Analysis
-
max time kernel
150s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29-10-2024 17:59
Static task
static1
Behavioral task
behavioral1
Sample
c5ebee5492b4fa991c1d37e5fee02d92ec9afbe2a7e3397829ad7b57f13ea07e.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c5ebee5492b4fa991c1d37e5fee02d92ec9afbe2a7e3397829ad7b57f13ea07e.dll
Resource
win10v2004-20241007-en
General
-
Target
c5ebee5492b4fa991c1d37e5fee02d92ec9afbe2a7e3397829ad7b57f13ea07e.dll
-
Size
672KB
-
MD5
d7b6390737e5cbc33070d66723208014
-
SHA1
d8706c8648e39289dabead6db0f9d5094048bcd7
-
SHA256
c5ebee5492b4fa991c1d37e5fee02d92ec9afbe2a7e3397829ad7b57f13ea07e
-
SHA512
b168072d2f1c92383f9336484b3cf1595eeba37602718b0a295d1fbacc6255967bacd9fff2090e48570086a104b8f94bf637c2a32ab84a87feef0ede9fa6fa0c
-
SSDEEP
6144:K34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:KIKp/UWCZdCDh2IZDwAFRpR6Au
Malware Config
Signatures
-
Dridex family
-
Processes:
resource yara_rule behavioral1/memory/1320-4-0x0000000002610000-0x0000000002611000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/1760-0-0x000007FEFAFF0000-0x000007FEFB098000-memory.dmp dridex_payload behavioral1/memory/1320-16-0x0000000140000000-0x00000001400A8000-memory.dmp dridex_payload behavioral1/memory/1320-24-0x0000000140000000-0x00000001400A8000-memory.dmp dridex_payload behavioral1/memory/1320-37-0x0000000140000000-0x00000001400A8000-memory.dmp dridex_payload behavioral1/memory/1320-35-0x0000000140000000-0x00000001400A8000-memory.dmp dridex_payload behavioral1/memory/1760-44-0x000007FEFAFF0000-0x000007FEFB098000-memory.dmp dridex_payload behavioral1/memory/2872-53-0x000007FEFB1A0000-0x000007FEFB24A000-memory.dmp dridex_payload behavioral1/memory/2872-63-0x000007FEFB1A0000-0x000007FEFB24A000-memory.dmp dridex_payload behavioral1/memory/2536-75-0x000007FEFB1A0000-0x000007FEFB249000-memory.dmp dridex_payload behavioral1/memory/2536-80-0x000007FEFB1A0000-0x000007FEFB249000-memory.dmp dridex_payload behavioral1/memory/2416-92-0x000007FEFAFF0000-0x000007FEFB09A000-memory.dmp dridex_payload behavioral1/memory/2416-96-0x000007FEFAFF0000-0x000007FEFB09A000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
mspaint.exevmicsvc.exerrinstaller.exepid process 2872 mspaint.exe 2536 vmicsvc.exe 2416 rrinstaller.exe -
Loads dropped DLL 7 IoCs
Processes:
mspaint.exevmicsvc.exerrinstaller.exepid process 1320 2872 mspaint.exe 1320 2536 vmicsvc.exe 1320 2416 rrinstaller.exe 1320 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mkmfyiwmvqjxba = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Office\\Recent\\pCyILM6\\vmicsvc.exe" -
Processes:
rrinstaller.exerundll32.exemspaint.exevmicsvc.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rrinstaller.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mspaint.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA vmicsvc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1760 rundll32.exe 1760 rundll32.exe 1760 rundll32.exe 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 1320 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1320 wrote to memory of 2732 1320 mspaint.exe PID 1320 wrote to memory of 2732 1320 mspaint.exe PID 1320 wrote to memory of 2732 1320 mspaint.exe PID 1320 wrote to memory of 2872 1320 mspaint.exe PID 1320 wrote to memory of 2872 1320 mspaint.exe PID 1320 wrote to memory of 2872 1320 mspaint.exe PID 1320 wrote to memory of 2552 1320 vmicsvc.exe PID 1320 wrote to memory of 2552 1320 vmicsvc.exe PID 1320 wrote to memory of 2552 1320 vmicsvc.exe PID 1320 wrote to memory of 2536 1320 vmicsvc.exe PID 1320 wrote to memory of 2536 1320 vmicsvc.exe PID 1320 wrote to memory of 2536 1320 vmicsvc.exe PID 1320 wrote to memory of 1840 1320 rrinstaller.exe PID 1320 wrote to memory of 1840 1320 rrinstaller.exe PID 1320 wrote to memory of 1840 1320 rrinstaller.exe PID 1320 wrote to memory of 2416 1320 rrinstaller.exe PID 1320 wrote to memory of 2416 1320 rrinstaller.exe PID 1320 wrote to memory of 2416 1320 rrinstaller.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c5ebee5492b4fa991c1d37e5fee02d92ec9afbe2a7e3397829ad7b57f13ea07e.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1760
-
C:\Windows\system32\mspaint.exeC:\Windows\system32\mspaint.exe1⤵PID:2732
-
C:\Users\Admin\AppData\Local\UxCI\mspaint.exeC:\Users\Admin\AppData\Local\UxCI\mspaint.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2872
-
C:\Windows\system32\vmicsvc.exeC:\Windows\system32\vmicsvc.exe1⤵PID:2552
-
C:\Users\Admin\AppData\Local\4tvx\vmicsvc.exeC:\Users\Admin\AppData\Local\4tvx\vmicsvc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2536
-
C:\Windows\system32\rrinstaller.exeC:\Windows\system32\rrinstaller.exe1⤵PID:1840
-
C:\Users\Admin\AppData\Local\T2b\rrinstaller.exeC:\Users\Admin\AppData\Local\T2b\rrinstaller.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2416
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
676KB
MD503ba5f48fbe46aabf8e5552fa2c3d0f9
SHA111ee93181c6d3b1b3b6f521c809d2cebc58787f2
SHA256c6f98fa593f6820241da84047b508b3de5e7433860d742eecc89681dc23655c1
SHA5123f8ea032afc37d4bd7202f76a0c2deca0e9f7ec533f2d443a5a3b582f846cc85301de530e44da1f465dc90917f8cd810804643932c724106a6c22900628583f5
-
Filesize
680KB
MD57d6e8c51c0c58c63406a4c7331600406
SHA11a4979a5bf3eaaf62de869ba8763dd017ad51818
SHA2564ff53b80d4de457e156e1b65e90872931e4b83ad9538eb5334befa99d6d352e9
SHA512cb97a538b2706cf25e52139afce281099726caac8dc29967f7c461b8a33f104f3a1a819b6ef19b53740e1383513c9760aa97c9198e4f9965d160a98171fc8fad
-
Filesize
680KB
MD50c9b805360939a62b2cc880ed29946d1
SHA1c522f42ad51b3ba421556835f8bf9f3f7dab8c3d
SHA25640d32ace0c32ab113703661ebadff54eb120d025a642b69801adbb648972b692
SHA51232185c4381594366035366b281b3ca2e7215712e2bd7b24e15b1f7a8f7428126ddbac52368cf051a66b90a0a90d34fde69765f799f58857d6676a64ae1397670
-
Filesize
1KB
MD5d47d08d8eecf32e4a775f7871727265a
SHA114e139039c7f333369b8908de856144109d9c884
SHA256039e8cdf2db162fcd10902740eb75cc6c9972f5445baa44ce656420190dbf794
SHA5129785c068ead3b99a95a2ac74cf945d314d591f859e6a474f40cf4a93d6193bc24d78b3e34ba3e5799b8b3650c9734aa5ba6ac8792de1c42f2a8a4beaf0ce33e2
-
Filesize
238KB
MD579e14b291ca96a02f1eb22bd721deccd
SHA14c8dbff611acd8a92cd2280239f78bebd2a9947e
SHA256d829166db30923406a025bf33d6a0997be0a3df950114d1f34547a9525b749e8
SHA512f3d1fa7732b6b027bbaf22530331d27ede85f92c9fd64f940139fd262bd7468211a8a54c835d3934b1974b3d8ecddefa79ea77901b9ef49ab36069963693f988
-
Filesize
54KB
MD50d3a73b0b30252680b383532f1758649
SHA19f098d2037e4dd94eca6d04c37b3d4ad8b0cc931
SHA256fc8a992b6ac311e1b1491ec3e31e273a41f7fdf3f68176321307b68489a03fbc
SHA512a7961f4d8d0e07959d1501d721c7751b01af6704c7da5c1f31e40de5372ee6a1fce2f3e0077c8e6a1bed017e11ce4be9b0d17c04e30b222fb3f0df67b870b2d4
-
Filesize
6.4MB
MD5458f4590f80563eb2a0a72709bfc2bd9
SHA13f97dc3bd1467c710c6a8d26b97bb6cf47deb4c6
SHA256ff923c051ae380bf30d749ebe9cf310ccab6572d84eb81b76fb1012bcbdf557f
SHA512e34500658dbe105a704fff6988b75d13aa9931adfd585b8ce1f023c61abd573d58067ee1f43e80076729ba99c9a00c17eb8cfcfac9c3d271d76bd251ccab1681