Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-10-2024 00:11
Static task
static1
Behavioral task
behavioral1
Sample
f4cc073cc601127a558b1196c98d6839965545cffad19f38370158a6450e82f3.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4cc073cc601127a558b1196c98d6839965545cffad19f38370158a6450e82f3.dll
Resource
win10v2004-20241007-en
General
-
Target
f4cc073cc601127a558b1196c98d6839965545cffad19f38370158a6450e82f3.dll
-
Size
704KB
-
MD5
32d919c09f97767d7a0c7972b2b52103
-
SHA1
7a83575a7cab12034630cacb854746978e03e7f5
-
SHA256
f4cc073cc601127a558b1196c98d6839965545cffad19f38370158a6450e82f3
-
SHA512
5a1a51e61107464ed813eb6f9131d6a2be7993eaa8c43f7e03222db2a35152998a67924a16a4b91e8a839a11948d925ff94930248b2691cafcb7a26159139ef4
-
SSDEEP
12288:mEwgKnIhABTW0HcD5a1PKxdZhC+k+V9Hgeb/tf/B9P632vHAA:mEwXnOAx5HcDM1Sxd3ChCHg2/P9yGo
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3432-3-0x00000000073E0000-0x00000000073E1000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral2/memory/1668-0-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload behavioral2/memory/3432-25-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload behavioral2/memory/3432-36-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload behavioral2/memory/1668-39-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload behavioral2/memory/1316-46-0x0000000140000000-0x00000001400B2000-memory.dmp dridex_payload behavioral2/memory/1316-51-0x0000000140000000-0x00000001400B2000-memory.dmp dridex_payload behavioral2/memory/3324-62-0x0000000140000000-0x00000001400B1000-memory.dmp dridex_payload behavioral2/memory/3324-67-0x0000000140000000-0x00000001400B1000-memory.dmp dridex_payload behavioral2/memory/2332-82-0x0000000140000000-0x00000001400B1000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 1316 tcmsetup.exe 3324 BdeUISrv.exe 2332 Magnify.exe -
Loads dropped DLL 4 IoCs
pid Process 1316 tcmsetup.exe 3324 BdeUISrv.exe 2332 Magnify.exe 2332 Magnify.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Husvxt = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\ACCESS~2\\2T\\BdeUISrv.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tcmsetup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BdeUISrv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Magnify.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1668 rundll32.exe 1668 rundll32.exe 1668 rundll32.exe 1668 rundll32.exe 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found 3432 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeShutdownPrivilege 3432 Process not Found Token: SeCreatePagefilePrivilege 3432 Process not Found Token: SeShutdownPrivilege 3432 Process not Found Token: SeCreatePagefilePrivilege 3432 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3432 Process not Found 3432 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3432 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3432 wrote to memory of 3924 3432 Process not Found 98 PID 3432 wrote to memory of 3924 3432 Process not Found 98 PID 3432 wrote to memory of 1316 3432 Process not Found 99 PID 3432 wrote to memory of 1316 3432 Process not Found 99 PID 3432 wrote to memory of 1220 3432 Process not Found 100 PID 3432 wrote to memory of 1220 3432 Process not Found 100 PID 3432 wrote to memory of 3324 3432 Process not Found 101 PID 3432 wrote to memory of 3324 3432 Process not Found 101 PID 3432 wrote to memory of 1856 3432 Process not Found 102 PID 3432 wrote to memory of 1856 3432 Process not Found 102 PID 3432 wrote to memory of 2332 3432 Process not Found 103 PID 3432 wrote to memory of 2332 3432 Process not Found 103 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f4cc073cc601127a558b1196c98d6839965545cffad19f38370158a6450e82f3.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1668
-
C:\Windows\system32\tcmsetup.exeC:\Windows\system32\tcmsetup.exe1⤵PID:3924
-
C:\Users\Admin\AppData\Local\yp6yM2\tcmsetup.exeC:\Users\Admin\AppData\Local\yp6yM2\tcmsetup.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1316
-
C:\Windows\system32\BdeUISrv.exeC:\Windows\system32\BdeUISrv.exe1⤵PID:1220
-
C:\Users\Admin\AppData\Local\Q2cyt\BdeUISrv.exeC:\Users\Admin\AppData\Local\Q2cyt\BdeUISrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3324
-
C:\Windows\system32\Magnify.exeC:\Windows\system32\Magnify.exe1⤵PID:1856
-
C:\Users\Admin\AppData\Local\fQl81WD\Magnify.exeC:\Users\Admin\AppData\Local\fQl81WD\Magnify.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2332
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD58595075667ff2c9a9f9e2eebc62d8f53
SHA1c48b54e571f05d4e21d015bb3926c2129f19191a
SHA25620b05c77f898be08737082e969b39f54fa39753c8c0a06142eb7ad5e0764a2db
SHA512080dbcdd9234c07efe6cea4919ffa305fdc381ccebed9d1020dd6551b54e20e52387e62a344502fa4a85249defd0f9b506528b8dd34675bc9f51f664b8fc4d88
-
Filesize
708KB
MD598e810868d349e9e3b2b9270e0a4d60e
SHA1e621b018f6148ab26e804e3e2cd0619629ed1600
SHA256b83d66894bd7a3a0b30ea006bb2f680a3f285f6bfebccab893e940c10d409594
SHA5127dd792b5d766e2f041655c2124aa5480f2763dc3e388b3fa3831bd6677d0edbeefce4f60c101c0490432933ed8d0593e8599f2dbcef451bd80c3414ffdd38ada
-
Filesize
639KB
MD54029890c147e3b4c6f41dfb5f9834d42
SHA110d08b3f6dabe8171ca2dd52e5737e3402951c75
SHA25657137f784594793dc0669042ccd3a71ddbfedeb77da6d97173d82613e08add4d
SHA512dbdc60f8692f13c23dbed0b76e9c6758a5b413bd6aaf4e4d0ba74e69c0871eb759da95c3f85a31d972388b545dcf3bb8abbcbedd29a1e7e48c065130b98b893d
-
Filesize
708KB
MD58ad4d1b94659429cf8955f8a1579ecde
SHA19d26fc72b7cf10fc82878e35e5d631a6c6d2ea28
SHA256580db49a01bed217ea80fc65a7360ee916c4b5a9060e73cb3b79be6bc016a25a
SHA51280912374670efa7c4308691f62853f6d435377c7993f1e4ccfeed66bc6f4e243e19062266d3ab361954d27e9f5baec61fd741295dec90789591c5a4567212942
-
Filesize
712KB
MD568f90184e9dfbb17298ec803899ec212
SHA14c24dcb0d86e8e7f5ecb7ea9733888f839c17b70
SHA25680543cc56cf82803a328c4726f7236af15a05d2f577f26ba9d9fe9acded1c8e8
SHA512854c8a307a6b36b59efa45b3c28fec5a001618ac9a0cc660a4b70fa69e5f20838c3401332eea9a561526deff26e500a3952e7b3b3477580b4d084c981d64a2ab
-
Filesize
16KB
MD558f3b915b9ae7d63431772c2616b0945
SHA16346e837da3b0f551becb7cac6d160e3063696e9
SHA256e243501ba2ef7a6f04f51410bb916faffe0ec23450a4d030ce6bfe747e544b39
SHA5127b09192af460c502d1a94989a0d06191c8c7a058ce3a4541e3f45960a1e12529d0cdaff9da3d5bacfdceed57aeb6dc9a159c6c0a95675c438f99bf7e418c6dc5
-
Filesize
1KB
MD596ac5b0c7754e2f93f3ac23edf7b9f36
SHA1db1a17353a7c7e4be4e102dfde35a449ee0aee04
SHA2565b9c7f758ebd812072d9cc17ea12b0b1684be9d565519418b71fd0b4bba30a49
SHA5127a3b1a9692c33bd8294414022a576d1e59a5af543c77962dc28d2fad7e4faf536fd3c024065e7cae156a6637648841c33463160bf3cbce30f2e50a30763d93af