Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-10-2024 00:17
Static task
static1
Behavioral task
behavioral1
Sample
4ac846154d1f91c30a373dc364d880d7f36b0d1f23edbf8e854b38b804db7549.dll
Resource
win7-20240903-en
General
-
Target
4ac846154d1f91c30a373dc364d880d7f36b0d1f23edbf8e854b38b804db7549.dll
-
Size
700KB
-
MD5
bfbcb9e4b4723629dda33d1406a87d3a
-
SHA1
d342007297faf30e3cd1a703b31287e735470858
-
SHA256
4ac846154d1f91c30a373dc364d880d7f36b0d1f23edbf8e854b38b804db7549
-
SHA512
d0679c2dead14ccc998bf6ae31c79e3e4570a345401374a099e2feb3252eb1a2a2159b559a0963523f39e4080d6ecf672d2c397c12cdce7d1a142c7eb81afd41
-
SSDEEP
12288:dEwgKnIhABTW0HcD5a1PKxdZhC+k+V9Hgeb/tf/B9P632vHAA:dEwXnOAx5HcDM1Sxd3ChCHg2/P9yGo
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1224-4-0x00000000025C0000-0x00000000025C1000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/2216-1-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/1224-24-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/1224-36-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/1224-35-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/2216-44-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral1/memory/2484-54-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload behavioral1/memory/2484-58-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload behavioral1/memory/2104-75-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload behavioral1/memory/1476-90-0x0000000140000000-0x00000001400B0000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
raserver.exemstsc.exemblctr.exepid process 2484 raserver.exe 2104 mstsc.exe 1476 mblctr.exe -
Loads dropped DLL 7 IoCs
Processes:
raserver.exemstsc.exemblctr.exepid process 1224 2484 raserver.exe 1224 2104 mstsc.exe 1224 1476 mblctr.exe 1224 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rcoehfpd = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\Certificates\\oeBZAl0\\mstsc.exe" -
Processes:
rundll32.exeraserver.exemstsc.exemblctr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA raserver.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mstsc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mblctr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2216 rundll32.exe 2216 rundll32.exe 2216 rundll32.exe 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 1224 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1224 wrote to memory of 2968 1224 raserver.exe PID 1224 wrote to memory of 2968 1224 raserver.exe PID 1224 wrote to memory of 2968 1224 raserver.exe PID 1224 wrote to memory of 2484 1224 raserver.exe PID 1224 wrote to memory of 2484 1224 raserver.exe PID 1224 wrote to memory of 2484 1224 raserver.exe PID 1224 wrote to memory of 1372 1224 mstsc.exe PID 1224 wrote to memory of 1372 1224 mstsc.exe PID 1224 wrote to memory of 1372 1224 mstsc.exe PID 1224 wrote to memory of 2104 1224 mstsc.exe PID 1224 wrote to memory of 2104 1224 mstsc.exe PID 1224 wrote to memory of 2104 1224 mstsc.exe PID 1224 wrote to memory of 1692 1224 mblctr.exe PID 1224 wrote to memory of 1692 1224 mblctr.exe PID 1224 wrote to memory of 1692 1224 mblctr.exe PID 1224 wrote to memory of 1476 1224 mblctr.exe PID 1224 wrote to memory of 1476 1224 mblctr.exe PID 1224 wrote to memory of 1476 1224 mblctr.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4ac846154d1f91c30a373dc364d880d7f36b0d1f23edbf8e854b38b804db7549.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2216
-
C:\Windows\system32\raserver.exeC:\Windows\system32\raserver.exe1⤵PID:2968
-
C:\Users\Admin\AppData\Local\VqB5bMR\raserver.exeC:\Users\Admin\AppData\Local\VqB5bMR\raserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2484
-
C:\Windows\system32\mstsc.exeC:\Windows\system32\mstsc.exe1⤵PID:1372
-
C:\Users\Admin\AppData\Local\EuRYnCy\mstsc.exeC:\Users\Admin\AppData\Local\EuRYnCy\mstsc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2104
-
C:\Windows\system32\mblctr.exeC:\Windows\system32\mblctr.exe1⤵PID:1692
-
C:\Users\Admin\AppData\Local\sU7Zy\mblctr.exeC:\Users\Admin\AppData\Local\sU7Zy\mblctr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1476
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
704KB
MD5f61273957865c1a5b5e63bde0c3a61e1
SHA1f1ae3f2ca18fd6adcad0a14e2706f260bd68e3b0
SHA25648ea3db50d79c6194f9572858f97e865781e460bb6313b1d9a1bb53fd89accf9
SHA512d9429c7f62b5122892b73ee66b33e983bbcac6fb98452ad8a2ff99709609f85f933df369f1be99c76004e469a5e57dc9ec97426b13b3548317932ee7f619cbaa
-
Filesize
704KB
MD53034b61bc4388c0b5465eecbe57a2342
SHA1c03c70048b618b3268723ab2dc9ca85cf8c1ef11
SHA2569ec17e6a09e88c71952dfc208478e4931ab006316ade967e26b6ccd665d91454
SHA51273391d796b7c8764c0fcfc37b8bf33b621b2a6cc4629ec29f2458fe4d7c60d4d78e3ea3fc99d7c49fb6e216dc03ab50a338e4d06b7bfe6642473b942c97d0328
-
Filesize
704KB
MD59ab00bbccace510ac4a34b8439aa1f83
SHA1c79bade33a7f816e27c23702ced05095bdb41e7e
SHA2565bd36ba5e3a120a8d9b200f88ed547a77a636dc07319059136979cb7d9f83ab6
SHA51215ac1b2934c2c0b8e2c4873fcb2275d2438ddf0275a40fa556113915cd00a7674856ac07dfbf034503824ff77d9a098d8768ea7afce09e79d676617fb15a2abf
-
Filesize
1KB
MD5aca2eea6361a0df1b8d570dd5d723957
SHA12b0f37fc8cdadcbf660b33d245fb4a980e29303f
SHA256718e01731acbb710fd92dee3ed7517a5a817b62c3cfa6b29e53426290bbd153a
SHA512ba77030d367e3a9d8e4034dc3dc825f84079dce7ed8faeb6efe439a6b8a1a3e98709b48caef7c7bcda5b26584db67f02d84e9d5b022f097aeacbc3b0d1e14187
-
Filesize
1.1MB
MD550f739538ef014b2e7ec59431749d838
SHA1b439762b8efe8cfb977e7374c11a7e4d8ed05eb3
SHA25685c510c7fa8d64c70886ea01ec99e7b9064594f021a95b4cf88359421e732be3
SHA51202e231ddc4ac012c597b9db42f8a77fbf35ca8253c030d443a0dd4db3d76a9ee1cced600f12d7bb06305e7a4da4a8fda980faad335adcb12738d80d453cb3cc8
-
Filesize
123KB
MD5cd0bc0b6b8d219808aea3ecd4e889b19
SHA19f8f4071ce2484008e36fdfd963378f4ebad703f
SHA25616abc530c0367df1ad631f09e14c565cf99561949aa14acc533cd54bf8a5e22c
SHA51284291ea3fafb38ef96817d5fe4a972475ef8ea24a4353568029e892fa8e15cf8e8f6ef4ff567813cd3b38092f0db4577d9dccb22be755eebdd4f77e623dc80ac
-
Filesize
935KB
MD5fa4c36b574bf387d9582ed2c54a347a8
SHA1149077715ee56c668567e3a9cb9842284f4fe678
SHA256b71cdf708d4a4f045f784de5e5458ebf9a4fa2b188c3f7422e2fbfe19310be3f
SHA5121f04ce0440eec7477153ebc2ce56eaabcbbac58d9d703c03337f030e160d22cd635ae201752bc2962643c75bbf2036afdd69d97e8cbc81260fd0e2f55946bb55