Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 00:21
Static task
static1
Behavioral task
behavioral1
Sample
8b32751a6432113ee710babcc5315a8aabf4b5a3647bf15aa345a6e3dd63f086.dll
Resource
win7-20241010-en
General
-
Target
8b32751a6432113ee710babcc5315a8aabf4b5a3647bf15aa345a6e3dd63f086.dll
-
Size
944KB
-
MD5
342cec4e287b2f1285f18c63c01fc5e4
-
SHA1
ba8832830889724887ef7ee003f2a3eed503e4b7
-
SHA256
8b32751a6432113ee710babcc5315a8aabf4b5a3647bf15aa345a6e3dd63f086
-
SHA512
517db6bf9b425716f80afac7f2e6d897c2fecf84adfad35cec156809bcfb634ce4700b17f7d3810b5e9b10bbd784665097d62afa1e81f625b8827ea5e81cdec2
-
SSDEEP
6144:s34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTg:sIKp/UWCZdCDh2IZDwAFRpR6Auk6kK
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3416-3-0x0000000002BF0000-0x0000000002BF1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/5088-1-0x00007FF83B5B0000-0x00007FF83B69C000-memory.dmp dridex_payload behavioral2/memory/3416-16-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral2/memory/3416-24-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral2/memory/3416-36-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral2/memory/5088-38-0x00007FF83B5B0000-0x00007FF83B69C000-memory.dmp dridex_payload behavioral2/memory/1768-54-0x00007FF82C830000-0x00007FF82C91D000-memory.dmp dridex_payload behavioral2/memory/1768-59-0x00007FF82C830000-0x00007FF82C91D000-memory.dmp dridex_payload behavioral2/memory/1004-71-0x00007FF82C1F0000-0x00007FF82C2DD000-memory.dmp dridex_payload behavioral2/memory/1004-75-0x00007FF82C1F0000-0x00007FF82C2DD000-memory.dmp dridex_payload behavioral2/memory/1840-90-0x00007FF82C1F0000-0x00007FF82C2DD000-memory.dmp dridex_payload -
Executes dropped EXE 4 IoCs
Processes:
wermgr.exeie4uinit.exepsr.exesystemreset.exepid process 4460 wermgr.exe 1768 ie4uinit.exe 1004 psr.exe 1840 systemreset.exe -
Loads dropped DLL 4 IoCs
Processes:
ie4uinit.exepsr.exesystemreset.exepid process 1768 ie4uinit.exe 1768 ie4uinit.exe 1004 psr.exe 1840 systemreset.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rrsphmonwo = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\DC\\Collab\\4uCWrBzQm\\psr.exe" -
Processes:
systemreset.exerundll32.exeie4uinit.exepsr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA systemreset.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ie4uinit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA psr.exe -
Modifies registry class 3 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 5088 rundll32.exe 5088 rundll32.exe 5088 rundll32.exe 5088 rundll32.exe 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 -
Suspicious use of AdjustPrivilegeToken 32 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 3416 3416 -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
description pid process target process PID 3416 wrote to memory of 1420 3416 wermgr.exe PID 3416 wrote to memory of 1420 3416 wermgr.exe PID 3416 wrote to memory of 4460 3416 wermgr.exe PID 3416 wrote to memory of 4460 3416 wermgr.exe PID 3416 wrote to memory of 1136 3416 ie4uinit.exe PID 3416 wrote to memory of 1136 3416 ie4uinit.exe PID 3416 wrote to memory of 1768 3416 ie4uinit.exe PID 3416 wrote to memory of 1768 3416 ie4uinit.exe PID 3416 wrote to memory of 4068 3416 psr.exe PID 3416 wrote to memory of 4068 3416 psr.exe PID 3416 wrote to memory of 1004 3416 psr.exe PID 3416 wrote to memory of 1004 3416 psr.exe PID 3416 wrote to memory of 3656 3416 systemreset.exe PID 3416 wrote to memory of 3656 3416 systemreset.exe PID 3416 wrote to memory of 1840 3416 systemreset.exe PID 3416 wrote to memory of 1840 3416 systemreset.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8b32751a6432113ee710babcc5315a8aabf4b5a3647bf15aa345a6e3dd63f086.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:5088
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe1⤵PID:1420
-
C:\Users\Admin\AppData\Local\iDXFUGPP\wermgr.exeC:\Users\Admin\AppData\Local\iDXFUGPP\wermgr.exe1⤵
- Executes dropped EXE
PID:4460
-
C:\Windows\system32\ie4uinit.exeC:\Windows\system32\ie4uinit.exe1⤵PID:1136
-
C:\Users\Admin\AppData\Local\a6l8AIA\ie4uinit.exeC:\Users\Admin\AppData\Local\a6l8AIA\ie4uinit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1768
-
C:\Windows\system32\psr.exeC:\Windows\system32\psr.exe1⤵PID:4068
-
C:\Users\Admin\AppData\Local\rcEQt2X\psr.exeC:\Users\Admin\AppData\Local\rcEQt2X\psr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1004
-
C:\Windows\system32\systemreset.exeC:\Windows\system32\systemreset.exe1⤵PID:3656
-
C:\Users\Admin\AppData\Local\c9plyKAQP\systemreset.exeC:\Users\Admin\AppData\Local\c9plyKAQP\systemreset.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
948KB
MD54aa836fdecbac61911857a48cca63cbe
SHA119fb4561fadb54e06561b6715f24087640ce5f66
SHA2564892accf0cc691197cba5cd98c0ae48900bc0a3f67a0b33a40a79f2f1d285fbd
SHA512e786b1929b9595fa33dbb2dff71accf7903f85a0ab8ed90eee24816b4cc1d6f9af666fc7ad958b0eef37936f296d47587cd27f1d0d08b7922eae454156283fa5
-
Filesize
262KB
MD5a2f0104edd80ca2c24c24356d5eacc4f
SHA18269b9fd9231f04ed47419bd565c69dc677fab56
SHA2565d85c4d62cc26996826b9d96a9153f7e05a2260342bd913b3730610a1809203c
SHA512e7bb87f9f6c82cb945b95f62695be98b3fa827a24fa8c4187fe836d4e7d3e7ae3b95101edd3c41d65f6cb684910f5954a67307d450072acd8d475212db094390
-
Filesize
948KB
MD54342db7f6b7328a816d4aa82c371e272
SHA1cb7992c1a776cf0e8a31e9c887adbc606a4ba039
SHA256695ce141cab63df938d575cb62d13828398439fbba46c5803ae422ef49f9549a
SHA51281d8eb1e2fabff2d3d1d691f9b5ac94b230cec673252c053360811070d794de9fb9e5d0972a70b13aa6e41d9123b31ea990f2793d212a7ec6b10d70738aa9566
-
Filesize
508KB
MD5325ff647506adb89514defdd1c372194
SHA184234ff97d6ddc8a4ea21303ea842aa76a74e0ea
SHA256ebff6159a7627234f94f606afa2e55e98e1548fd197d22779a5fcff24aa477ad
SHA5128a9758f4af0264be08d684125827ef11efe651138059f6b463c52476f8a8e1bed94d093042f85893cb3e37c5f3ba7b55c6ce9394595001e661bccbc578da3868
-
Filesize
223KB
MD5f7991343cf02ed92cb59f394e8b89f1f
SHA1573ad9af63a6a0ab9b209ece518fd582b54cfef5
SHA2561c09759dcd31fdc81bcd6685438d7efb34e0229f1096bfd57d41ecfe614d07dc
SHA512fa3cf314100f5340c7d0f6a70632a308fcadb4b48785753310a053a510169979a89637b8b4fedf4d3690db6b8b55146e323cad70d704c4e2ede4edff5284237d
-
Filesize
948KB
MD54487e481ea2d483a2beca6a3cc2a6790
SHA1b54d5a756c60fa4bd957946d0a40430e1e185908
SHA2564b694bdc737ff9b14a7b91911286b593f363dfe2e3bf1073e0460969037ed97c
SHA5124f6bd21df3497b64abee0b1e5ee7265a8b9c5245304f108c9ef0efdb1b21d692f0560399efe0a8087ecc78697def3c5d07b1f81a9979d6a742dffb63cdfe259b
-
Filesize
232KB
MD5ad53ead5379985081b7c3f1f357e545a
SHA16f5aa32c1d15fbf073558fadafd046d97b60184e
SHA2564f0144f0e3e721b44babbf41b513942e4117f730546105480571f9c8fce56a1f
SHA512433098bd74c34fbadfa447ef45cfa9dc076aef4cf7f2a0a6fe79d5e67f2504eebe8aa31fc1b7a4c5eeb20ede2c5485f75ad0fd77b4ecba3d68ca63313e6f6ea0
-
Filesize
1KB
MD5d476e5b1ef5ebb97012ba6d14dbb1eb0
SHA106ea23a52d9c6a7108b1d8380c8402ede554a900
SHA2563a89c30473f2e431e1c7c38b6a650a1d565ddcbafdfd63f9c6ea85ca72720a0a
SHA51289a0a874bdd871a4d2f417da12d736935812db354a64ce69532b61be8727baf4af9906bb0d257fe1bf9aeb223152cf689cc7562ecaba9116657202febc32cbf7