Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2024 00:40
Static task
static1
Behavioral task
behavioral1
Sample
f4a8f6ec846b2fbe5edf0dc402093eceb69b87819e58953cada2d3c410c1476b.dll
Resource
win7-20240903-en
General
-
Target
f4a8f6ec846b2fbe5edf0dc402093eceb69b87819e58953cada2d3c410c1476b.dll
-
Size
1.4MB
-
MD5
16bb8e25d3d2f866cbf6826bb90fd325
-
SHA1
ce86cea88918e556a9d0d2061c332da8e7513623
-
SHA256
f4a8f6ec846b2fbe5edf0dc402093eceb69b87819e58953cada2d3c410c1476b
-
SHA512
53321d6e37c9be3be9970ec3a69d84c049e022d071e47a03b922149b453493f531eb4f2afbaee0110d2ba4b87414c653015dd7f85d31fb41848063891b6bee72
-
SSDEEP
12288:TkMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64C:TkMZ+gf4ltGd8H1fYO0q2G1Ah
Malware Config
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/3472-3-0x00000000006A0000-0x00000000006A1000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral2/memory/744-2-0x0000000140000000-0x0000000140168000-memory.dmp dridex_payload behavioral2/memory/3472-38-0x0000000140000000-0x0000000140168000-memory.dmp dridex_payload behavioral2/memory/3472-26-0x0000000140000000-0x0000000140168000-memory.dmp dridex_payload behavioral2/memory/744-41-0x0000000140000000-0x0000000140168000-memory.dmp dridex_payload behavioral2/memory/2844-48-0x0000000140000000-0x0000000140169000-memory.dmp dridex_payload behavioral2/memory/2844-53-0x0000000140000000-0x0000000140169000-memory.dmp dridex_payload behavioral2/memory/2304-65-0x0000000140000000-0x00000001401AE000-memory.dmp dridex_payload behavioral2/memory/2304-68-0x0000000140000000-0x00000001401AE000-memory.dmp dridex_payload behavioral2/memory/632-83-0x0000000140000000-0x0000000140169000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 2844 GamePanel.exe 2304 LockScreenContentServer.exe 632 phoneactivate.exe -
Loads dropped DLL 3 IoCs
pid Process 2844 GamePanel.exe 2304 LockScreenContentServer.exe 632 phoneactivate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Sarxmtvezib = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\CloudStore\\tRMRAUXTi\\LockScreenContentServer.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA GamePanel.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LockScreenContentServer.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA phoneactivate.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 744 rundll32.exe 744 rundll32.exe 744 rundll32.exe 744 rundll32.exe 744 rundll32.exe 744 rundll32.exe 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found 3472 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3472 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3472 wrote to memory of 4580 3472 Process not Found 94 PID 3472 wrote to memory of 4580 3472 Process not Found 94 PID 3472 wrote to memory of 2844 3472 Process not Found 95 PID 3472 wrote to memory of 2844 3472 Process not Found 95 PID 3472 wrote to memory of 4420 3472 Process not Found 96 PID 3472 wrote to memory of 4420 3472 Process not Found 96 PID 3472 wrote to memory of 2304 3472 Process not Found 97 PID 3472 wrote to memory of 2304 3472 Process not Found 97 PID 3472 wrote to memory of 1760 3472 Process not Found 98 PID 3472 wrote to memory of 1760 3472 Process not Found 98 PID 3472 wrote to memory of 632 3472 Process not Found 99 PID 3472 wrote to memory of 632 3472 Process not Found 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f4a8f6ec846b2fbe5edf0dc402093eceb69b87819e58953cada2d3c410c1476b.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:744
-
C:\Windows\system32\GamePanel.exeC:\Windows\system32\GamePanel.exe1⤵PID:4580
-
C:\Users\Admin\AppData\Local\136AXmgin\GamePanel.exeC:\Users\Admin\AppData\Local\136AXmgin\GamePanel.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2844
-
C:\Windows\system32\LockScreenContentServer.exeC:\Windows\system32\LockScreenContentServer.exe1⤵PID:4420
-
C:\Users\Admin\AppData\Local\pYO0\LockScreenContentServer.exeC:\Users\Admin\AppData\Local\pYO0\LockScreenContentServer.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2304
-
C:\Windows\system32\phoneactivate.exeC:\Windows\system32\phoneactivate.exe1⤵PID:1760
-
C:\Users\Admin\AppData\Local\KLJBz\phoneactivate.exeC:\Users\Admin\AppData\Local\KLJBz\phoneactivate.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:632
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD5266f6a62c16f6a889218800762b137be
SHA131b9bd85a37bf0cbb38a1c30147b83671458fa72
SHA25671f8f11f26f3a7c1498373f20f0f4cc960513d0383fe24906eeb1bc9678beecd
SHA512b21d9b0656ab6bd3b158922722a332f07096ddd4215c802776c5807c9cf6ece40082dd986ea6867bdc8d22878ce035a5c8dfcc26cfae94aeee059701b6bf1e68
-
Filesize
1.4MB
MD59391d234bb4274b2c0414314a8859435
SHA1c7c44beb9505684f4aa7dae1117f0ff69271a03e
SHA256b0ab5fd782895700f124a98171eee6f8f8ab5f8cc521e11150604c59f724abd6
SHA512223be985c16bec3b03dc51d7f5e166a0fec003b8fe92a25cbdfcfc2b8a26e584ee3ec3b5543d5bbda209ef8030515c75f1791caa225a0a88840afa620cc7e296
-
Filesize
1.4MB
MD5720c29480b3aed150eca83543a19d247
SHA1a5b1074a260d44629b55c6508c1f0d396016139f
SHA25684f4bc85660d4a037d9f6ef505c20094118227f1961628df6c168177131ed88c
SHA512aedb451d1b310a20338486664cae1090ef6bebc3227a34918a06c077217141fb46d737fc3b519c737469dc7f6c2d8ffdd6f3c014ae5dd0138a6e941b217789bb
-
Filesize
107KB
MD532c31f06e0b68f349f68afdd08e45f3d
SHA1e4b642f887e2c1d76b6b4777ade91e3cb3b9e27c
SHA256cea83eb34233fed5ebeef8745c7c581a8adbefbcfc0e30e2d30a81000c821017
SHA512fe61764b471465b164c9c2202ed349605117d57ceb0eca75acf8bda44e8744c115767ee0caed0b7feb70ba37b477d00805b3fdf0d0fa879dd4c8e3c1dc1c0d26
-
Filesize
1.7MB
MD58429224785bdf1f04940cf12bdbdd011
SHA195c3c51c9ef75baea0be4994ae4b58d75c115a31
SHA256ea6edce782447b73fb0dfac48647c874043d0a389ad318950c75755cb6b7c153
SHA5124f0eb4b82b83073faabf17e40cbc09f798ad709ff65294b4b58cc047a6dd5d62fccc5c68b07af8e659911ba3c5074224c8245feb18202915c0161fdf07429165
-
Filesize
47KB
MD5a0b7513c98cf46ca2cea3a567fec137c
SHA12307fc8e3fc620ea3c2fdc6248ad4658479ba995
SHA256cb2278884f04fd34753f7a20e5865ef5fc4fa47c28df9ac14ad6e922713af8c6
SHA5123928485a60ffa7f2d2b7d0be51863e1f8197578cfb397f1086a1ab5132843a23bbc4042b04b5d01fafad04878bd839161fa492d0cf1a6bac6be92023cdee3d15
-
Filesize
1KB
MD597fac52aed2427138fc23b66d70a1ee1
SHA11a5adc5953c07845cc0b7bb33413b9ff068db64f
SHA2565fb1e29f94942233e60e83549c563cb770d1db475e26240e15cf4b352a9cb01f
SHA51205df578c69ca4b9fbbb10967d00f7a0b4790086d6040c91109ce9d2de11e47ece4bcee49651d75855b30f578f634517092bbeab110cc2f63aff5b3b14beaaea8