Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 05:07
Static task
static1
Behavioral task
behavioral1
Sample
d616010470e5a7f7633e4f505709437b4d672312c57ab1724f3339bbc5acc727.dll
Resource
win7-20241010-en
General
-
Target
d616010470e5a7f7633e4f505709437b4d672312c57ab1724f3339bbc5acc727.dll
-
Size
664KB
-
MD5
192f752bbdcb5e33312abe8fd40eb318
-
SHA1
efaccfee37c0fa32a1b45b156ad4e65a33bab91e
-
SHA256
d616010470e5a7f7633e4f505709437b4d672312c57ab1724f3339bbc5acc727
-
SHA512
0ed59a18735e566cc458b3c3dd27d07fa62d1ec55f67ea3e9f8779ac0ce7373da046ed4dc7b4420d33ec6e810b317f56317b8ba4861825221a2b4ed54cfc9f0e
-
SSDEEP
6144:W34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:WIKp/UWCZdCDh2IZDwAFRpR6Au
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3588-3-0x0000000002DE0000-0x0000000002DE1000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral2/memory/2508-1-0x00007FFC1D2F0000-0x00007FFC1D396000-memory.dmp dridex_payload behavioral2/memory/3588-15-0x0000000140000000-0x00000001400A6000-memory.dmp dridex_payload behavioral2/memory/3588-23-0x0000000140000000-0x00000001400A6000-memory.dmp dridex_payload behavioral2/memory/3588-34-0x0000000140000000-0x00000001400A6000-memory.dmp dridex_payload behavioral2/memory/2508-37-0x00007FFC1D2F0000-0x00007FFC1D396000-memory.dmp dridex_payload behavioral2/memory/2308-44-0x00007FFC1C630000-0x00007FFC1C6D7000-memory.dmp dridex_payload behavioral2/memory/2308-49-0x00007FFC1C630000-0x00007FFC1C6D7000-memory.dmp dridex_payload behavioral2/memory/1364-65-0x00007FFC1C630000-0x00007FFC1C6D7000-memory.dmp dridex_payload behavioral2/memory/1568-80-0x00007FFC1C630000-0x00007FFC1C6D7000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 2308 quickassist.exe 1364 SystemPropertiesPerformance.exe 1568 CustomShellHost.exe -
Loads dropped DLL 3 IoCs
pid Process 2308 quickassist.exe 1364 SystemPropertiesPerformance.exe 1568 CustomShellHost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Nzvdnevrdk = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\TEMPLA~1\\LIVECO~1\\16\\User\\DOCUME~1\\95H\\SYSTEM~1.EXE" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA quickassist.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesPerformance.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CustomShellHost.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2508 regsvr32.exe 2508 regsvr32.exe 2508 regsvr32.exe 2508 regsvr32.exe 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found 3588 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 3588 Process not Found Token: SeCreatePagefilePrivilege 3588 Process not Found Token: SeShutdownPrivilege 3588 Process not Found Token: SeCreatePagefilePrivilege 3588 Process not Found Token: SeShutdownPrivilege 3588 Process not Found Token: SeCreatePagefilePrivilege 3588 Process not Found Token: SeShutdownPrivilege 3588 Process not Found Token: SeCreatePagefilePrivilege 3588 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3588 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3588 wrote to memory of 1928 3588 Process not Found 94 PID 3588 wrote to memory of 1928 3588 Process not Found 94 PID 3588 wrote to memory of 2308 3588 Process not Found 95 PID 3588 wrote to memory of 2308 3588 Process not Found 95 PID 3588 wrote to memory of 1840 3588 Process not Found 96 PID 3588 wrote to memory of 1840 3588 Process not Found 96 PID 3588 wrote to memory of 1364 3588 Process not Found 97 PID 3588 wrote to memory of 1364 3588 Process not Found 97 PID 3588 wrote to memory of 1872 3588 Process not Found 98 PID 3588 wrote to memory of 1872 3588 Process not Found 98 PID 3588 wrote to memory of 1568 3588 Process not Found 99 PID 3588 wrote to memory of 1568 3588 Process not Found 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\d616010470e5a7f7633e4f505709437b4d672312c57ab1724f3339bbc5acc727.dll1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2508
-
C:\Windows\system32\quickassist.exeC:\Windows\system32\quickassist.exe1⤵PID:1928
-
C:\Users\Admin\AppData\Local\CRMVG9\quickassist.exeC:\Users\Admin\AppData\Local\CRMVG9\quickassist.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2308
-
C:\Windows\system32\SystemPropertiesPerformance.exeC:\Windows\system32\SystemPropertiesPerformance.exe1⤵PID:1840
-
C:\Users\Admin\AppData\Local\8sxUk0\SystemPropertiesPerformance.exeC:\Users\Admin\AppData\Local\8sxUk0\SystemPropertiesPerformance.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1364
-
C:\Windows\system32\CustomShellHost.exeC:\Windows\system32\CustomShellHost.exe1⤵PID:1872
-
C:\Users\Admin\AppData\Local\ymQn7\CustomShellHost.exeC:\Users\Admin\AppData\Local\ymQn7\CustomShellHost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
668KB
MD55ff12cc40d005f3c35f536df50e88374
SHA131533555517f78fbc812d42113ee9a9f6650c7c0
SHA2565cf790e6a7054e1d4c434b64a0b2f9e1b260539bfc0476f2979ad08d54f5ead1
SHA51219a4546cbf956517fade8dd01d2de0e74b323e373198951fe7450ce6360fe7ac95de2eb8a5bd5f29e4ffe52f9675c25aab448702c16ad866846e35d4e53a5b4a
-
Filesize
82KB
MD5e4fbf7cab8669c7c9cef92205d2f2ffc
SHA1adbfa782b7998720fa85678cc85863b961975e28
SHA256b266318d45a4245556a2e39b763f2f11eca780969105f6f103e53dd0a492bb30
SHA512c5c62578d04133352d6cb7b018df96a7b55c18d6111ab8bf2bfe232a3315a63b07047fa5b0b88551d152085776c66169b47566242c8c4c5e0333c55adc64e1b6
-
Filesize
668KB
MD5cf781471e004751825576fd4d6d5a85f
SHA1795d4eb8e6c900db73bbd6cc7906e7172f49380c
SHA256e55fdf4c4b5cf1f2ce7c77a7be47ab5e88408b86982944ae1cb8f29e9c3a33b3
SHA512b076a3a2daff193d048088774bfef7f3504fb79b23c63e684d42d72367bd44a494aeb3f119520e18546cc8c233699c6124161239b509572080eb9d5c04ce4cae
-
Filesize
665KB
MD5d1216f9b9a64fd943539cc2b0ddfa439
SHA16fad9aeb7780bdfd88a9a5a73b35b3e843605e6c
SHA256c1e8fda00da574e8759ba262d76b6edc1d5f4a80620730ef0be7527e0d803db2
SHA512c5fd7d81d1d478056fcbed0ba887ce551832f0104e7c31753c3c8760b4d63f38324f74e996684042acc8f9682fce8a8c85172741a868257e87d5e0f988c4e567
-
Filesize
835KB
MD570400e78b71bc8efdd063570428ae531
SHA1cd86ecd008914fdd0389ac2dc00fe92d87746096
SHA25691333f3282a2420359ae9d3adf537688741d21e964f021e2b152ab293447f289
SHA51253005dda237fb23af79f54779c74a09835ad4cad3ca7b9dcec80e3793a60dd262f45b910bef96ab9c8e69d0c6990fea6ca5fee85d7f8425db523ae658372959e
-
Filesize
668KB
MD5563cad7fee33742226155bf432ceede3
SHA1562bfba1e756e7cd71bca79ebe5dd5f6978d2e8e
SHA2565b89c86a45fda420afe85b17f5a56288a7d913a192b1afe57efeb2db9fd0cd5c
SHA512c077326f0c4a186f4eec395fc218e4ba8fba6871bff0045167334aeb2616123f8a64e8d589eaf4fa595b1a2e6fb8ba5d73b9fa21df2e3bca1e5a2fa60913dc87
-
Filesize
1KB
MD51557840b6b2a4009d47fbee5fc3d1778
SHA1dcb8a3804dba9496986c352f92e8c5c03fcbf584
SHA256c04e6e92c3208bd7421a3d4c0f2e79646ee00407c88cd281e8405a7595b5619d
SHA5120bcd4e739c0e06a0f1ae5f1c018c9c49cfcf1bc7d6e88dc7b5c6ba4166629fe2a6c860642ce3a311e6c9501b2772cc60872e08edafe6e4d33a108cc1f5b583a4