Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2025 16:16
Static task
static1
Behavioral task
behavioral1
Sample
dac160c6d30f4ea4ee0bfa29faf72f93de7bf24340286ad025ab16fb007a17f1.dll
Resource
win7-20240903-en
General
-
Target
dac160c6d30f4ea4ee0bfa29faf72f93de7bf24340286ad025ab16fb007a17f1.dll
-
Size
716KB
-
MD5
1495a2d3a5052564d2318936861a0530
-
SHA1
df2db259ff86f00d6b52836e757565346cb77f48
-
SHA256
dac160c6d30f4ea4ee0bfa29faf72f93de7bf24340286ad025ab16fb007a17f1
-
SHA512
5319b738bb4922b00e5ad97708c83ce0bc8166b04ed24c89d2f50c510f6e91777bc9c1e04e48ceed6363cfe52abf34dd31186099251da3899b18456b4d4a0d59
-
SSDEEP
12288:ROCRucgLs3bu9FRcOL5yEPAIiCj6ELV32KrXZiQJ8cXFpoTj:cCroYbu9FvAEPAIiy6ELV32KlFs
Malware Config
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/3520-3-0x00000000023F0000-0x00000000023F1000-memory.dmp dridex_stager_shellcode -
resource yara_rule behavioral2/memory/1656-0-0x0000000140000000-0x00000001400B3000-memory.dmp dridex_payload behavioral2/memory/3520-35-0x0000000140000000-0x00000001400B3000-memory.dmp dridex_payload behavioral2/memory/3520-23-0x0000000140000000-0x00000001400B3000-memory.dmp dridex_payload behavioral2/memory/1656-38-0x0000000140000000-0x00000001400B3000-memory.dmp dridex_payload behavioral2/memory/3156-45-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral2/memory/3156-50-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral2/memory/3624-62-0x0000000140000000-0x00000001400B5000-memory.dmp dridex_payload behavioral2/memory/3624-66-0x0000000140000000-0x00000001400B5000-memory.dmp dridex_payload behavioral2/memory/2992-81-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
pid Process 3156 CustomShellHost.exe 3624 bdeunlock.exe 2992 rdpinput.exe -
Loads dropped DLL 3 IoCs
pid Process 3156 CustomShellHost.exe 3624 bdeunlock.exe 2992 rdpinput.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Pzfwfhktmuesbir = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\TEMPLA~1\\LIVECO~1\\16\\User\\WORDDO~1\\CRPU7H~1\\BDEUNL~1.EXE" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CustomShellHost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bdeunlock.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpinput.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1656 rundll32.exe 1656 rundll32.exe 1656 rundll32.exe 1656 rundll32.exe 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found 3520 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3520 wrote to memory of 916 3520 Process not Found 91 PID 3520 wrote to memory of 916 3520 Process not Found 91 PID 3520 wrote to memory of 3156 3520 Process not Found 92 PID 3520 wrote to memory of 3156 3520 Process not Found 92 PID 3520 wrote to memory of 1544 3520 Process not Found 95 PID 3520 wrote to memory of 1544 3520 Process not Found 95 PID 3520 wrote to memory of 3624 3520 Process not Found 96 PID 3520 wrote to memory of 3624 3520 Process not Found 96 PID 3520 wrote to memory of 5076 3520 Process not Found 101 PID 3520 wrote to memory of 5076 3520 Process not Found 101 PID 3520 wrote to memory of 2992 3520 Process not Found 102 PID 3520 wrote to memory of 2992 3520 Process not Found 102 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dac160c6d30f4ea4ee0bfa29faf72f93de7bf24340286ad025ab16fb007a17f1.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1656
-
C:\Windows\system32\CustomShellHost.exeC:\Windows\system32\CustomShellHost.exe1⤵PID:916
-
C:\Users\Admin\AppData\Local\sLIOK\CustomShellHost.exeC:\Users\Admin\AppData\Local\sLIOK\CustomShellHost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3156
-
C:\Windows\system32\bdeunlock.exeC:\Windows\system32\bdeunlock.exe1⤵PID:1544
-
C:\Users\Admin\AppData\Local\Jj3X\bdeunlock.exeC:\Users\Admin\AppData\Local\Jj3X\bdeunlock.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3624
-
C:\Windows\system32\rdpinput.exeC:\Windows\system32\rdpinput.exe1⤵PID:5076
-
C:\Users\Admin\AppData\Local\KrFAc2tbA\rdpinput.exeC:\Users\Admin\AppData\Local\KrFAc2tbA\rdpinput.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2992
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
724KB
MD5f7d79acefecc3ae0ef9fc29c73fade0f
SHA1041130a0aa6c5eebaa6ab062bf611eeaf4563ae9
SHA256424973afd72b81b5dac38cc1ab6778fdc7a2ab160490cec08798b948862d02c0
SHA5127c7cc10aa40fe96b40954954101fdb3a62e20640688a64dc9517eff10f3006e92e2cd09ae35614c2d0b46e4af22e6f9b7ef68a26174495eb129c555ae9e84e5c
-
Filesize
279KB
MD5fef5d67150c249db3c1f4b30a2a5a22e
SHA141ca037b0229be9338da4d78244b4f0ea5a3d5f3
SHA256dcfdd67bf3244ff86cadaaea50b43cce5479014ea2021c0c2fb40b7c856e5603
SHA5124ded9ca87d9d30c31ab2baededaa6e26681741ea1742d80c318173536c643a01bc049e03a03c3b45b3cb8860464a855830e12e87670503e65eedcdd5e9b2d1e7
-
Filesize
720KB
MD5f30e08ba88a4c7b250a5c11f8ef3d9a6
SHA1559b1cb31e75c692da3e93e4dacf5413aed19511
SHA2568a87b2d285eb23e525153bc89c1d25d520fbee848c9cf9eb94687e088a1f0c28
SHA51202e7616173960b0c76fbcea9a8b945e284cacee65ea8dfb8f65acb02a7abdf509393e927440b2b6fd1e5fa1f4b1c9503a88868fa5cfccec8054f9a5f567e7c56
-
Filesize
180KB
MD5bd99eeca92869f9a3084d689f335c734
SHA1a2839f6038ea50a4456cd5c2a3ea003e7b77688c
SHA25639bfb2214efeed47f4f5e50e6dff05541e29caeb27966520bdadd52c3d5e7143
SHA512355433c3bbbaa3bcb849633d45713d8a7ac6f87a025732fbe83e259ec3a0cb4eabb18239df26609453f9fc6764c7276c5d0472f11cf12d15ef806aa7594d090e
-
Filesize
835KB
MD570400e78b71bc8efdd063570428ae531
SHA1cd86ecd008914fdd0389ac2dc00fe92d87746096
SHA25691333f3282a2420359ae9d3adf537688741d21e964f021e2b152ab293447f289
SHA51253005dda237fb23af79f54779c74a09835ad4cad3ca7b9dcec80e3793a60dd262f45b910bef96ab9c8e69d0c6990fea6ca5fee85d7f8425db523ae658372959e
-
Filesize
720KB
MD536b09f8671f5eda1cd02bb4ba3d3db48
SHA1a53f0e65957e053a3af70f4a23d21cd9d1a7922f
SHA2564b395e492f5a66e4b889b3cd7af81d8d6feca62bec8b8a796fe36e6bf1913ce8
SHA51246fd44ca7da8f484f2b56f17ebc591c606f1ba1a3c38c31063ed193ea9e88d5ec71634a468c56ec288d78e86f4be99bf2a4ca20c37a05817be589a6ec3d915fb
-
Filesize
1KB
MD58c4a34b99805d0b52ebe3b8dbb2ec818
SHA18e850a1356bd1ce6e27e05704d12e69805bbde70
SHA25679efde1942445e5df976e37c2f69cd854edfdfcf54c797630f968656964f08ed
SHA51254960a87d6804eb6994d8c62babb7d4b623999040cef772cea68fea795be50f6e7c4e221f101220df79142c8f6aaa4f753cd2d012f11b65eb39822b3301d6256