Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-10-2024 23:38
Static task
static1
Behavioral task
behavioral1
Sample
db433f70692c1bb245625c99f1860d748aef2021c8918d5f1433ed12a043650a.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db433f70692c1bb245625c99f1860d748aef2021c8918d5f1433ed12a043650a.dll
Resource
win10v2004-20241007-en
General
-
Target
db433f70692c1bb245625c99f1860d748aef2021c8918d5f1433ed12a043650a.dll
-
Size
1.4MB
-
MD5
e74399f942cf0cf81df1e8a4972bb8bb
-
SHA1
13416b3359fb3b1ce03acca069454bb4c228b3f0
-
SHA256
db433f70692c1bb245625c99f1860d748aef2021c8918d5f1433ed12a043650a
-
SHA512
09968cb2afead5f2626ed4c85471ffa0b80fab89066e4662dd07f86824a9873f149fa840950123989fe9fdee44649de6f52a7975da6d57ff29094ddfb4b459d0
-
SSDEEP
12288:DkMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64Cw1:DkMZ+gf4ltGd8H1fYO0q2G1Ahw1
Malware Config
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/1220-4-0x00000000029D0000-0x00000000029D1000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral1/memory/2780-0-0x0000000140000000-0x0000000140167000-memory.dmp dridex_payload behavioral1/memory/1220-27-0x0000000140000000-0x0000000140167000-memory.dmp dridex_payload behavioral1/memory/1220-39-0x0000000140000000-0x0000000140167000-memory.dmp dridex_payload behavioral1/memory/1220-38-0x0000000140000000-0x0000000140167000-memory.dmp dridex_payload behavioral1/memory/2780-47-0x0000000140000000-0x0000000140167000-memory.dmp dridex_payload behavioral1/memory/1812-57-0x0000000140000000-0x000000014016E000-memory.dmp dridex_payload behavioral1/memory/1812-61-0x0000000140000000-0x000000014016E000-memory.dmp dridex_payload behavioral1/memory/2884-73-0x0000000140000000-0x0000000140168000-memory.dmp dridex_payload behavioral1/memory/2884-78-0x0000000140000000-0x0000000140168000-memory.dmp dridex_payload behavioral1/memory/2444-94-0x0000000140000000-0x0000000140168000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 1812 WFS.exe 2884 DWWIN.EXE 2444 psr.exe -
Loads dropped DLL 7 IoCs
pid Process 1220 Process not Found 1812 WFS.exe 1220 Process not Found 2884 DWWIN.EXE 1220 Process not Found 2444 psr.exe 1220 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\Dnfwvyvycst = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\HZYEX\\DWWIN.EXE" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA psr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WFS.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DWWIN.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2780 rundll32.exe 2780 rundll32.exe 2780 rundll32.exe 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found 1220 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1220 wrote to memory of 2268 1220 Process not Found 31 PID 1220 wrote to memory of 2268 1220 Process not Found 31 PID 1220 wrote to memory of 2268 1220 Process not Found 31 PID 1220 wrote to memory of 1812 1220 Process not Found 32 PID 1220 wrote to memory of 1812 1220 Process not Found 32 PID 1220 wrote to memory of 1812 1220 Process not Found 32 PID 1220 wrote to memory of 1976 1220 Process not Found 33 PID 1220 wrote to memory of 1976 1220 Process not Found 33 PID 1220 wrote to memory of 1976 1220 Process not Found 33 PID 1220 wrote to memory of 2884 1220 Process not Found 34 PID 1220 wrote to memory of 2884 1220 Process not Found 34 PID 1220 wrote to memory of 2884 1220 Process not Found 34 PID 1220 wrote to memory of 2828 1220 Process not Found 35 PID 1220 wrote to memory of 2828 1220 Process not Found 35 PID 1220 wrote to memory of 2828 1220 Process not Found 35 PID 1220 wrote to memory of 2444 1220 Process not Found 36 PID 1220 wrote to memory of 2444 1220 Process not Found 36 PID 1220 wrote to memory of 2444 1220 Process not Found 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\db433f70692c1bb245625c99f1860d748aef2021c8918d5f1433ed12a043650a.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:2780
-
C:\Windows\system32\WFS.exeC:\Windows\system32\WFS.exe1⤵PID:2268
-
C:\Users\Admin\AppData\Local\dnmz\WFS.exeC:\Users\Admin\AppData\Local\dnmz\WFS.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1812
-
C:\Windows\system32\DWWIN.EXEC:\Windows\system32\DWWIN.EXE1⤵PID:1976
-
C:\Users\Admin\AppData\Local\uWGH\DWWIN.EXEC:\Users\Admin\AppData\Local\uWGH\DWWIN.EXE1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2884
-
C:\Windows\system32\psr.exeC:\Windows\system32\psr.exe1⤵PID:2828
-
C:\Users\Admin\AppData\Local\Jbn27dXv\psr.exeC:\Users\Admin\AppData\Local\Jbn27dXv\psr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD508835935987a8b42e790e682dd5f5995
SHA1bd9280f2c338c0e69c8d93ee342b96853e979aea
SHA25677ec903e2ab0021d5dea959ef9c0e6ee2c13b217a5f268165cc5a7397b52138e
SHA512653f26b727b8b216cedd2d9f71f355d665526df36b43a3c88f54d94ec0059d03cdb156fd3e7716b9414b000d32de2ff8a22b83fc5d4817c9546a23bb7c34aa62
-
Filesize
1.4MB
MD59085d0a1147ae1d415978ee6c74bda3d
SHA17adfede9aefd04dab291307d0a6d1aa9bf2cb7bb
SHA2565293684e0be2e53999999b9d8eac0468661bd962d5aaa8ccc2d8890cb43a4765
SHA51218134d963a31ed1dc5dac19e21d46d1411979a6e6c05ce495f9004626e077ccfb2cd70b33514987fc466a9a8da55b8339f3aabf1b8242494cada4583a0616da0
-
Filesize
1.4MB
MD55ffa85dd3be922ebc362f20f73a9c8e8
SHA18c99d7cd3be2ea4ef3d08b899c4d85d179f5d394
SHA256f3e255644ef69f3bf7cd729fa3afda1b497a23412591dab1adf3d0d075411fe2
SHA512da979629976d2301258b16fc8c7c667e7b89e8f14bf83f575b00dcbf21f3d6977f6f9db1cdddbb975128b8a635840dbe0fc6c5f8a86f5da45ec7f0f26292d9b7
-
Filesize
1KB
MD549d67e89cc813d8301f9ade690091d82
SHA120143c9bfc023fd37c8855b093428fd1373370c2
SHA25681e91c01dc343829b1e9d9ef432298a436a886eeee917c30eb2cec2fc8d1af76
SHA51213295dd84b8d11fbd958bdc013e7809a52e24b6c26ee6a6df61ca9e75be7c93e9efa84fae9347b76947a0d6546f61ee7b57f2d59b9d6c8e813c6fdd4e58fa442
-
Filesize
715KB
MD5a80527109d75cba125d940b007eea151
SHA1facf32a9ede6abfaa09368bfdfcfec8554107272
SHA25668910f8aae867e938b6a3b76cdf176898ba275d9ade85b4ce00b03232de4c495
SHA51277b86a597c33af8d3fbd9711f4abe6e0ca33b86279b1d28a25dcf3545a34b221be1ad7d11004d016203809cead1ebfd4b7e889ee9df2efc100eabf77963c1774
-
Filesize
951KB
MD5a943d670747778c7597987a4b5b9a679
SHA1c48b760ff9762205386563b93e8884352645ef40
SHA2561a582ebe780abc1143baccaf4910714d3e9f4195edd86939499d03ed6e756610
SHA5123d926ddead8afcb32b52b3eb3c416d197c15e5fff6ba9fa03a31a07522bdb9088b32500fc8b98d82af657071571d09cd336a65cf45c485ebcc145dea70b3a934
-
Filesize
149KB
MD525247e3c4e7a7a73baeea6c0008952b1
SHA18087adb7a71a696139ddc5c5abc1a84f817ab688
SHA256c740497a7e58f7678e25b68b03573b4136a364464ee97c02ce5e0fe00cec7050
SHA512bc27946894e7775f772ac882740430c8b9d3f37a573e2524207f7bb32f44d4a227cb1e9a555e118d68af7f1e129abd2ac5cabbcd8bbf3551c485bae05108324b