Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-10-2024 21:07
Static task
static1
Behavioral task
behavioral1
Sample
875b2e19f2f6be613a643c4e600e1b822157499ad3b4c62cdf4aeae1666fecc7.dll
Resource
win7-20240903-en
General
-
Target
875b2e19f2f6be613a643c4e600e1b822157499ad3b4c62cdf4aeae1666fecc7.dll
-
Size
688KB
-
MD5
5d441694a83f37144335ccf6cf3ef79b
-
SHA1
089139f16273ec4b133c70e0d8d92348667778b6
-
SHA256
875b2e19f2f6be613a643c4e600e1b822157499ad3b4c62cdf4aeae1666fecc7
-
SHA512
eaabc984daa73b210ffcb1a78f4812b5186d6be9f9e7e19899b98fea0f5f3fb8653d507325020b08215cdcbd7b7cf05f66a8aa78a975a1e6117f62c60446f3f5
-
SSDEEP
12288:Gfndx6M581WsGRouyjzC6gn5l0H1Tak8jnGg/xeq7gz3xfsPEb4sk:odAE81W381Wk8jnYz3dsPEb4s
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1224-4-0x0000000002DE0000-0x0000000002DE1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/2380-1-0x0000000140000000-0x00000001400AC000-memory.dmp dridex_payload behavioral1/memory/1224-24-0x0000000140000000-0x00000001400AC000-memory.dmp dridex_payload behavioral1/memory/1224-35-0x0000000140000000-0x00000001400AC000-memory.dmp dridex_payload behavioral1/memory/1224-36-0x0000000140000000-0x00000001400AC000-memory.dmp dridex_payload behavioral1/memory/2380-44-0x0000000140000000-0x00000001400AC000-memory.dmp dridex_payload behavioral1/memory/2928-54-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral1/memory/2928-58-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral1/memory/3052-75-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral1/memory/1520-91-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
vmicsvc.exeSystemPropertiesAdvanced.exerecdisc.exepid process 2928 vmicsvc.exe 3052 SystemPropertiesAdvanced.exe 1520 recdisc.exe -
Loads dropped DLL 7 IoCs
Processes:
vmicsvc.exeSystemPropertiesAdvanced.exerecdisc.exepid process 1224 2928 vmicsvc.exe 1224 3052 SystemPropertiesAdvanced.exe 1224 1520 recdisc.exe 1224 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Kccgsbu = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\FLASHP~1\\ASSETC~1\\3X4ZXP4S\\gE5fX7wf\\SYSTEM~1.EXE" -
Processes:
rundll32.exevmicsvc.exeSystemPropertiesAdvanced.exerecdisc.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA vmicsvc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesAdvanced.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA recdisc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2380 rundll32.exe 2380 rundll32.exe 2380 rundll32.exe 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1224 wrote to memory of 2720 1224 vmicsvc.exe PID 1224 wrote to memory of 2720 1224 vmicsvc.exe PID 1224 wrote to memory of 2720 1224 vmicsvc.exe PID 1224 wrote to memory of 2928 1224 vmicsvc.exe PID 1224 wrote to memory of 2928 1224 vmicsvc.exe PID 1224 wrote to memory of 2928 1224 vmicsvc.exe PID 1224 wrote to memory of 2708 1224 SystemPropertiesAdvanced.exe PID 1224 wrote to memory of 2708 1224 SystemPropertiesAdvanced.exe PID 1224 wrote to memory of 2708 1224 SystemPropertiesAdvanced.exe PID 1224 wrote to memory of 3052 1224 SystemPropertiesAdvanced.exe PID 1224 wrote to memory of 3052 1224 SystemPropertiesAdvanced.exe PID 1224 wrote to memory of 3052 1224 SystemPropertiesAdvanced.exe PID 1224 wrote to memory of 676 1224 recdisc.exe PID 1224 wrote to memory of 676 1224 recdisc.exe PID 1224 wrote to memory of 676 1224 recdisc.exe PID 1224 wrote to memory of 1520 1224 recdisc.exe PID 1224 wrote to memory of 1520 1224 recdisc.exe PID 1224 wrote to memory of 1520 1224 recdisc.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\875b2e19f2f6be613a643c4e600e1b822157499ad3b4c62cdf4aeae1666fecc7.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
C:\Windows\system32\vmicsvc.exeC:\Windows\system32\vmicsvc.exe1⤵PID:2720
-
C:\Users\Admin\AppData\Local\0TjMUacA\vmicsvc.exeC:\Users\Admin\AppData\Local\0TjMUacA\vmicsvc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2928
-
C:\Windows\system32\SystemPropertiesAdvanced.exeC:\Windows\system32\SystemPropertiesAdvanced.exe1⤵PID:2708
-
C:\Users\Admin\AppData\Local\5r7q6lu\SystemPropertiesAdvanced.exeC:\Users\Admin\AppData\Local\5r7q6lu\SystemPropertiesAdvanced.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3052
-
C:\Windows\system32\recdisc.exeC:\Windows\system32\recdisc.exe1⤵PID:676
-
C:\Users\Admin\AppData\Local\1f1rbU9Bi\recdisc.exeC:\Users\Admin\AppData\Local\1f1rbU9Bi\recdisc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1520
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
692KB
MD5b771f5ef2b8dd8fc435346657595739d
SHA1fd7fa23c1ca82cc1c65ed40a3f3ce7b629375a30
SHA2564da7ce7c6e6fb12feeab75592daf63ce9b7fdabb8d78e83e1441265e6f48fbca
SHA512ac35c974beca9f307bb160c26357bd9bb1c30b165466d8a8dd42fc40e32d42e6bfaf527641131e1d6a80cb65770d7f08272cee7dd040aceda34a1188475b75f9
-
Filesize
692KB
MD5959195006d77f630911950d7f12140ac
SHA1d52867f4fdfa2d94d62545202cd4718cc38100ad
SHA2568f54a4516bf43e042b93ef476e8b16d5b0c3a8dcc1671fe91bf9707e1a472226
SHA5126b82aa291e441e45b5134b4134d434a46e7f8a1ec506c1ef39794e95af628c1f60d88892505e566d083dea7364ff50f525976246a371e55e08d29990bf7c2d62
-
Filesize
692KB
MD5f272f1332b44a193ad9fc753647c3a81
SHA16f33b71b4e2ed9e4cb1e3773ad8ca4a6d9906004
SHA256dec79b15b6ed5cc97f30f249482d83c0ddba602f423d2fac41eb0abdf6edf0e2
SHA5124f822e4f8753a39695d2d4171dee8798300ea8dd7d6887e444ea2787ae04be5eeec3072191af9c862f2dce0e03af7f4462fd07adf50efbd9508360676248af26
-
Filesize
1KB
MD566f54bd2e356eeca6780bc1937b084df
SHA129a707dd93ba12f4a27d5011d623a86e701fffca
SHA256a1c9e74a82624bacfec1dd2d7cbf6b0abd8f9bc1367ce26c2006620319729ffd
SHA512e34968a29ebccf9ac6691bb94b5db9d444bc50f40ad0f455b4fb9819f5b7f8bd4dac4f53f77d1545ab70b1391b4d7350a03ded75b8f36406d40a0f6945dce93f
-
Filesize
238KB
MD579e14b291ca96a02f1eb22bd721deccd
SHA14c8dbff611acd8a92cd2280239f78bebd2a9947e
SHA256d829166db30923406a025bf33d6a0997be0a3df950114d1f34547a9525b749e8
SHA512f3d1fa7732b6b027bbaf22530331d27ede85f92c9fd64f940139fd262bd7468211a8a54c835d3934b1974b3d8ecddefa79ea77901b9ef49ab36069963693f988
-
Filesize
232KB
MD5f3b306179f1840c0813dc6771b018358
SHA1dec7ce3c13f7a684cb52ae6007c99cf03afef005
SHA256dcaeb590394b42d180e23e3cef4dd135513395b026e0ed489aec49848b85b8f0
SHA5129f9ec4c2ca6373bd738bf415d059f3536390e46e5b0a560e9ee1b190407a6d0f481c38664c51b834a9e72d8878f71c3c19e427e3a6b5ca4ec6b02d1156eb9ef4
-
Filesize
80KB
MD525dc1e599591871c074a68708206e734
SHA127a9dffa92d979d39c07d889fada536c062dac77
SHA256a13b2ba5892c11c731869410b1e3dd2f250d70ff9efd513a9f260ab506dd42ef
SHA512f7da9ce4c3e8aea9095fcc977084c042f85df48fca0b58fb136dfd835ce69b5b1e68f3c11eeb14c617ffcec7011ffc7e5d5a948f49dde653a2348b28e10adb72