Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 07:26
Static task
static1
Behavioral task
behavioral1
Sample
21351817e1f2f115e543f9034572210fe04fbea47a16922f3957c805671dc25f.dll
Resource
win7-20241010-en
General
-
Target
21351817e1f2f115e543f9034572210fe04fbea47a16922f3957c805671dc25f.dll
-
Size
1.2MB
-
MD5
2a6a4941d8146df58356dd5c72b0478a
-
SHA1
c6f28c746bddcc4e68512911bc99afe0d8f2d3d9
-
SHA256
21351817e1f2f115e543f9034572210fe04fbea47a16922f3957c805671dc25f
-
SHA512
5d36fd395ea33e9a838fca4b5b0a7eabe893fb6e51f39e2aae59ad60c763e6b5bf83e2cedbe9095b74bff682ee300f13c777254e81e4ef724699167f1f5094f9
-
SSDEEP
6144:k34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTP:kIKp/UWCZdCDh2IZDwAFRpR6Au+
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1184-4-0x0000000002D80000-0x0000000002D81000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/1220-0-0x000007FEF6830000-0x000007FEF6963000-memory.dmp dridex_payload behavioral1/memory/1184-18-0x0000000140000000-0x0000000140133000-memory.dmp dridex_payload behavioral1/memory/1184-26-0x0000000140000000-0x0000000140133000-memory.dmp dridex_payload behavioral1/memory/1184-37-0x0000000140000000-0x0000000140133000-memory.dmp dridex_payload behavioral1/memory/1184-38-0x0000000140000000-0x0000000140133000-memory.dmp dridex_payload behavioral1/memory/1220-46-0x000007FEF6830000-0x000007FEF6963000-memory.dmp dridex_payload behavioral1/memory/3012-60-0x000007FEF6EC0000-0x000007FEF6FF4000-memory.dmp dridex_payload behavioral1/memory/3012-55-0x000007FEF6EC0000-0x000007FEF6FF4000-memory.dmp dridex_payload behavioral1/memory/2988-74-0x000007FEF6830000-0x000007FEF6964000-memory.dmp dridex_payload behavioral1/memory/2988-79-0x000007FEF6830000-0x000007FEF6964000-memory.dmp dridex_payload behavioral1/memory/3060-94-0x000007FEF6830000-0x000007FEF6964000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
rdrleakdiag.exeDxpserver.exedwm.exepid process 3012 rdrleakdiag.exe 2988 Dxpserver.exe 3060 dwm.exe -
Loads dropped DLL 7 IoCs
Processes:
rdrleakdiag.exeDxpserver.exedwm.exepid process 1184 3012 rdrleakdiag.exe 1184 2988 Dxpserver.exe 1184 3060 dwm.exe 1184 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2039016743-699959520-214465309-1000\Software\Microsoft\Windows\CurrentVersion\Run\Uuyszikihxbb = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\QUICKL~1\\USERPI~1\\IMPLIC~1\\YIK9DP~1\\DXPSER~1.EXE" -
Processes:
Dxpserver.exedwm.exerundll32.exerdrleakdiag.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dxpserver.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dwm.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdrleakdiag.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1220 rundll32.exe 1220 rundll32.exe 1220 rundll32.exe 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 1184 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1184 wrote to memory of 2704 1184 rdrleakdiag.exe PID 1184 wrote to memory of 2704 1184 rdrleakdiag.exe PID 1184 wrote to memory of 2704 1184 rdrleakdiag.exe PID 1184 wrote to memory of 3012 1184 rdrleakdiag.exe PID 1184 wrote to memory of 3012 1184 rdrleakdiag.exe PID 1184 wrote to memory of 3012 1184 rdrleakdiag.exe PID 1184 wrote to memory of 2576 1184 Dxpserver.exe PID 1184 wrote to memory of 2576 1184 Dxpserver.exe PID 1184 wrote to memory of 2576 1184 Dxpserver.exe PID 1184 wrote to memory of 2988 1184 Dxpserver.exe PID 1184 wrote to memory of 2988 1184 Dxpserver.exe PID 1184 wrote to memory of 2988 1184 Dxpserver.exe PID 1184 wrote to memory of 1244 1184 dwm.exe PID 1184 wrote to memory of 1244 1184 dwm.exe PID 1184 wrote to memory of 1244 1184 dwm.exe PID 1184 wrote to memory of 3060 1184 dwm.exe PID 1184 wrote to memory of 3060 1184 dwm.exe PID 1184 wrote to memory of 3060 1184 dwm.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\21351817e1f2f115e543f9034572210fe04fbea47a16922f3957c805671dc25f.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1220
-
C:\Windows\system32\rdrleakdiag.exeC:\Windows\system32\rdrleakdiag.exe1⤵PID:2704
-
C:\Users\Admin\AppData\Local\cmzes9mLU\rdrleakdiag.exeC:\Users\Admin\AppData\Local\cmzes9mLU\rdrleakdiag.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3012
-
C:\Windows\system32\Dxpserver.exeC:\Windows\system32\Dxpserver.exe1⤵PID:2576
-
C:\Users\Admin\AppData\Local\3VUihcf\Dxpserver.exeC:\Users\Admin\AppData\Local\3VUihcf\Dxpserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2988
-
C:\Windows\system32\dwm.exeC:\Windows\system32\dwm.exe1⤵PID:1244
-
C:\Users\Admin\AppData\Local\e327ddg1\dwm.exeC:\Users\Admin\AppData\Local\e327ddg1\dwm.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD51eedd7d003d4540baee13ba693507c5f
SHA1784c875a220931e037345d8516ef2971de99e6e5
SHA25684b89d28d8ffcdf2b9bacca55b1d3ebe703e573983e8a99cd6a507adbc9fdc22
SHA5125fae9754133616c558fa1d4dab957e619f3f7c41830579c730dd5b8832391051d9e3a4594eb2774543fabc86c4c0f65fe75afb53d75eeb9a5b988bea2a55dbe4
-
Filesize
1.2MB
MD55e5a3571cd628da784e82521bfa7418d
SHA1e8dcda6d0990c0c805cdc81c19054cf3cb3786f7
SHA2562639c0fc4f2939332b23cace6886ddd93ce2d644c98d04aa291c23ecc6908132
SHA512a99c6ed3307611816fd411f873747d5893aec0a3fad647233a2e52b153df4820112fcd4e7a67dc4a79e8ca41958abb5b4caea5a70b1dc42ce097256e450d4660
-
Filesize
1.2MB
MD5eceb0cd4b321f6ab2f5efe42101ef0eb
SHA1dd269e6ac2e3b5f8cabc9bdc94bd3e9d714cf8d5
SHA256dbee9ad55fcd2c9ff31c5e3d96c7882d891bfc7737f639099645aa1a56b1c59e
SHA512013d1b1b6e09954ee67f7ee0e87c112b71e03b61fc246777a803d85f9c306bf89e743f6fcd153b93ad5adaf33eb1771c7c46401085cda6ea0b6cd97a06dcc28d
-
Filesize
1KB
MD5b03459a813839763f7851e38589a594b
SHA1c873643688b7c5d2a8ba96ca5363a60a311fcb09
SHA256c2e367900d2f9e1bb3a384e14e652d85cb499b28814237d21a71c20102b7b97a
SHA512d730af9b3d2af1c6493e2e5aeae48b779085f1d798ebe45364d7e67b3b15c8b0cf977e1fe0e368abbfc0e8a7cd3010bdf66b103af338e788713c9b67c830bae8
-
Filesize
259KB
MD54d38389fb92e43c77a524fd96dbafd21
SHA108014e52f6894cad4f1d1e6fc1a703732e9acd19
SHA256070bc95c486c15d2edc3548ba416dc9565ead401cb03a0472f719fb55ac94e73
SHA51202d8d130cff2b8de15139d309e1cd74a2148bb786fd749e5f22775d45e193b0f75adf40274375cabce33576480ff20456f25172d29a034cd134b8084d40a67ba
-
Filesize
39KB
MD55e058566af53848541fa23fba4bb5b81
SHA1769ce3bfc45e4d56ed01dbeeeca7be22f9b9eed6
SHA256ae83b050fa722da7e4b19fc3d534f0126b1ec055643bb1f267b85b55160f4409
SHA512352029cf0af7583a4c525cfd1da7467446bac410a885b2768d8052f39577ccce85b21d5bd946be6bf8341e7308c8e4f645e4d79232b93aaf6a92d6cd55f598d0
-
Filesize
117KB
MD5f162d5f5e845b9dc352dd1bad8cef1bc
SHA135bc294b7e1f062ef5cb5fa1bd3fc942a3e37ae2
SHA2568a7b7528db30ab123b060d8e41954d95913c07bb40cdae32e97f9edb0baf79c7
SHA5127077e800453a4564a24af022636a2f6547bdae2c9c6f4ed080d0c98415ecc4fbf538109cbebd456e321b9b74a00613d647b63998e31925fbd841fc9d4613e851