Analysis
-
max time kernel
150s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 05:07
Static task
static1
Behavioral task
behavioral1
Sample
81b6123f37af744dc0f4589543d609eef8d715afd6aa69526d822b9b2843e3dd.dll
Resource
win7-20241010-en
General
-
Target
81b6123f37af744dc0f4589543d609eef8d715afd6aa69526d822b9b2843e3dd.dll
-
Size
944KB
-
MD5
e94305a2d837ad0f083f15a2b86f37d0
-
SHA1
da603e9964396165dd776409d725d88c8150a940
-
SHA256
81b6123f37af744dc0f4589543d609eef8d715afd6aa69526d822b9b2843e3dd
-
SHA512
fbeeb478c17fe57d4a8ba93c8a4a9f552ce6dc45ca6e2e4ff0b007df101167348d191e58f967c9a283b3ed4f4b209ddf534debf8d24f3eca90b0311c55bf70a6
-
SSDEEP
6144:D34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuT3:DIKp/UWCZdCDh2IZDwAFRpR6AuJZK
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3528-3-0x0000000002B50000-0x0000000002B51000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral2/memory/2108-1-0x00007FFAA9390000-0x00007FFAA947C000-memory.dmp dridex_payload behavioral2/memory/3528-16-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral2/memory/3528-24-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral2/memory/3528-35-0x0000000140000000-0x00000001400EC000-memory.dmp dridex_payload behavioral2/memory/2108-38-0x00007FFAA9390000-0x00007FFAA947C000-memory.dmp dridex_payload behavioral2/memory/3756-46-0x00007FFA9A120000-0x00007FFA9A20D000-memory.dmp dridex_payload behavioral2/memory/3756-50-0x00007FFA9A120000-0x00007FFA9A20D000-memory.dmp dridex_payload behavioral2/memory/2800-66-0x00007FFA9A120000-0x00007FFA9A20D000-memory.dmp dridex_payload behavioral2/memory/4012-77-0x00007FFA9A0D0000-0x00007FFA9A202000-memory.dmp dridex_payload behavioral2/memory/4012-81-0x00007FFA9A0D0000-0x00007FFA9A202000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 3756 ApplySettingsTemplateCatalog.exe 2800 SystemPropertiesRemote.exe 4012 SysResetErr.exe -
Loads dropped DLL 3 IoCs
pid Process 3756 ApplySettingsTemplateCatalog.exe 2800 SystemPropertiesRemote.exe 4012 SysResetErr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Gbrhc = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Templates\\LiveContent\\16\\RAExRrCvMY\\SystemPropertiesRemote.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ApplySettingsTemplateCatalog.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesRemote.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SysResetErr.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2108 rundll32.exe 2108 rundll32.exe 2108 rundll32.exe 2108 rundll32.exe 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found 3528 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 3528 Process not Found Token: SeCreatePagefilePrivilege 3528 Process not Found Token: SeShutdownPrivilege 3528 Process not Found Token: SeCreatePagefilePrivilege 3528 Process not Found Token: SeShutdownPrivilege 3528 Process not Found Token: SeCreatePagefilePrivilege 3528 Process not Found Token: SeShutdownPrivilege 3528 Process not Found Token: SeCreatePagefilePrivilege 3528 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3528 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3528 wrote to memory of 3200 3528 Process not Found 99 PID 3528 wrote to memory of 3200 3528 Process not Found 99 PID 3528 wrote to memory of 3756 3528 Process not Found 100 PID 3528 wrote to memory of 3756 3528 Process not Found 100 PID 3528 wrote to memory of 2548 3528 Process not Found 101 PID 3528 wrote to memory of 2548 3528 Process not Found 101 PID 3528 wrote to memory of 2800 3528 Process not Found 102 PID 3528 wrote to memory of 2800 3528 Process not Found 102 PID 3528 wrote to memory of 1848 3528 Process not Found 103 PID 3528 wrote to memory of 1848 3528 Process not Found 103 PID 3528 wrote to memory of 4012 3528 Process not Found 104 PID 3528 wrote to memory of 4012 3528 Process not Found 104 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\81b6123f37af744dc0f4589543d609eef8d715afd6aa69526d822b9b2843e3dd.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2108
-
C:\Windows\system32\ApplySettingsTemplateCatalog.exeC:\Windows\system32\ApplySettingsTemplateCatalog.exe1⤵PID:3200
-
C:\Users\Admin\AppData\Local\DRCERxuem\ApplySettingsTemplateCatalog.exeC:\Users\Admin\AppData\Local\DRCERxuem\ApplySettingsTemplateCatalog.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3756
-
C:\Windows\system32\SystemPropertiesRemote.exeC:\Windows\system32\SystemPropertiesRemote.exe1⤵PID:2548
-
C:\Users\Admin\AppData\Local\y0Z\SystemPropertiesRemote.exeC:\Users\Admin\AppData\Local\y0Z\SystemPropertiesRemote.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2800
-
C:\Windows\system32\SysResetErr.exeC:\Windows\system32\SysResetErr.exe1⤵PID:1848
-
C:\Users\Admin\AppData\Local\9ro\SysResetErr.exeC:\Users\Admin\AppData\Local\9ro\SysResetErr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4012
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5ce06278af0acb04f9a17d74cef8b4128
SHA1afc60bb658665f0d04be4dd6be0dad5514e97a49
SHA2567d6cc3fd5225e6ccfade43e7afba3ddf53c1edd6af4fef55b4f30d4f91ab54e8
SHA512d87c4b3b0cd53c07fce7a2e42902510df57982ed7c99a93a40ca193f7924d7525509bb4da7e48a692b7bd90821ccc6083448140769686796c4bd96da5ded14ab
-
Filesize
41KB
MD5090c6f458d61b7ddbdcfa54e761b8b57
SHA1c5a93e9d6eca4c3842156cc0262933b334113864
SHA256a324e3ba7309164f215645a6db3e74ed35c7034cc07a011ebed2fa60fda4d9cd
SHA512c9ef79397f3a843dcf2bcb5f761d90a4bdadb08e2ca85a35d8668cb13c308b275ed6aa2c8b9194a1f29964e0754ad05e89589025a0b670656386a8d448a1f542
-
Filesize
948KB
MD519dca5d6f6b07669a18df66d261cd13c
SHA1cee811709d5f2262ca07abcd65d7320cf65d95d5
SHA25670d898ddccf5639aa03b8959a2f39aac34ba3d58c9c2885e9d55ee87e5330ddf
SHA512a03d1f1ad7a2771fda675faf5c86929935deb8f06a37c8483ef2a83410a7e65ca91a3b6809b32394ba74b57495b76cf3a70218a5be4bfb7275f5c0b358ccd359
-
Filesize
1.1MB
MD513af41b1c1c53c7360cd582a82ec2093
SHA17425f893d1245e351483ab4a20a5f59d114df4e1
SHA256a462f29efaaa3c30411e76f32608a2ba5b7d21af3b9804e5dda99e342ba8c429
SHA512c7c82acef623d964c520f1a458dbfe34099981de0b781fb56e14b1f82632e3a8437db6434e7c20988aa3b39efde47aab8d188e80845e841a13e74b079285706a
-
Filesize
948KB
MD594d75eeb8ca03e8b22cf5681f55a1fc0
SHA1985474e10c51a61a8eaac51576b8d7b29ceaa624
SHA256ae09e4075e5dc65df769030069d9b9684393ab3448ea50ce320bcf4a57a045be
SHA512b8ce2beeed9ea0f87a5058056082acd8ce4b1f593f163648d9ae15150c3da4a8476b5752a992be032c56f4ecb132979135b7f39bb8e50cda4ea71706cfc62395
-
Filesize
82KB
MD5cdce1ee7f316f249a3c20cc7a0197da9
SHA1dadb23af07827758005ec0235ac1573ffcea0da6
SHA2567984e2bff295c8dbcbd3cd296d0741e3a6844b8db9f962abdbc8d333e9a83932
SHA512f1dc529ebfed814adcf3e68041243ee02ba33b56c356a63eba5ef2cb6ede1eda192e03349f6a200d34dfab67263df79cf295be3706f4197b9008ccdc53410c26
-
Filesize
1KB
MD5b93b0f5472e8ed6ae3ef9b2931447a48
SHA1f9b9d402e8b008a0cd04d754d3dd09a0caaefc3c
SHA256bba676ae95077fa1b6b95e191f709f50d8baec28f12f536022bcac4d8c54d477
SHA512a2f5f05a59349b74c9961e8c8831dff16acf838fda4c4c4cd0a622d4337735890a392dd41d537779a1295f1faab0895adf0e355c07c367836e88f3212a3e9cee