Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2024 21:07
Static task
static1
Behavioral task
behavioral1
Sample
384e3ceb6e99ca5fd18c7acad5e19854eb15dfeee39eddef8635d2b65be15901.dll
Resource
win7-20240903-en
General
-
Target
384e3ceb6e99ca5fd18c7acad5e19854eb15dfeee39eddef8635d2b65be15901.dll
-
Size
684KB
-
MD5
25f805609c924aa76767968ad908ffcb
-
SHA1
191c36a856126af5946e9de9cea3a7cca9d8a961
-
SHA256
384e3ceb6e99ca5fd18c7acad5e19854eb15dfeee39eddef8635d2b65be15901
-
SHA512
334526e7f8b539fc079c1a8fc2b75ad0639f9149eb55651cbda11a2f7be30f9f1de8fe7882aca33d5f906c3a38b8fb17b68ad3b5282c1fa4339fb0f97656328d
-
SSDEEP
12288:/fndx6M581WsGRouyjzC6gn5l0H1Tak8jnGg/xeq7gz3xfsPEb4sk:3dAE81W381Wk8jnYz3dsPEb4s
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3520-3-0x00000000029E0000-0x00000000029E1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/4068-1-0x0000000140000000-0x00000001400AB000-memory.dmp dridex_payload behavioral2/memory/3520-34-0x0000000140000000-0x00000001400AB000-memory.dmp dridex_payload behavioral2/memory/3520-23-0x0000000140000000-0x00000001400AB000-memory.dmp dridex_payload behavioral2/memory/4068-37-0x0000000140000000-0x00000001400AB000-memory.dmp dridex_payload behavioral2/memory/4960-46-0x0000000140000000-0x00000001400B2000-memory.dmp dridex_payload behavioral2/memory/4960-48-0x0000000140000000-0x00000001400B2000-memory.dmp dridex_payload behavioral2/memory/2784-58-0x0000000140000000-0x00000001400F1000-memory.dmp dridex_payload behavioral2/memory/2784-62-0x0000000140000000-0x00000001400F1000-memory.dmp dridex_payload behavioral2/memory/4148-73-0x0000000140000000-0x00000001400AC000-memory.dmp dridex_payload behavioral2/memory/4148-77-0x0000000140000000-0x00000001400AC000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
mspaint.exeLicensingUI.exetabcal.exepid process 4960 mspaint.exe 2784 LicensingUI.exe 4148 tabcal.exe -
Loads dropped DLL 3 IoCs
Processes:
mspaint.exeLicensingUI.exetabcal.exepid process 4960 mspaint.exe 2784 LicensingUI.exe 4148 tabcal.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Husvxt = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\ACCESS~1\\L3CJLY~1\\LICENS~1.EXE" -
Processes:
rundll32.exemspaint.exeLicensingUI.exetabcal.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mspaint.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LicensingUI.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tabcal.exe -
Modifies registry class 1 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 4068 rundll32.exe 4068 rundll32.exe 4068 rundll32.exe 4068 rundll32.exe 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 3520 -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3520 Token: SeCreatePagefilePrivilege 3520 Token: SeShutdownPrivilege 3520 Token: SeCreatePagefilePrivilege 3520 Token: SeShutdownPrivilege 3520 Token: SeCreatePagefilePrivilege 3520 Token: SeShutdownPrivilege 3520 Token: SeCreatePagefilePrivilege 3520 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 3520 3520 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3520 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3520 wrote to memory of 3548 3520 mspaint.exe PID 3520 wrote to memory of 3548 3520 mspaint.exe PID 3520 wrote to memory of 4960 3520 mspaint.exe PID 3520 wrote to memory of 4960 3520 mspaint.exe PID 3520 wrote to memory of 4028 3520 LicensingUI.exe PID 3520 wrote to memory of 4028 3520 LicensingUI.exe PID 3520 wrote to memory of 2784 3520 LicensingUI.exe PID 3520 wrote to memory of 2784 3520 LicensingUI.exe PID 3520 wrote to memory of 3872 3520 tabcal.exe PID 3520 wrote to memory of 3872 3520 tabcal.exe PID 3520 wrote to memory of 4148 3520 tabcal.exe PID 3520 wrote to memory of 4148 3520 tabcal.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\384e3ceb6e99ca5fd18c7acad5e19854eb15dfeee39eddef8635d2b65be15901.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:4068
-
C:\Windows\system32\mspaint.exeC:\Windows\system32\mspaint.exe1⤵PID:3548
-
C:\Users\Admin\AppData\Local\9gVcg\mspaint.exeC:\Users\Admin\AppData\Local\9gVcg\mspaint.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4960
-
C:\Windows\system32\LicensingUI.exeC:\Windows\system32\LicensingUI.exe1⤵PID:4028
-
C:\Users\Admin\AppData\Local\jnw3qeiw\LicensingUI.exeC:\Users\Admin\AppData\Local\jnw3qeiw\LicensingUI.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2784
-
C:\Windows\system32\tabcal.exeC:\Windows\system32\tabcal.exe1⤵PID:3872
-
C:\Users\Admin\AppData\Local\DTV\tabcal.exeC:\Users\Admin\AppData\Local\DTV\tabcal.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4148
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
712KB
MD5c6c32b906dd4c78eb9e47c7826ee49c8
SHA15ba01a2b1d5899d191a53379fdd1558a01c7f403
SHA256b761ce56d1c21445d1ce06bbc0d5ba84de81dc5f713cc3b2f7c8acec79190074
SHA512edfe206a2c4f2d696c2a9a08f6633acd8aa6dd052bbdd8e09a3d8524b7aea9e5967a6fd284dad99aecc4b3ced0dfa1566b2f17377a7b4485bf8a6e438f016cd8
-
Filesize
965KB
MD5f221a4ccafec690101c59f726c95b646
SHA12098e4b62eaab213cbee73ba40fe4f1b8901a782
SHA25694aa32a2c9c1d2db78318d9c68262c2f834abe26b6e9a661700324b55fdd5709
SHA5128e3f4e4f68565ef09f5e762d6bb41b160711bbacac9dfcbe33edea9885fd042e6ce9a248bfcc62f9cffdb8e6bbe1b04c89bd41fcd9a373a5c8bc7bbff96dceaf
-
Filesize
688KB
MD5a39748296665792f12e48c9f2a5f5829
SHA1412dc463cdaf416d02e32cf34fa4d1a1cc367fab
SHA256a458a39b59dd1fc6a0bacd3294aa820fe32daab4629a0b3a7a2e831563bcb2a3
SHA512eb99e606785fcf236dbdd5b1b62067f327ae6cec1517f975fff2bd2e11c385859cbfb8b05c19fae53c3b67473145b886d0cd4d0529a0265e3212e62b8c201d59
-
Filesize
84KB
MD540f4014416ff0cbf92a9509f67a69754
SHA11798ff7324724a32c810e2075b11c09b41e4fede
SHA256f31b4c751dbca276446119ba775787c3eb032da72eabcd40ad96a55826a3f33c
SHA512646dfe4cfe90d068c3da4c35f7053bb0f57687875a0f3469c0683e707306e6a42b0baca3e944d78f9be5c564bb0600202c32c223a770f89d3e2b07a24673c259
-
Filesize
964KB
MD59ce5743c0b6032ff5761dfe92b4280bc
SHA12ff09343f3ebf2015fbcf2f38cb21fa90198e001
SHA256928356bd67c137032c42316d6b40c1796a2a1dc9fda53d9a63776245c4449767
SHA512ab300e9dbe43834a67ee80dbe1c7563799850a9dd8e96bc9b471ebec4d66b691cc84811a09c3fa3e2d3b96871afbfbac3cf2d7688a03d9de714b790832e52291
-
Filesize
142KB
MD58b4abc637473c79a003d30bb9c7a05e5
SHA1d1cab953c16d4fdec2b53262f56ac14a914558ca
SHA2560e9eb89aa0df9bb84a8f11b0bb3e9d89905355de34c91508968b4cb78bc3f6c5
SHA5125a40c846c5b3a53ae09114709239d8238c322a7d3758b20ed3fc8e097fc1409f62b4990557c1192e894eabfa89741a9d88bd5175850d039b97dfdf380d1c6eeb
-
Filesize
1KB
MD58d95c653534b2ae30015215d7fd38281
SHA1a02a03ab5c08e1471745dab2ec721b535f44d2c5
SHA2563f82e2bd4ad71b193b0eaa619db0fe9af9bd53c7e39ec074e3987bcb68389fc3
SHA5120625580fec59b598e7a8bc42cd07efd0ee6d70f0cdca12c85684a461602bc3f2e0db70dc917eda9379367006a918c631ed66d8cd1e5a2491350b9394d595347f