Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 00:07
Static task
static1
Behavioral task
behavioral1
Sample
15e232aa5f26fe7ff3ec901f1ce86f8d42e1cab7b455bcb542c16029db6e9cae.dll
Resource
win7-20240903-en
General
-
Target
15e232aa5f26fe7ff3ec901f1ce86f8d42e1cab7b455bcb542c16029db6e9cae.dll
-
Size
668KB
-
MD5
b534ddbf1e179b81850ddc36674a766c
-
SHA1
9cbb409970c10468d338937d8a8e85dbd69b48e8
-
SHA256
15e232aa5f26fe7ff3ec901f1ce86f8d42e1cab7b455bcb542c16029db6e9cae
-
SHA512
8d1e304e6d11509b34f40ab23a8ce2ea4391b5c177388c938cd6e99d22036c80a515cdea95755997cfbacf443b9e1f6bf0b81eec7b7581aee316348a79c32ced
-
SSDEEP
6144:J34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTt:JIKp/UWCZdCDh2IZDwAFRpR6Au
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/1216-4-0x00000000025F0000-0x00000000025F1000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral1/memory/2516-0-0x000007FEF6A20000-0x000007FEF6AC7000-memory.dmp dridex_payload behavioral1/memory/1216-15-0x0000000140000000-0x00000001400A7000-memory.dmp dridex_payload behavioral1/memory/1216-23-0x0000000140000000-0x00000001400A7000-memory.dmp dridex_payload behavioral1/memory/1216-34-0x0000000140000000-0x00000001400A7000-memory.dmp dridex_payload behavioral1/memory/1216-35-0x0000000140000000-0x00000001400A7000-memory.dmp dridex_payload behavioral1/memory/2516-43-0x000007FEF6A20000-0x000007FEF6AC7000-memory.dmp dridex_payload behavioral1/memory/2436-53-0x000007FEF7000000-0x000007FEF70A8000-memory.dmp dridex_payload behavioral1/memory/2436-57-0x000007FEF7000000-0x000007FEF70A8000-memory.dmp dridex_payload behavioral1/memory/2144-69-0x000007FEF7000000-0x000007FEF70AE000-memory.dmp dridex_payload behavioral1/memory/2144-73-0x000007FEF7000000-0x000007FEF70AE000-memory.dmp dridex_payload behavioral1/memory/304-89-0x000007FEF7000000-0x000007FEF70A8000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 2436 osk.exe 2144 msconfig.exe 304 mstsc.exe -
Loads dropped DLL 7 IoCs
pid Process 1216 Process not Found 2436 osk.exe 1216 Process not Found 2144 msconfig.exe 1216 Process not Found 304 mstsc.exe 1216 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rtunysabu = "C:\\Users\\Admin\\AppData\\Roaming\\Identities\\16\\msconfig.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA osk.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mstsc.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2516 rundll32.exe 2516 rundll32.exe 2516 rundll32.exe 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1216 wrote to memory of 2760 1216 Process not Found 31 PID 1216 wrote to memory of 2760 1216 Process not Found 31 PID 1216 wrote to memory of 2760 1216 Process not Found 31 PID 1216 wrote to memory of 2436 1216 Process not Found 32 PID 1216 wrote to memory of 2436 1216 Process not Found 32 PID 1216 wrote to memory of 2436 1216 Process not Found 32 PID 1216 wrote to memory of 2084 1216 Process not Found 33 PID 1216 wrote to memory of 2084 1216 Process not Found 33 PID 1216 wrote to memory of 2084 1216 Process not Found 33 PID 1216 wrote to memory of 2144 1216 Process not Found 34 PID 1216 wrote to memory of 2144 1216 Process not Found 34 PID 1216 wrote to memory of 2144 1216 Process not Found 34 PID 1216 wrote to memory of 536 1216 Process not Found 35 PID 1216 wrote to memory of 536 1216 Process not Found 35 PID 1216 wrote to memory of 536 1216 Process not Found 35 PID 1216 wrote to memory of 304 1216 Process not Found 36 PID 1216 wrote to memory of 304 1216 Process not Found 36 PID 1216 wrote to memory of 304 1216 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\15e232aa5f26fe7ff3ec901f1ce86f8d42e1cab7b455bcb542c16029db6e9cae.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2516
-
C:\Windows\system32\osk.exeC:\Windows\system32\osk.exe1⤵PID:2760
-
C:\Users\Admin\AppData\Local\cTC\osk.exeC:\Users\Admin\AppData\Local\cTC\osk.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2436
-
C:\Windows\system32\msconfig.exeC:\Windows\system32\msconfig.exe1⤵PID:2084
-
C:\Users\Admin\AppData\Local\9xLCnLaI0\msconfig.exeC:\Users\Admin\AppData\Local\9xLCnLaI0\msconfig.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2144
-
C:\Windows\system32\mstsc.exeC:\Windows\system32\mstsc.exe1⤵PID:536
-
C:\Users\Admin\AppData\Local\FZ39\mstsc.exeC:\Users\Admin\AppData\Local\FZ39\mstsc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:304
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
696KB
MD5b7b5018f17d632676528bc5d61578e3d
SHA134038cf07f78b55e96074cf69cb9d195fdc223aa
SHA256a418d9049d65efe269d4e51f151978294a840c12faf478cc4ea770bbaf03491c
SHA5120c0c746235113ed9e8d2a2bb6b04c213cacce2f8302dc03d670b046361f3a87292744b077a496a45c570f1fb2994cee9d98c6d147eb0409597edebbb132f0c73
-
Filesize
672KB
MD541734c2e637545ab0475e2170edffbc1
SHA1b4f6fe538ef018615879f7f19e4e8169cf0e3e20
SHA256e5472bc7285d10af4ef7af55ca949c07c827fc90190af466ba2789b7ce60f371
SHA512a3e1830a8b0093bd5a5d05d9acb24f70652aed3618c2874864401bcfd4866b7ced220ef1cbeb2a1883e3114c107eb335173bc90487a246118e4244c853413085
-
Filesize
672KB
MD5badeeede883e04a657f131ec83c4817e
SHA1d4e2912a256b1a7f6f28e7864aa2f3192b15e554
SHA25671ab345cf62daf1ce257a92971dca626eaf16e24cef151e76b9ecdbfe969ecc3
SHA512ddbd63fdf80bfac1df796a6fcbebe45427aa7456f62d30a8cd07a1a37a09acb560c36c9b3b1cab9a7c9ad60c1dc19be4d6629723df08a619d8d0a02baad3bf4f
-
Filesize
1KB
MD5a1038804d29f1bb7d9fd4a3980bd81ce
SHA164297bbf2f3d8ac7ee2f505698fbb5c377b510fc
SHA256e1477c1bdd56ca377920cbb4fa9b2860d3249a2d2dca7105c1f1267e80b7d95d
SHA512279cf35d05233fc2b8930b18b776bee22b7584439afd79c7f362ea84488dd4c965e4312a8aafcfb476715cbdc03b25524b4e54382a8c60e4bcd0eb1c7968cd7a
-
Filesize
293KB
MD5e19d102baf266f34592f7c742fbfa886
SHA1c9c9c45b7e97bb7a180064d0a1962429f015686d
SHA256f3c8bb430f9c33e6caf06aaebde17b7fddcc55e8bb36cec2b9379038f1fca0b1
SHA5121b9f1880dd3c26ae790b8eead641e73264f90dc7aa2645acc530aad20ad9d247db613e1725282c85bca98c4428ac255752a4f5c9b2a97f90908b7fe4167bb283
-
Filesize
1.1MB
MD550f739538ef014b2e7ec59431749d838
SHA1b439762b8efe8cfb977e7374c11a7e4d8ed05eb3
SHA25685c510c7fa8d64c70886ea01ec99e7b9064594f021a95b4cf88359421e732be3
SHA51202e231ddc4ac012c597b9db42f8a77fbf35ca8253c030d443a0dd4db3d76a9ee1cced600f12d7bb06305e7a4da4a8fda980faad335adcb12738d80d453cb3cc8
-
Filesize
676KB
MD5b918311a8e59fb8ccf613a110024deba
SHA1a9a64a53d2d1c023d058cfe23db4c9b4fbe59d1b
SHA256e1f7612086c2d01f15f2e74f1c22bc6abeb56f18e6bda058edce8d780aebb353
SHA512e3a2480e546bf31509d6e0ffb5ce9dc5da3eb93a1a06d8e89b68165f2dd9ad520edac52af4c485c93fe6028dffaf7fcaadaafb04e524954dd117551afff87cf1