Analysis
-
max time kernel
149s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2024 21:07
Static task
static1
Behavioral task
behavioral1
Sample
875b2e19f2f6be613a643c4e600e1b822157499ad3b4c62cdf4aeae1666fecc7.dll
Resource
win7-20240903-en
General
-
Target
875b2e19f2f6be613a643c4e600e1b822157499ad3b4c62cdf4aeae1666fecc7.dll
-
Size
688KB
-
MD5
5d441694a83f37144335ccf6cf3ef79b
-
SHA1
089139f16273ec4b133c70e0d8d92348667778b6
-
SHA256
875b2e19f2f6be613a643c4e600e1b822157499ad3b4c62cdf4aeae1666fecc7
-
SHA512
eaabc984daa73b210ffcb1a78f4812b5186d6be9f9e7e19899b98fea0f5f3fb8653d507325020b08215cdcbd7b7cf05f66a8aa78a975a1e6117f62c60446f3f5
-
SSDEEP
12288:Gfndx6M581WsGRouyjzC6gn5l0H1Tak8jnGg/xeq7gz3xfsPEb4sk:odAE81W381Wk8jnYz3dsPEb4s
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3340-3-0x0000000003100000-0x0000000003101000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/1124-0-0x0000000140000000-0x00000001400AC000-memory.dmp dridex_payload behavioral2/memory/3340-24-0x0000000140000000-0x00000001400AC000-memory.dmp dridex_payload behavioral2/memory/3340-35-0x0000000140000000-0x00000001400AC000-memory.dmp dridex_payload behavioral2/memory/1124-38-0x0000000140000000-0x00000001400AC000-memory.dmp dridex_payload behavioral2/memory/1772-46-0x0000000140000000-0x00000001400F2000-memory.dmp dridex_payload behavioral2/memory/1772-50-0x0000000140000000-0x00000001400F2000-memory.dmp dridex_payload behavioral2/memory/4008-61-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral2/memory/4008-66-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral2/memory/2540-81-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
bdechangepin.exemsra.exeBitLockerWizard.exepid process 1772 bdechangepin.exe 4008 msra.exe 2540 BitLockerWizard.exe -
Loads dropped DLL 3 IoCs
Processes:
bdechangepin.exemsra.exeBitLockerWizard.exepid process 1772 bdechangepin.exe 4008 msra.exe 2540 BitLockerWizard.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Fzrdqelbmr = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\ADMINI~1\\FQ4gjLBr\\msra.exe" -
Processes:
rundll32.exebdechangepin.exemsra.exeBitLockerWizard.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bdechangepin.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msra.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizard.exe -
Modifies registry class 1 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1124 rundll32.exe 1124 rundll32.exe 1124 rundll32.exe 1124 rundll32.exe 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 3340 -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3340 Token: SeCreatePagefilePrivilege 3340 Token: SeShutdownPrivilege 3340 Token: SeCreatePagefilePrivilege 3340 Token: SeShutdownPrivilege 3340 Token: SeCreatePagefilePrivilege 3340 Token: SeShutdownPrivilege 3340 Token: SeCreatePagefilePrivilege 3340 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 3340 3340 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3340 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3340 wrote to memory of 4848 3340 bdechangepin.exe PID 3340 wrote to memory of 4848 3340 bdechangepin.exe PID 3340 wrote to memory of 1772 3340 bdechangepin.exe PID 3340 wrote to memory of 1772 3340 bdechangepin.exe PID 3340 wrote to memory of 1120 3340 msra.exe PID 3340 wrote to memory of 1120 3340 msra.exe PID 3340 wrote to memory of 4008 3340 msra.exe PID 3340 wrote to memory of 4008 3340 msra.exe PID 3340 wrote to memory of 3424 3340 BitLockerWizard.exe PID 3340 wrote to memory of 3424 3340 BitLockerWizard.exe PID 3340 wrote to memory of 2540 3340 BitLockerWizard.exe PID 3340 wrote to memory of 2540 3340 BitLockerWizard.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\875b2e19f2f6be613a643c4e600e1b822157499ad3b4c62cdf4aeae1666fecc7.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1124
-
C:\Windows\system32\bdechangepin.exeC:\Windows\system32\bdechangepin.exe1⤵PID:4848
-
C:\Users\Admin\AppData\Local\IFUQ1mJ\bdechangepin.exeC:\Users\Admin\AppData\Local\IFUQ1mJ\bdechangepin.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1772
-
C:\Windows\system32\msra.exeC:\Windows\system32\msra.exe1⤵PID:1120
-
C:\Users\Admin\AppData\Local\lsP\msra.exeC:\Users\Admin\AppData\Local\lsP\msra.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4008
-
C:\Windows\system32\BitLockerWizard.exeC:\Windows\system32\BitLockerWizard.exe1⤵PID:3424
-
C:\Users\Admin\AppData\Local\NCEK5sc\BitLockerWizard.exeC:\Users\Admin\AppData\Local\NCEK5sc\BitLockerWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
968KB
MD5cbf8fe6d89d4e71036c3db80d51d65fe
SHA19762cb28bb7791b4811af99ccf720906fa25efa4
SHA25613474a7dde0df4d4a53079be58b3ba3418df1a72716bd236d3a0bb1b1e72e42b
SHA5123436cda983c0865011c1e5f8fb7a3400010f947ad93e701597bd80a44179bbe8d76d6fa5cf493ab9a60ad461dab59e6b33f7a2bf183af222b59def289d5bf9f1
-
Filesize
373KB
MD5601a28eb2d845d729ddd7330cbae6fd6
SHA15cf9f6f9135c903d42a7756c638333db8621e642
SHA2564d43f37576a0ebbaf97024cd5597d968ffe59c871b483554aea302dccb7253f6
SHA5121687044612ceb705f79c806b176f885fd01449251b0097c2df70280b7d10a2b830ee30ac0f645a7e8d8067892f6562d933624de694295e22318863260222859d
-
Filesize
100KB
MD56d30c96f29f64b34bc98e4c81d9b0ee8
SHA14a3adc355f02b9c69bdbe391bfb01469dee15cf0
SHA2567758227642702e645af5e84d1c0e5690e07687c8209072a2c5f79379299edf74
SHA51225471b0ac7156d9ee9d12181020039bf551ba3efe252b656030c12d93b8db2648a18bdf762740f2a5cd8e43640e4bd4e8742310dea15823fc76b9e1c126876b8
-
Filesize
692KB
MD542f67c0a0ab128466836462310a2637e
SHA1415297d71c57f3d7e24909ae5f5783d2532935af
SHA256d6776891f6038f00ddd5d2b1671306ee9374f8c97ef737a2ce50e45afad3b1e7
SHA512b8573670045f9b70d225b1c2f4d754627fc1214be5b5c7a4ab0c5c8e943377f0a8d56291586c226dcaba06c08048c53b089315c383b3c33fe3ee20fc25a42096
-
Filesize
692KB
MD58430393e538e955a567883f957ae6d14
SHA174bf2ce981fb17303599068636765fae84ca29d2
SHA2568a413f2dbac1a37410924b35f644ca20b04108a929641d232769ff069f432fe3
SHA5126d523ec7fd7cd3b76c91857884abb72aea650513e52581d995b16ac531c188ce6fdb283810b2a17391133e9eceecbb949a9ff5b91636ddd07c45324524fe0eb3
-
Filesize
579KB
MD5dcda3b7b8eb0bfbccb54b4d6a6844ad6
SHA1316a2925e451f739f45e31bc233a95f91bf775fa
SHA256011e1decd6683afe5f1e397fe9697f2cf592ae21766a7629e234682f721658ae
SHA51218e8c99f8b86375627aba0d2b10cf4db24ee5ac61a3d6a73d382a83ec63217c7e455570d4fa7dcdbb188dcc73988689661f8cab2337ae8c615fa6bc9a08f71f5
-
Filesize
1KB
MD57a22723f2d920260d3d41e510de624b0
SHA11617a8c75df3c8f47e068b103cc07b4679d71338
SHA2566fad77dc0a4cf03611441933946ee7e455bdf19cea1ffeccc92c9cdb49a3aea2
SHA512ff57593ced6b2ed1376489c360c634d3dab17eab53992c5a0a543034e5623c2963543bf941d980a5d88af137f81bd2e7ba5d7476d41234fbede43fbeaf36be1a