Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 02:59
Static task
static1
Behavioral task
behavioral1
Sample
a13857d5df595b8238d68d39bd116e7a78d3ef19ee2644bd1ce4f498b8cbdffd.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a13857d5df595b8238d68d39bd116e7a78d3ef19ee2644bd1ce4f498b8cbdffd.dll
Resource
win10v2004-20241007-en
General
-
Target
a13857d5df595b8238d68d39bd116e7a78d3ef19ee2644bd1ce4f498b8cbdffd.dll
-
Size
676KB
-
MD5
3a326af7f81639f667ee14de69537a21
-
SHA1
66c8fed72543d4c155411dc08dd21e615e2dec8d
-
SHA256
a13857d5df595b8238d68d39bd116e7a78d3ef19ee2644bd1ce4f498b8cbdffd
-
SHA512
15c4efe13cfedba6e9def41216acb062cae4ae59338c1878ce97507c980b771c2b332d34885ece2444e0210e7f21e79cbbb57ecf1a111e3e0f8939749c27de4f
-
SSDEEP
6144:R34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTa:RIKp/UWCZdCDh2IZDwAFRpR6Au
Malware Config
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/3420-3-0x00000000038E0000-0x00000000038E1000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral2/memory/4592-0-0x00007FFD410F0000-0x00007FFD41199000-memory.dmp dridex_payload behavioral2/memory/3420-36-0x0000000140000000-0x00000001400A9000-memory.dmp dridex_payload behavioral2/memory/3420-25-0x0000000140000000-0x00000001400A9000-memory.dmp dridex_payload behavioral2/memory/3420-17-0x0000000140000000-0x00000001400A9000-memory.dmp dridex_payload behavioral2/memory/4592-39-0x00007FFD410F0000-0x00007FFD41199000-memory.dmp dridex_payload behavioral2/memory/4196-47-0x00007FFD30A60000-0x00007FFD30B0A000-memory.dmp dridex_payload behavioral2/memory/4196-51-0x00007FFD30A60000-0x00007FFD30B0A000-memory.dmp dridex_payload behavioral2/memory/4560-63-0x00007FFD30810000-0x00007FFD308BB000-memory.dmp dridex_payload behavioral2/memory/4560-67-0x00007FFD30810000-0x00007FFD308BB000-memory.dmp dridex_payload behavioral2/memory/2840-82-0x00007FFD30A60000-0x00007FFD30B0A000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 4196 BdeUISrv.exe 4560 DisplaySwitch.exe 2840 psr.exe -
Loads dropped DLL 3 IoCs
pid Process 4196 BdeUISrv.exe 4560 DisplaySwitch.exe 2840 psr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Nzvdnevrdk = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\OneNote\\zX\\DisplaySwitch.exe" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BdeUISrv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DisplaySwitch.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA psr.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Process not Found Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4592 rundll32.exe 4592 rundll32.exe 4592 rundll32.exe 4592 rundll32.exe 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found 3420 Process not Found -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeShutdownPrivilege 3420 Process not Found Token: SeCreatePagefilePrivilege 3420 Process not Found Token: SeShutdownPrivilege 3420 Process not Found Token: SeCreatePagefilePrivilege 3420 Process not Found Token: SeShutdownPrivilege 3420 Process not Found Token: SeCreatePagefilePrivilege 3420 Process not Found Token: SeShutdownPrivilege 3420 Process not Found Token: SeCreatePagefilePrivilege 3420 Process not Found -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3420 Process not Found 3420 Process not Found -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3420 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3420 wrote to memory of 4240 3420 Process not Found 95 PID 3420 wrote to memory of 4240 3420 Process not Found 95 PID 3420 wrote to memory of 4196 3420 Process not Found 96 PID 3420 wrote to memory of 4196 3420 Process not Found 96 PID 3420 wrote to memory of 4760 3420 Process not Found 97 PID 3420 wrote to memory of 4760 3420 Process not Found 97 PID 3420 wrote to memory of 4560 3420 Process not Found 98 PID 3420 wrote to memory of 4560 3420 Process not Found 98 PID 3420 wrote to memory of 2808 3420 Process not Found 99 PID 3420 wrote to memory of 2808 3420 Process not Found 99 PID 3420 wrote to memory of 2840 3420 Process not Found 100 PID 3420 wrote to memory of 2840 3420 Process not Found 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a13857d5df595b8238d68d39bd116e7a78d3ef19ee2644bd1ce4f498b8cbdffd.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:4592
-
C:\Windows\system32\BdeUISrv.exeC:\Windows\system32\BdeUISrv.exe1⤵PID:4240
-
C:\Users\Admin\AppData\Local\Ps3p\BdeUISrv.exeC:\Users\Admin\AppData\Local\Ps3p\BdeUISrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4196
-
C:\Windows\system32\DisplaySwitch.exeC:\Windows\system32\DisplaySwitch.exe1⤵PID:4760
-
C:\Users\Admin\AppData\Local\jtSd\DisplaySwitch.exeC:\Users\Admin\AppData\Local\jtSd\DisplaySwitch.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4560
-
C:\Windows\system32\psr.exeC:\Windows\system32\psr.exe1⤵PID:2808
-
C:\Users\Admin\AppData\Local\aN9lNz\psr.exeC:\Users\Admin\AppData\Local\aN9lNz\psr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2840
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD58595075667ff2c9a9f9e2eebc62d8f53
SHA1c48b54e571f05d4e21d015bb3926c2129f19191a
SHA25620b05c77f898be08737082e969b39f54fa39753c8c0a06142eb7ad5e0764a2db
SHA512080dbcdd9234c07efe6cea4919ffa305fdc381ccebed9d1020dd6551b54e20e52387e62a344502fa4a85249defd0f9b506528b8dd34675bc9f51f664b8fc4d88
-
Filesize
680KB
MD529edbdf30fe35da6da96f104f9100fa8
SHA16e77f56b03d9bcf0b11d550130917fb406f36b50
SHA2561a00664a01dcf382c51f22e3ca6edf3335b5f2cb125b62d74cab76548eef8886
SHA5125f0ba3a55cb0a263d06e5c1640103f57827e36949d95c12285a36d8df1a74de43e39e7d7b00d1b1ce290530ab98951fcf054248ac33a93c6089621a04207bee2
-
Filesize
680KB
MD5b0548066e9c742c12b17ccd11229fa47
SHA15edfcbe1a211788e67b40a556e691f363dec98eb
SHA256b629a99d50504dfc5507b618bef7422f837a7b09fe8a664f821699a265983a06
SHA512c3aaf2f27107bcc4fa690f2d81a60a2027957cdd6c1ee6cf9b879a557163c693fb4908f533e3fbbef231f650a67dc3c31f35d9f5a4701e21dc1191498ce68767
-
Filesize
232KB
MD5ad53ead5379985081b7c3f1f357e545a
SHA16f5aa32c1d15fbf073558fadafd046d97b60184e
SHA2564f0144f0e3e721b44babbf41b513942e4117f730546105480571f9c8fce56a1f
SHA512433098bd74c34fbadfa447ef45cfa9dc076aef4cf7f2a0a6fe79d5e67f2504eebe8aa31fc1b7a4c5eeb20ede2c5485f75ad0fd77b4ecba3d68ca63313e6f6ea0
-
Filesize
1.8MB
MD55338d4beddf23db817eb5c37500b5735
SHA11b5c56f00b53fca3205ff24770203af46cbc7c54
SHA2568b581f1d15a6920e4ecfe172d8ef753d0a2bf1a47e686a8d5d8e01147fa4c65e
SHA512173170b83e0048ee05da18c0c957744204954da58a93c532b669d62edb632c4c73d0744c13eb864ecf357ff12831aa46c4f2445dc33b62a4547385b9e0297b0c
-
Filesize
684KB
MD5499cc8bcdda7e180990296a7fc66f60b
SHA109d5e30db86a37c97fc169a7fc472a0fba57d5ee
SHA256b8f0af7f46a77ea7b405e6350ccc95979033b958047982f65077a22831c530dd
SHA512798f7c79293d08ace1319ffca230f9619c09648b518671f43c999f009bf42a3a32ea40ccf12d9527b97d2aaf309ccb6989b29ef5ee6237270255eb8cc1b3d87a
-
Filesize
1KB
MD5dd1c0f03009c8983e3a347c73df6baaf
SHA175665355bd97896073baa615ff226bba155998cb
SHA256475d07e282844f0921ef177bda1cd5a9b95f38df16d63a64ee606089aad08ce8
SHA512bcdd5227b78d284439f47980833641ab54349775c141a72af4acda1e5e4523e813ed215eef2683f525982276e2be3de56724fce383431c9b6d5e5c3d0d77bdb7