Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-10-2024 07:23
Static task
static1
Behavioral task
behavioral1
Sample
935df89b2b9b8b96959f35ffdf9e2bde46b01560f21c729b00cb4d13e0ff02fd.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
935df89b2b9b8b96959f35ffdf9e2bde46b01560f21c729b00cb4d13e0ff02fd.dll
Resource
win10v2004-20241007-en
General
-
Target
935df89b2b9b8b96959f35ffdf9e2bde46b01560f21c729b00cb4d13e0ff02fd.dll
-
Size
952KB
-
MD5
97a982e24ffe6987e49fd0cb330a17ec
-
SHA1
404d71db7a082078c62ee0811513d80a083f0c39
-
SHA256
935df89b2b9b8b96959f35ffdf9e2bde46b01560f21c729b00cb4d13e0ff02fd
-
SHA512
11fb5562e1f5c5a19fd7ad769be5c786d5abc69105c1dea3d8854aff57e525c9a95bf78c798c43d1665256f128fb714ed25380a970a7c6bba21d2f8709489f31
-
SSDEEP
6144:534xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:5IKp/UWCZdCDh2IZDwAFRpR6Au
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3452-3-0x0000000002BE0000-0x0000000002BE1000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral2/memory/4872-0-0x00007FF9ED1C0000-0x00007FF9ED2AE000-memory.dmp dridex_payload behavioral2/memory/3452-18-0x0000000140000000-0x00000001400EE000-memory.dmp dridex_payload behavioral2/memory/3452-26-0x0000000140000000-0x00000001400EE000-memory.dmp dridex_payload behavioral2/memory/3452-37-0x0000000140000000-0x00000001400EE000-memory.dmp dridex_payload behavioral2/memory/4872-40-0x00007FF9ED1C0000-0x00007FF9ED2AE000-memory.dmp dridex_payload behavioral2/memory/2824-47-0x00007FF9DE140000-0x00007FF9DE274000-memory.dmp dridex_payload behavioral2/memory/2824-52-0x00007FF9DE140000-0x00007FF9DE274000-memory.dmp dridex_payload behavioral2/memory/980-64-0x00007FF9DE190000-0x00007FF9DE27F000-memory.dmp dridex_payload behavioral2/memory/980-68-0x00007FF9DE190000-0x00007FF9DE27F000-memory.dmp dridex_payload behavioral2/memory/4228-79-0x00007FF9DDFE0000-0x00007FF9DE0CF000-memory.dmp dridex_payload behavioral2/memory/4228-83-0x00007FF9DDFE0000-0x00007FF9DE0CF000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 2824 LicensingUI.exe 980 Magnify.exe 4228 sethc.exe -
Loads dropped DLL 3 IoCs
pid Process 2824 LicensingUI.exe 980 Magnify.exe 4228 sethc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Gbrhc = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\QUICKL~1\\USERPI~1\\IMPLIC~1\\ELwR747\\Magnify.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LicensingUI.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Magnify.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sethc.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4872 rundll32.exe 4872 rundll32.exe 4872 rundll32.exe 4872 rundll32.exe 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found 3452 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3452 wrote to memory of 4372 3452 Process not Found 97 PID 3452 wrote to memory of 4372 3452 Process not Found 97 PID 3452 wrote to memory of 2824 3452 Process not Found 99 PID 3452 wrote to memory of 2824 3452 Process not Found 99 PID 3452 wrote to memory of 1984 3452 Process not Found 101 PID 3452 wrote to memory of 1984 3452 Process not Found 101 PID 3452 wrote to memory of 980 3452 Process not Found 102 PID 3452 wrote to memory of 980 3452 Process not Found 102 PID 3452 wrote to memory of 4384 3452 Process not Found 103 PID 3452 wrote to memory of 4384 3452 Process not Found 103 PID 3452 wrote to memory of 4228 3452 Process not Found 104 PID 3452 wrote to memory of 4228 3452 Process not Found 104 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\935df89b2b9b8b96959f35ffdf9e2bde46b01560f21c729b00cb4d13e0ff02fd.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:4872
-
C:\Windows\system32\LicensingUI.exeC:\Windows\system32\LicensingUI.exe1⤵PID:4372
-
C:\Users\Admin\AppData\Local\2dPO4Ai\LicensingUI.exeC:\Users\Admin\AppData\Local\2dPO4Ai\LicensingUI.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2824
-
C:\Windows\system32\Magnify.exeC:\Windows\system32\Magnify.exe1⤵PID:1984
-
C:\Users\Admin\AppData\Local\FFN\Magnify.exeC:\Users\Admin\AppData\Local\FFN\Magnify.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:980
-
C:\Windows\system32\sethc.exeC:\Windows\system32\sethc.exe1⤵PID:4384
-
C:\Users\Admin\AppData\Local\yikC\sethc.exeC:\Users\Admin\AppData\Local\yikC\sethc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4228
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5ba7e807722ef8cb35b531b6e92c5f93a
SHA1512f9f24154fe2f00ba7f82fc9fc08bbd29d1e31
SHA256587252e909d60c2dc8a9fe49295bf4a24f1ef80e62f286125de804f80381ec09
SHA512a8ed2ba5cc1319ca33ed84b90bd56fc1b0e92a0766446122f2d286f206695a0b8b645ce9040a3a70e11d940e8e3333dee834c9df8070b756603d121980d1b3dc
-
Filesize
142KB
MD58b4abc637473c79a003d30bb9c7a05e5
SHA1d1cab953c16d4fdec2b53262f56ac14a914558ca
SHA2560e9eb89aa0df9bb84a8f11b0bb3e9d89905355de34c91508968b4cb78bc3f6c5
SHA5125a40c846c5b3a53ae09114709239d8238c322a7d3758b20ed3fc8e097fc1409f62b4990557c1192e894eabfa89741a9d88bd5175850d039b97dfdf380d1c6eeb
-
Filesize
956KB
MD5608ce8e676f5a6318b926ed0e948fbc2
SHA1adeb3be1f8aeb7f29ee76f0c315a69d1f24f0914
SHA256802fbb538a7d28eee6b3792ffd3ed46a086118f8a8abfd46fe47d011373a603e
SHA5120d96a939ab20fcf5e64b08fe53e95cc6a52369bbe20276ad7e4f27d6f7b868a85fec932c9e7d724a8790786c491ed20ddab50d22fb762aabafbdb7de469ee18b
-
Filesize
639KB
MD54029890c147e3b4c6f41dfb5f9834d42
SHA110d08b3f6dabe8171ca2dd52e5737e3402951c75
SHA25657137f784594793dc0669042ccd3a71ddbfedeb77da6d97173d82613e08add4d
SHA512dbdc60f8692f13c23dbed0b76e9c6758a5b413bd6aaf4e4d0ba74e69c0871eb759da95c3f85a31d972388b545dcf3bb8abbcbedd29a1e7e48c065130b98b893d
-
Filesize
956KB
MD54cdf33f9e13a079710ad303025f9d28e
SHA105427cd2220b6627403ecefdc8c5b9e511a2bab6
SHA25657686654f41edbc6d7a47319863cf2a67c68489fb0511c82812df7d46ad99d46
SHA512b565c6a05ea3dda41b00a6b1c21e1017f0f938a784f106899008cedc82fc35c711d732510fb4c2afcc1d24fd5245eb14008410ae41bf15c1e00bdc14c66e1194
-
Filesize
104KB
MD58ba3a9702a3f1799431cad6a290223a6
SHA19c7dc9b6830297c8f759d1f46c8b36664e26c031
SHA256615b2f2d7e3fce340839a9b54bdc3445eb2333d0fafee477d6113379e90935b8
SHA512680c216d54f4fd2a14f0398e4461c8340ac15acdca75c36a42083625e1081d5e7d262c4c12296b6f21ba2f593f92816edf1c9a0cf4cbee23588e590713b87746
-
Filesize
1KB
MD534ae9b661213282069df8737cdfee35b
SHA102de256a34f76f2ff8f276497babf91c62b9f590
SHA256373f64e78fd69add4db28b1f71d3536974c1fc39392cc113ed2cce831f74a527
SHA512c93795a67e211e4e34e5be1c494867fba14e979a74908e844b7baaa7c6ab61393bf9c3de27747ff9dfa12509bab2eaf3cfeb580ff4ffa9fd6e46f1ac0d7fc5a4