Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-10-2024 21:07
Static task
static1
Behavioral task
behavioral1
Sample
ed0719cca7b7968d97c2f3798dc89cb942ff11938783673cdaa4124da429bc44.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed0719cca7b7968d97c2f3798dc89cb942ff11938783673cdaa4124da429bc44.dll
Resource
win10v2004-20241007-en
General
-
Target
ed0719cca7b7968d97c2f3798dc89cb942ff11938783673cdaa4124da429bc44.dll
-
Size
688KB
-
MD5
bf6415fc9381c0c310077c35921254ca
-
SHA1
1a9bfa30fc33ab115e737db7bfe2a50371e815cf
-
SHA256
ed0719cca7b7968d97c2f3798dc89cb942ff11938783673cdaa4124da429bc44
-
SHA512
b269ded1c574eb71f895217dfe991a62cb4c16217d4b46ab6a702989de92251dd28a8b14662098ba28cdffbdcbcd1adb56dde0b17237a24a2201dc6728a32f3d
-
SSDEEP
12288:Cfndx6M581WsGRouyjzC6gn5l0H1Tak8jnGg/xeq7gz3xfsPEb4sk:kdAE81W381Wk8jnYz3dsPEb4s
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3444-3-0x00000000073D0000-0x00000000073D1000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral2/memory/2876-0-0x0000000140000000-0x00000001400AC000-memory.dmp dridex_payload behavioral2/memory/3444-35-0x0000000140000000-0x00000001400AC000-memory.dmp dridex_payload behavioral2/memory/3444-24-0x0000000140000000-0x00000001400AC000-memory.dmp dridex_payload behavioral2/memory/2876-38-0x0000000140000000-0x00000001400AC000-memory.dmp dridex_payload behavioral2/memory/4884-45-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral2/memory/4884-50-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral2/memory/1712-61-0x0000000140000000-0x00000001400F2000-memory.dmp dridex_payload behavioral2/memory/1712-66-0x0000000140000000-0x00000001400F2000-memory.dmp dridex_payload behavioral2/memory/4364-81-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 4884 sigverif.exe 1712 DisplaySwitch.exe 4364 SystemPropertiesPerformance.exe -
Loads dropped DLL 3 IoCs
pid Process 4884 sigverif.exe 1712 DisplaySwitch.exe 4364 SystemPropertiesPerformance.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Husvxt = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\AccountPictures\\eLqV5\\DisplaySwitch.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sigverif.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DisplaySwitch.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesPerformance.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2876 rundll32.exe 2876 rundll32.exe 2876 rundll32.exe 2876 rundll32.exe 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found 3444 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3444 Process not Found 3444 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3444 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3444 wrote to memory of 4888 3444 Process not Found 98 PID 3444 wrote to memory of 4888 3444 Process not Found 98 PID 3444 wrote to memory of 4884 3444 Process not Found 99 PID 3444 wrote to memory of 4884 3444 Process not Found 99 PID 3444 wrote to memory of 1076 3444 Process not Found 100 PID 3444 wrote to memory of 1076 3444 Process not Found 100 PID 3444 wrote to memory of 1712 3444 Process not Found 101 PID 3444 wrote to memory of 1712 3444 Process not Found 101 PID 3444 wrote to memory of 4048 3444 Process not Found 102 PID 3444 wrote to memory of 4048 3444 Process not Found 102 PID 3444 wrote to memory of 4364 3444 Process not Found 103 PID 3444 wrote to memory of 4364 3444 Process not Found 103 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ed0719cca7b7968d97c2f3798dc89cb942ff11938783673cdaa4124da429bc44.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2876
-
C:\Windows\system32\sigverif.exeC:\Windows\system32\sigverif.exe1⤵PID:4888
-
C:\Users\Admin\AppData\Local\tzRi8g\sigverif.exeC:\Users\Admin\AppData\Local\tzRi8g\sigverif.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4884
-
C:\Windows\system32\DisplaySwitch.exeC:\Windows\system32\DisplaySwitch.exe1⤵PID:1076
-
C:\Users\Admin\AppData\Local\2Eot1\DisplaySwitch.exeC:\Users\Admin\AppData\Local\2Eot1\DisplaySwitch.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1712
-
C:\Windows\system32\SystemPropertiesPerformance.exeC:\Windows\system32\SystemPropertiesPerformance.exe1⤵PID:4048
-
C:\Users\Admin\AppData\Local\ShEpAD\SystemPropertiesPerformance.exeC:\Users\Admin\AppData\Local\ShEpAD\SystemPropertiesPerformance.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4364
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
968KB
MD536f1036f0e354aa5a1cfc95b5597e107
SHA1a306e1d08122268634a730339c9f8982bf968b7d
SHA256c7509f0f95cb85744ee0387d3ff71afe66bb3a54af5d9c99d98620e3efede5e0
SHA5121513527e34caa58ddf76d229866085c09a9e7eaad3fe7a48ecfc10748f1bb5892db88ffd1b194ca5bed05d08dcac7ea30448f2b23ee51236848d5fbaffd62a77
-
Filesize
1.8MB
MD55338d4beddf23db817eb5c37500b5735
SHA11b5c56f00b53fca3205ff24770203af46cbc7c54
SHA2568b581f1d15a6920e4ecfe172d8ef753d0a2bf1a47e686a8d5d8e01147fa4c65e
SHA512173170b83e0048ee05da18c0c957744204954da58a93c532b669d62edb632c4c73d0744c13eb864ecf357ff12831aa46c4f2445dc33b62a4547385b9e0297b0c
-
Filesize
692KB
MD5f4708d43b6777d77cb5d1295bd8cb401
SHA11679536c2f60c0ee249a5e58f9b0c766016ffd2d
SHA256865193655819d8d247de4148e31254dd4710c390023bae5dc0e40e1f4d8284b3
SHA512735d2dc8ea85f09dd17afd2356d9a412bad5a2a388294807ee3c320af92b7d81042a671f0f8c08a55bb583f0daec1e60978c8b296df3e3e20640b89fcdc45442
-
Filesize
82KB
MD5e4fbf7cab8669c7c9cef92205d2f2ffc
SHA1adbfa782b7998720fa85678cc85863b961975e28
SHA256b266318d45a4245556a2e39b763f2f11eca780969105f6f103e53dd0a492bb30
SHA512c5c62578d04133352d6cb7b018df96a7b55c18d6111ab8bf2bfe232a3315a63b07047fa5b0b88551d152085776c66169b47566242c8c4c5e0333c55adc64e1b6
-
Filesize
692KB
MD5d07eba01a730a56829b4e990962feb94
SHA19bdd8c91cae23a43f5bcb61d3efb9e2720248218
SHA256f96aeaea8a03a4312ed1957ca256b5515bd1beb5aca95a18e6da1ae5b6d98155
SHA512830d2d8897b48e94070cbeeee25804ef7a26c3c34d9c61e4a7fa5547852e47909f5f1963b6762ad2839ab8229e644eb3ebca4d035eb240d5510d9bf8cd23fab2
-
Filesize
77KB
MD52151a535274b53ba8a728e542cbc07a8
SHA1a2304c0f2616a7d12298540dce459dd9ccf07443
SHA256064de47877b00dc35886e829a697e4adb3d3cfdf294ddba13b6009a0f415b1bd
SHA512e6fd520ee1bd80a5fe8a7c2ae6446dcaabd4e335a602c36356f85305abef751b7dffa7eaac1ec13c105ccd8c3e9070bd32ed4b14bc8a9e52dc5f47b936d69a9f
-
Filesize
1KB
MD5f430e736be5890d83463079e33bd909d
SHA1ddc2634982ad17862d587310002a5c205a5a7595
SHA25675e6fa73bcc0ff3e7e1ffc23b5cec7dcabe125ee45d1e75d9db612f2b9105103
SHA5129d010ac1400fdfad1f3e855f768f70a45a92b7bd77d596338c4e37f406cbfc53689117460faa3a4217ed05db3ba6138b2f6049f0723e82e515995e854a09767a