Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 07:22
Static task
static1
Behavioral task
behavioral1
Sample
21351817e1f2f115e543f9034572210fe04fbea47a16922f3957c805671dc25f.dll
Resource
win7-20240903-en
General
-
Target
21351817e1f2f115e543f9034572210fe04fbea47a16922f3957c805671dc25f.dll
-
Size
1.2MB
-
MD5
2a6a4941d8146df58356dd5c72b0478a
-
SHA1
c6f28c746bddcc4e68512911bc99afe0d8f2d3d9
-
SHA256
21351817e1f2f115e543f9034572210fe04fbea47a16922f3957c805671dc25f
-
SHA512
5d36fd395ea33e9a838fca4b5b0a7eabe893fb6e51f39e2aae59ad60c763e6b5bf83e2cedbe9095b74bff682ee300f13c777254e81e4ef724699167f1f5094f9
-
SSDEEP
6144:k34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTP:kIKp/UWCZdCDh2IZDwAFRpR6Au+
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3408-4-0x0000000002FE0000-0x0000000002FE1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/2412-2-0x00007FFE4E530000-0x00007FFE4E663000-memory.dmp dridex_payload behavioral2/memory/3408-18-0x0000000140000000-0x0000000140133000-memory.dmp dridex_payload behavioral2/memory/3408-26-0x0000000140000000-0x0000000140133000-memory.dmp dridex_payload behavioral2/memory/3408-37-0x0000000140000000-0x0000000140133000-memory.dmp dridex_payload behavioral2/memory/2412-40-0x00007FFE4E530000-0x00007FFE4E663000-memory.dmp dridex_payload behavioral2/memory/4868-48-0x00007FFE445F0000-0x00007FFE44725000-memory.dmp dridex_payload behavioral2/memory/4868-52-0x00007FFE445F0000-0x00007FFE44725000-memory.dmp dridex_payload behavioral2/memory/4716-64-0x00007FFE447A0000-0x00007FFE448D4000-memory.dmp dridex_payload behavioral2/memory/4716-67-0x00007FFE447A0000-0x00007FFE448D4000-memory.dmp dridex_payload behavioral2/memory/4540-84-0x00007FFE447A0000-0x00007FFE448D4000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
sessionmsg.exedxgiadaptercache.exeisoburn.exepid process 4868 sessionmsg.exe 4716 dxgiadaptercache.exe 4540 isoburn.exe -
Loads dropped DLL 4 IoCs
Processes:
sessionmsg.exedxgiadaptercache.exeisoburn.exepid process 4868 sessionmsg.exe 4716 dxgiadaptercache.exe 4716 dxgiadaptercache.exe 4540 isoburn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Tsrvevdpr = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\CRLs\\ZLfhbQ\\dxgiadaptercache.exe" -
Processes:
rundll32.exesessionmsg.exedxgiadaptercache.exeisoburn.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sessionmsg.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dxgiadaptercache.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA isoburn.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2412 rundll32.exe 2412 rundll32.exe 2412 rundll32.exe 2412 rundll32.exe 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 3408 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3408 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3408 wrote to memory of 4656 3408 sessionmsg.exe PID 3408 wrote to memory of 4656 3408 sessionmsg.exe PID 3408 wrote to memory of 4868 3408 sessionmsg.exe PID 3408 wrote to memory of 4868 3408 sessionmsg.exe PID 3408 wrote to memory of 3716 3408 dxgiadaptercache.exe PID 3408 wrote to memory of 3716 3408 dxgiadaptercache.exe PID 3408 wrote to memory of 4716 3408 dxgiadaptercache.exe PID 3408 wrote to memory of 4716 3408 dxgiadaptercache.exe PID 3408 wrote to memory of 2228 3408 isoburn.exe PID 3408 wrote to memory of 2228 3408 isoburn.exe PID 3408 wrote to memory of 4540 3408 isoburn.exe PID 3408 wrote to memory of 4540 3408 isoburn.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21351817e1f2f115e543f9034572210fe04fbea47a16922f3957c805671dc25f.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2412
-
C:\Windows\system32\sessionmsg.exeC:\Windows\system32\sessionmsg.exe1⤵PID:4656
-
C:\Users\Admin\AppData\Local\nAYljZU20\sessionmsg.exeC:\Users\Admin\AppData\Local\nAYljZU20\sessionmsg.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4868
-
C:\Windows\system32\dxgiadaptercache.exeC:\Windows\system32\dxgiadaptercache.exe1⤵PID:3716
-
C:\Users\Admin\AppData\Local\FSRpFNFGR\dxgiadaptercache.exeC:\Users\Admin\AppData\Local\FSRpFNFGR\dxgiadaptercache.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4716
-
C:\Windows\system32\isoburn.exeC:\Windows\system32\isoburn.exe1⤵PID:2228
-
C:\Users\Admin\AppData\Local\l2VIUw\isoburn.exeC:\Users\Admin\AppData\Local\l2VIUw\isoburn.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD566a396e7ca65676d32237de046800285
SHA1c093b3d7dc460bdaa21309c82fba08af7cef2dcc
SHA25653640e64c7d511fefa13ecc4ca80897b24cb598e22896622e67b83a100bb290f
SHA512a77f60b0d09dc20a651e88c828a3b1197c561b39b9b8479eb92f7aa7d2b7c5ca2bb44cf93b3c635248772cc8db8f6d21ad346b00a2fa93161cfcb3337b1b2244
-
Filesize
230KB
MD5e62f89130b7253f7780a862ed9aff294
SHA1b031e64a36e93f95f2061be5b0383069efac2070
SHA2564bea9f741fe4ca9d6262477849896b9fa6377326d11af044561c31bde2d994b5
SHA51205649d38a0b5d825bb8442549427b0ff77b139c9dd297b04d6c0fb1415504c95ed750cd79efea2ff514abfc5d1003e6251a3cd871d352dcea06be0cdeb0304f7
-
Filesize
1.2MB
MD5b8aca36de75b6a2225dd9c71450cc98a
SHA1cde844a9b14419f122a552a9ca85fb843688b122
SHA256a57f94375d3a1f11f6c50f51c1b1cf97104ed20dd43239db6892036a367d64bc
SHA512f660e4df9fceccc96019e16a9ff164476b015c1ecdfaec38fa8e4186bd324456def624b57cd0ee6dd95592419b44e94e1d1493a457d1cb262efd05109b645118
-
Filesize
119KB
MD568078583d028a4873399ae7f25f64bad
SHA1a3c928fe57856a10aed7fee17670627fe663e6fe
SHA2569478c095afe212bce91d2de1a3c3647109f2d54e46b9bf70843e839324458567
SHA51225503a47c53fe83eeb56726b5a5eec5cb01bc783e866306f92242a7a8cbafa20a3209217e0f4561febfec78d2f64f1725727a6b2d3ee6da512618984d0bb0bc1
-
Filesize
1.2MB
MD5501a9393130eebf40e80d97ef6657622
SHA1698781e2a4eecbe3d97c94e6a2e3e207fc0a5ba4
SHA256d832e5d14a9d819305e159576fc66532f38b5cc7111cab474a9a24d3190626c2
SHA5128698e3f7d88696040c0c285bbc322aa8ad51e1aa3744dc43395ae6a95b5cd3127b8d16b0e8090f1819f203f4528e915f6796e759756350378b81296e9af2b67e
-
Filesize
85KB
MD5480f710806b68dfe478ca1ec7d7e79cc
SHA1b4fc97fed2dbff9c4874cb65ede7b50699db37cd
SHA2562416cd4aa577dbb2f8790a61e36fbab2b30bff81a4e1f67a5151c2fec29585bc
SHA51229d3d234ebc45049a533b6a91b246ac043a56b9af67276aaf493b014ae34d73000f99a6b0c0b85d2dfb7fba54811cf8bbdfd167a9eed01a8617b7f05bf2971db
-
Filesize
1KB
MD544f4cb2f7331b85406d261a2a9d346c4
SHA127755b519b0507c2e06ec54273b6876e8d4a2c6c
SHA2560d84bdd7d207421f442d0e1fc9a794d87503233c6c8015dd1a7ac7473310fb2f
SHA512616b405e84454407cbaee2b5667f5ab24697419f99efc6c413710074e07e4621620d966447fa407959f37b920d04c7b367a6b657913ee5ad80f6d748fa88c3e0