Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-10-2024 19:09
Static task
static1
Behavioral task
behavioral1
Sample
c6ce1e919d846871e82fefd5a57f6a7af4a5e729ee1b9c0f67d4fd71807ef7e3.dll
Resource
win7-20241010-en
General
-
Target
c6ce1e919d846871e82fefd5a57f6a7af4a5e729ee1b9c0f67d4fd71807ef7e3.dll
-
Size
684KB
-
MD5
906ed4f1c15ea3e6cf8d3bc271ba5d07
-
SHA1
897965a6c69be2b105847ee4ab1ca5d704eb53a4
-
SHA256
c6ce1e919d846871e82fefd5a57f6a7af4a5e729ee1b9c0f67d4fd71807ef7e3
-
SHA512
c498880b98d3b4cbc67c0784a2b80426f937ce7f6160f460b01b69b3d2e6cb3e2545fd50ecfd3eefbf3df960e3489dfb2c1c536fad1d32f8e65e6b54925a0061
-
SSDEEP
12288:bfndx6M581WsGRouyjzC6gn5l0H1Tak8jnGg/xeq7gz3xfsPEb4sk:zdAE81W381Wk8jnYz3dsPEb4s
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1268-4-0x0000000002A20000-0x0000000002A21000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/2304-0-0x0000000140000000-0x00000001400AB000-memory.dmp dridex_payload behavioral1/memory/1268-23-0x0000000140000000-0x00000001400AB000-memory.dmp dridex_payload behavioral1/memory/1268-34-0x0000000140000000-0x00000001400AB000-memory.dmp dridex_payload behavioral1/memory/1268-36-0x0000000140000000-0x00000001400AB000-memory.dmp dridex_payload behavioral1/memory/2304-43-0x0000000140000000-0x00000001400AB000-memory.dmp dridex_payload behavioral1/memory/2928-53-0x0000000140000000-0x00000001400AC000-memory.dmp dridex_payload behavioral1/memory/2928-57-0x0000000140000000-0x00000001400AC000-memory.dmp dridex_payload behavioral1/memory/2732-70-0x0000000140000000-0x00000001400DF000-memory.dmp dridex_payload behavioral1/memory/2732-74-0x0000000140000000-0x00000001400DF000-memory.dmp dridex_payload behavioral1/memory/2708-90-0x0000000140000000-0x00000001400AC000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
SystemPropertiesRemote.exesethc.exeSystemPropertiesAdvanced.exepid process 2928 SystemPropertiesRemote.exe 2732 sethc.exe 2708 SystemPropertiesAdvanced.exe -
Loads dropped DLL 7 IoCs
Processes:
SystemPropertiesRemote.exesethc.exeSystemPropertiesAdvanced.exepid process 1268 2928 SystemPropertiesRemote.exe 1268 2732 sethc.exe 1268 2708 SystemPropertiesAdvanced.exe 1268 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Kgvptlq = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\QUICKL~1\\USERPI~1\\QV\\sethc.exe" -
Processes:
rundll32.exeSystemPropertiesRemote.exesethc.exeSystemPropertiesAdvanced.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesRemote.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sethc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesAdvanced.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2304 rundll32.exe 2304 rundll32.exe 2304 rundll32.exe 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1268 wrote to memory of 2676 1268 SystemPropertiesRemote.exe PID 1268 wrote to memory of 2676 1268 SystemPropertiesRemote.exe PID 1268 wrote to memory of 2676 1268 SystemPropertiesRemote.exe PID 1268 wrote to memory of 2928 1268 SystemPropertiesRemote.exe PID 1268 wrote to memory of 2928 1268 SystemPropertiesRemote.exe PID 1268 wrote to memory of 2928 1268 SystemPropertiesRemote.exe PID 1268 wrote to memory of 2680 1268 sethc.exe PID 1268 wrote to memory of 2680 1268 sethc.exe PID 1268 wrote to memory of 2680 1268 sethc.exe PID 1268 wrote to memory of 2732 1268 sethc.exe PID 1268 wrote to memory of 2732 1268 sethc.exe PID 1268 wrote to memory of 2732 1268 sethc.exe PID 1268 wrote to memory of 1552 1268 SystemPropertiesAdvanced.exe PID 1268 wrote to memory of 1552 1268 SystemPropertiesAdvanced.exe PID 1268 wrote to memory of 1552 1268 SystemPropertiesAdvanced.exe PID 1268 wrote to memory of 2708 1268 SystemPropertiesAdvanced.exe PID 1268 wrote to memory of 2708 1268 SystemPropertiesAdvanced.exe PID 1268 wrote to memory of 2708 1268 SystemPropertiesAdvanced.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c6ce1e919d846871e82fefd5a57f6a7af4a5e729ee1b9c0f67d4fd71807ef7e3.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2304
-
C:\Windows\system32\SystemPropertiesRemote.exeC:\Windows\system32\SystemPropertiesRemote.exe1⤵PID:2676
-
C:\Users\Admin\AppData\Local\wbE\SystemPropertiesRemote.exeC:\Users\Admin\AppData\Local\wbE\SystemPropertiesRemote.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2928
-
C:\Windows\system32\sethc.exeC:\Windows\system32\sethc.exe1⤵PID:2680
-
C:\Users\Admin\AppData\Local\YLkGm\sethc.exeC:\Users\Admin\AppData\Local\YLkGm\sethc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2732
-
C:\Windows\system32\SystemPropertiesAdvanced.exeC:\Windows\system32\SystemPropertiesAdvanced.exe1⤵PID:1552
-
C:\Users\Admin\AppData\Local\Q6f5xd\SystemPropertiesAdvanced.exeC:\Users\Admin\AppData\Local\Q6f5xd\SystemPropertiesAdvanced.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2708
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
892KB
MD53cdf2dd101f92aee8fdf5daf2abaf8f6
SHA1b59f90d001e94275a51d3c47ab0765391a968474
SHA256d1e9e229684b26b7346d0a5dcc56250e692a4bd61abcb2f6d986305794cc0b46
SHA512187950a56d7cc345293cfc51af0089cdd91f2f1fe53c29ef51c492ce54c109d4e67f65b9e944269defa325c1fead1cbb51acfc091be40e28c18763e73f2d00f3
-
Filesize
688KB
MD5dc8298aec216a64936c29e16607e9776
SHA19c0b8df75ed81034b89b56fe8f35fe17ab26d409
SHA256739a086e1138ea6aeff9c3c4fc197feaacc904843902fa787f250e7da7305102
SHA512cec55f7130818242bc27512f9bd8dbe7a213f180d0e5fc2e0a2a5d8a47cb7cf07a2b2cedee41f3e581dfa30d157cf54a57b09988a88a04532c1784ce6c15a860
-
Filesize
1KB
MD5d32aae2f5a5e926fa4ed770d69d7c3d0
SHA1277c59e96c2924b6781aa5412e1a0fbb68878e83
SHA256127156e1766330f731f5110e409befbfdbb2601cf93500c2b9c29aa0f0636073
SHA512f9971144e2d112e7b7302ca1a01d9077696de8ba015d7177b8236acb91eb3791c47962b70e98b516fc26255d2a6eec2bfd11b2bdc744faa21cdf9161b757e20d
-
Filesize
688KB
MD555c6cd716a488614eba5c0c57476bea2
SHA128b7651fc30e95a131c1031487b2677e7269cb74
SHA256d33b1661adaaaa87b592b0af9fc62f6a1326a598bdf7f05cafc7143b437cf58f
SHA512958d22e3d5acb93e44dfd88efe2d7956aeb4e8c1424a834de5816765bf06a0283ec92ad007f67618a8d0ad9dc61e3fba27ef71a4a57a2962b88e9f743d2b0bfb
-
Filesize
80KB
MD525dc1e599591871c074a68708206e734
SHA127a9dffa92d979d39c07d889fada536c062dac77
SHA256a13b2ba5892c11c731869410b1e3dd2f250d70ff9efd513a9f260ab506dd42ef
SHA512f7da9ce4c3e8aea9095fcc977084c042f85df48fca0b58fb136dfd835ce69b5b1e68f3c11eeb14c617ffcec7011ffc7e5d5a948f49dde653a2348b28e10adb72
-
Filesize
272KB
MD53bcb70da9b5a2011e01e35ed29a3f3f3
SHA19daecb1ee5d7cbcf46ee154dd642fcd993723a9b
SHA256dd94bf73f0e3652b76cfb774b419ceaa2082bc7f30cc34e28dfa51952fa9ccb5
SHA51269d231132f488fd7033349f232db1207f88f1d5cb84f5422adf0dd5fb7b373dada8fdfac7760b8845e5aab00a7ae56f24d66bbb8aa70c3c8de6ec5c31982b4df
-
Filesize
80KB
MD5d0d7ac869aa4e179da2cc333f0440d71
SHA1e7b9a58f5bfc1ec321f015641a60978c0c683894
SHA2565762e1570de6ca4ff4254d03c8f6e572f3b9c065bf5c78fd5a9ea3769c33818a
SHA5121808b10dc85f8755a0074d1ea00794b46b4254573b6862c2813a89ca171ad94f95262e8b59a8f9a596c9bd6a724f440a14a813eab93aa140e818ee97af106db7