Analysis
-
max time kernel
149s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-10-2024 16:15
Static task
static1
Behavioral task
behavioral1
Sample
6603627b822e6cddf2cb9cd264d26ebc46790f4ca90c6806e06a4b3c1be6a14d.dll
Resource
win7-20241010-en
General
-
Target
6603627b822e6cddf2cb9cd264d26ebc46790f4ca90c6806e06a4b3c1be6a14d.dll
-
Size
688KB
-
MD5
551c56a5dd44632dba1058d26deb2fce
-
SHA1
f160c54abfeb843c44d85abd9d7eb88519d1c104
-
SHA256
6603627b822e6cddf2cb9cd264d26ebc46790f4ca90c6806e06a4b3c1be6a14d
-
SHA512
c72c753caf8cd7f1c9be2cd4776be3175704acbdecb0494cd9734d84fab04f12a1d419954ac1ba985b03ba863a7a946c94b5bfe572eef8c4134e0221f3499160
-
SSDEEP
12288:bfndx6M581WsGRouyjzC6gn5l0H1Tak8jnGg/xeq7gz3xfsPEb4sk:zdAE81W381Wk8jnYz3dsPEb4s
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/3456-3-0x00000000081E0000-0x00000000081E1000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral2/memory/1168-1-0x0000000140000000-0x00000001400AC000-memory.dmp dridex_payload behavioral2/memory/3456-34-0x0000000140000000-0x00000001400AC000-memory.dmp dridex_payload behavioral2/memory/3456-23-0x0000000140000000-0x00000001400AC000-memory.dmp dridex_payload behavioral2/memory/1168-37-0x0000000140000000-0x00000001400AC000-memory.dmp dridex_payload behavioral2/memory/892-45-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral2/memory/892-49-0x0000000140000000-0x00000001400AD000-memory.dmp dridex_payload behavioral2/memory/3144-60-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral2/memory/3144-65-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral2/memory/2056-76-0x0000000140000000-0x00000001400F2000-memory.dmp dridex_payload behavioral2/memory/2056-80-0x0000000140000000-0x00000001400F2000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 892 SystemPropertiesPerformance.exe 3144 rdpinput.exe 2056 PasswordOnWakeSettingFlyout.exe -
Loads dropped DLL 3 IoCs
pid Process 892 SystemPropertiesPerformance.exe 3144 rdpinput.exe 2056 PasswordOnWakeSettingFlyout.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Fzrdqelbmr = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\QUICKL~1\\USERPI~1\\IMPLIC~1\\Lz\\rdpinput.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesPerformance.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpinput.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PasswordOnWakeSettingFlyout.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1168 rundll32.exe 1168 rundll32.exe 1168 rundll32.exe 1168 rundll32.exe 1168 rundll32.exe 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found 3456 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 3456 Process not Found Token: SeCreatePagefilePrivilege 3456 Process not Found Token: SeShutdownPrivilege 3456 Process not Found Token: SeCreatePagefilePrivilege 3456 Process not Found Token: SeShutdownPrivilege 3456 Process not Found Token: SeCreatePagefilePrivilege 3456 Process not Found Token: SeShutdownPrivilege 3456 Process not Found Token: SeCreatePagefilePrivilege 3456 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3456 Process not Found 3456 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3456 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3456 wrote to memory of 1364 3456 Process not Found 95 PID 3456 wrote to memory of 1364 3456 Process not Found 95 PID 3456 wrote to memory of 892 3456 Process not Found 96 PID 3456 wrote to memory of 892 3456 Process not Found 96 PID 3456 wrote to memory of 3616 3456 Process not Found 97 PID 3456 wrote to memory of 3616 3456 Process not Found 97 PID 3456 wrote to memory of 3144 3456 Process not Found 98 PID 3456 wrote to memory of 3144 3456 Process not Found 98 PID 3456 wrote to memory of 2744 3456 Process not Found 99 PID 3456 wrote to memory of 2744 3456 Process not Found 99 PID 3456 wrote to memory of 2056 3456 Process not Found 100 PID 3456 wrote to memory of 2056 3456 Process not Found 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6603627b822e6cddf2cb9cd264d26ebc46790f4ca90c6806e06a4b3c1be6a14d.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1168
-
C:\Windows\system32\SystemPropertiesPerformance.exeC:\Windows\system32\SystemPropertiesPerformance.exe1⤵PID:1364
-
C:\Users\Admin\AppData\Local\Uq9s1\SystemPropertiesPerformance.exeC:\Users\Admin\AppData\Local\Uq9s1\SystemPropertiesPerformance.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:892
-
C:\Windows\system32\rdpinput.exeC:\Windows\system32\rdpinput.exe1⤵PID:3616
-
C:\Users\Admin\AppData\Local\gI7Z5bFnW\rdpinput.exeC:\Users\Admin\AppData\Local\gI7Z5bFnW\rdpinput.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3144
-
C:\Windows\system32\PasswordOnWakeSettingFlyout.exeC:\Windows\system32\PasswordOnWakeSettingFlyout.exe1⤵PID:2744
-
C:\Users\Admin\AppData\Local\QDsM\PasswordOnWakeSettingFlyout.exeC:\Users\Admin\AppData\Local\QDsM\PasswordOnWakeSettingFlyout.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
968KB
MD5334b5724a0514745d34715da73c9d1d7
SHA1e89724adbada38eab4625c8609ef7ecb460a6b89
SHA256b46378d718b64cade246eb1df75ce92c90c724b2f32955ac383b3d67f5fd7e3b
SHA512a1bd38ff058ba71d94ab5d3e88bccd8835bfebd7d73f5189125f430fbc145eae9b7423eba54cfc8770e9bae8ced3cb3ba43ae7c7888177d02bc12d4ed18243c0
-
Filesize
44KB
MD5591a98c65f624c52882c2b238d6cd4c4
SHA1c960d08c19d777069cf265dcc281807fbd8502d7
SHA2565e6ed524c955fb1ea3e24f132987143da3ec81db5041a0edcfa7bf3ac790eb06
SHA5121999f23c90d85857461f8ddc5342470296f6939a654ac015780c2977f293c1f799fc992462f3d4d9181c97ab960db3291b85ea7c0537edcb57755706b20b6074
-
Filesize
692KB
MD5ffe7bbb175a87856b62a9772a6ed4792
SHA1e1dde60a522b3bd01cb8a6465c65f239df8c465c
SHA25671ea251ae2015077170d35e58d05772eb46651fbf75951dbf09899978dac8cd5
SHA51238739a1058d3c0ffe5a1eca7b3275dd28ca9d93a93b04503dc0a799f6cb868523a46ecbc83612a376b26b7f21e148fb04320885cdd793387421c288f26dcc9b8
-
Filesize
82KB
MD5e4fbf7cab8669c7c9cef92205d2f2ffc
SHA1adbfa782b7998720fa85678cc85863b961975e28
SHA256b266318d45a4245556a2e39b763f2f11eca780969105f6f103e53dd0a492bb30
SHA512c5c62578d04133352d6cb7b018df96a7b55c18d6111ab8bf2bfe232a3315a63b07047fa5b0b88551d152085776c66169b47566242c8c4c5e0333c55adc64e1b6
-
Filesize
696KB
MD5fa80100422aa92f98f365a160c349a48
SHA1ae808a0c466703f51df909e80bc79ecc23f65892
SHA2560ed2a4b9a8ea882675a18690d79c3a0fcbd5b807fd23a62c364ab2c39d044562
SHA512e80dee6ca4d60f8c406a3a7ea748ed081e698284b029d828a62d29f87aea35786a6a9ba8c132e4bb291cd4a9c5fb8dee5f9e8c2e2154bd41a558c852c6226e4c
-
Filesize
180KB
MD5bd99eeca92869f9a3084d689f335c734
SHA1a2839f6038ea50a4456cd5c2a3ea003e7b77688c
SHA25639bfb2214efeed47f4f5e50e6dff05541e29caeb27966520bdadd52c3d5e7143
SHA512355433c3bbbaa3bcb849633d45713d8a7ac6f87a025732fbe83e259ec3a0cb4eabb18239df26609453f9fc6764c7276c5d0472f11cf12d15ef806aa7594d090e
-
Filesize
1KB
MD57cd192232b9cdaabe3850f62c1059cc9
SHA1e9fdd7ce8ae2c73f5e1b1998e3ed041d019927bb
SHA2560273948fbdee72972b2546e3acf7b6231c3f40bec5f4cb563310aec92e29c3f3
SHA512612e92a35da176cafd8695e7072c28da3482c640ecef9d6d38dac03ec3103077fccd0645b0b49ec0247e4bcf145286de817e457e088ac33dfd668a6729adf0cc