
-
C:\Windows\system32\iexpress.exeC:\Windows\system32\iexpress.exe1⤵PID:2480
-
C:\Users\Admin\AppData\Local\zSz06Y\iexpress.exeC:\Users\Admin\AppData\Local\zSz06Y\iexpress.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2904
-
C:\Windows\system32\rdpinit.exeC:\Windows\system32\rdpinit.exe1⤵PID:2456
-
C:\Users\Admin\AppData\Local\VjXNfzi\rdpinit.exeC:\Users\Admin\AppData\Local\VjXNfzi\rdpinit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
668KB
MD51555a3b0161a1a93419e3ebb30bc9608
SHA153a5ee562ed142fa054292fbb8a37ac27b7c6ba7
SHA256f55f514320b5c939e1a2a044394272c5dd83ce5a7f54f0947040586c45ec45fb
SHA5121f09c5a1fc3e87c74c7ec17f2ad52a34d0204293a2d0e75b40e99ba22f79e785dc90f0992a18461d671e97b57cbd1d917b5e32b6917f5c11b7e0867e84c82803
-
Filesize
668KB
MD5a5f43ed3b4e535437230430051696ca7
SHA1471a680c9e5fbc14757778b3e5d39eaa7538d7b9
SHA25688105524eaf93e71e94a5613378a976a69060b39e534e06fd6ab6cc73a3d1c02
SHA512f2967b5eb0d8cf00678b663354e7f07ce30ea53286e1e9cdf3a60d292e38804271e7b08210d6efecf2a2aaafbabc28d6ca557fbe7b8dc670537317c53e8c9379
-
Filesize
174KB
MD5664e12e0ea009cc98c2b578ff4983c62
SHA127b302c0108851ac6cc37e56590dd9074b09c3c9
SHA25600bd9c3c941a5a9b4fc8594d7b985f5f1ac48f0ba7495a728b8fa42b4b48a332
SHA512f5eee4e924dcc3cf5e82eff36543e9d0e9c17dc2272b403cf30f8d2da42312821f5566249a98a952f5441b1f0d6d61a86b5c5198bc598d65ea9d4fb35822505d
-
Filesize
668KB
MD5e1fb2d87818e388ae8e84f5a3f9fa588
SHA12006c19e20a1521aaccf6081a37cc11ed41cb30d
SHA25624fb7105ac0c697fb68db2ab28221a1967d89036cd5b17ac579595d577c5c4d8
SHA5128360476cfab5e6d4f3ccabba310b56d144c5828e1f216ec45227bcf6c4390dc825ef6c2a8121b75123c45754d9248cf1ce8e7e5b728bb172ff131722eb96196e
-
Filesize
163KB
MD546fd16f9b1924a2ea8cd5c6716cc654f
SHA199284bc91cf829e9602b4b95811c1d72977700b6
SHA2569f993a1f6a133fa8375eab99bf1710471dd13ef177ef713acf8921fb4ff565a3
SHA51252c91043f514f3f8ce07f8e60357786eb7236fcf6cdcccca0dd76000b9a23d6b138cebcdec53b01823cb2313ec850fc7bece326ec01d44ed33f4052b789b7629
-
Filesize
916B
MD5c09acd4ab68d7c6891884d0fda59474b
SHA1ac6cca03d49b18f41624eed12ceb89b920711585
SHA25647f8858e9c04ca47d43ea316cce257ea334d8eb4a79b6346058f141d457ec496
SHA5125d67a5f0a6d2a58212b3bd89d046a693afb47962b42ea7a569b4f2fdc0d752847a70c8d6107868681a906bcbd50d5c507765e62361b79f8bbde8d916fc742953
-
Filesize
112KB
MD58b5eb38e08a678afa129e23129ca1e6d
SHA1a27d30bb04f9fabdb5c92d5150661a75c5c7bc42
SHA2564befa614e1b434b2f58c9e7ce947a946b1cf1834b219caeff42b3e36f22fd97c
SHA512a7245cde299c68db85370ae1bdf32a26208e2cda1311afd06b0efd410664f36cafb62bf4b7ce058e203dcc515c45ebdef01543779ead864f3154175b7b36647d