Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-01-2025 01:30
Static task
static1
Behavioral task
behavioral1
Sample
5a157047eafbf851e6fe87a68dfb489bf4bac615c2698797b5129fe3a8a6a996.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5a157047eafbf851e6fe87a68dfb489bf4bac615c2698797b5129fe3a8a6a996.dll
Resource
win10v2004-20241007-en
General
-
Target
5a157047eafbf851e6fe87a68dfb489bf4bac615c2698797b5129fe3a8a6a996.dll
-
Size
780KB
-
MD5
8fa9b4c27bd3e4304a59e5e72d68cd9c
-
SHA1
c20c63a23dcda13bea5c22fbee61015cc55018d1
-
SHA256
5a157047eafbf851e6fe87a68dfb489bf4bac615c2698797b5129fe3a8a6a996
-
SHA512
b0ef9910306ed36e8ab3b9db673b503c7e4ee4fe33fa0bed57619a6cc8496e56200451e1d7ec5d7980db9b810bb8fa15b0296c5d757750322b22b240ff1c7e80
-
SSDEEP
12288:nbP23onr2XV7KrPqgmNiQhDOy4/AT4r/E16K1QS/lsHAGHdDvRQ2sd1gqQ:nbe42XV7KWgmjDR/T4a/Mdjm
Malware Config
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/1216-5-0x00000000029B0000-0x00000000029B1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
pid Process 2412 UI0Detect.exe 2700 RDVGHelper.exe 2524 psr.exe -
Loads dropped DLL 7 IoCs
pid Process 1216 Process not Found 2412 UI0Detect.exe 1216 Process not Found 2700 RDVGHelper.exe 1216 Process not Found 2524 psr.exe 1216 Process not Found -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Zoekctxdbskyzr = "C:\\Users\\Admin\\AppData\\Roaming\\MACROM~1\\FLASHP~1\\w1CWv\\RDVGHE~1.EXE" Process not Found -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RDVGHelper.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA psr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA UI0Detect.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1860 rundll32.exe 1860 rundll32.exe 1860 rundll32.exe 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found 1216 Process not Found -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1216 wrote to memory of 1748 1216 Process not Found 28 PID 1216 wrote to memory of 1748 1216 Process not Found 28 PID 1216 wrote to memory of 1748 1216 Process not Found 28 PID 1216 wrote to memory of 2412 1216 Process not Found 29 PID 1216 wrote to memory of 2412 1216 Process not Found 29 PID 1216 wrote to memory of 2412 1216 Process not Found 29 PID 1216 wrote to memory of 2600 1216 Process not Found 30 PID 1216 wrote to memory of 2600 1216 Process not Found 30 PID 1216 wrote to memory of 2600 1216 Process not Found 30 PID 1216 wrote to memory of 2700 1216 Process not Found 31 PID 1216 wrote to memory of 2700 1216 Process not Found 31 PID 1216 wrote to memory of 2700 1216 Process not Found 31 PID 1216 wrote to memory of 2968 1216 Process not Found 32 PID 1216 wrote to memory of 2968 1216 Process not Found 32 PID 1216 wrote to memory of 2968 1216 Process not Found 32 PID 1216 wrote to memory of 2524 1216 Process not Found 33 PID 1216 wrote to memory of 2524 1216 Process not Found 33 PID 1216 wrote to memory of 2524 1216 Process not Found 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\5a157047eafbf851e6fe87a68dfb489bf4bac615c2698797b5129fe3a8a6a996.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1860
-
C:\Windows\system32\UI0Detect.exeC:\Windows\system32\UI0Detect.exe1⤵PID:1748
-
C:\Users\Admin\AppData\Local\ZKzCFba0\UI0Detect.exeC:\Users\Admin\AppData\Local\ZKzCFba0\UI0Detect.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2412
-
C:\Windows\system32\RDVGHelper.exeC:\Windows\system32\RDVGHelper.exe1⤵PID:2600
-
C:\Users\Admin\AppData\Local\omYIaSJi\RDVGHelper.exeC:\Users\Admin\AppData\Local\omYIaSJi\RDVGHelper.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2700
-
C:\Windows\system32\psr.exeC:\Windows\system32\psr.exe1⤵PID:2968
-
C:\Users\Admin\AppData\Local\q7oSWD7eC\psr.exeC:\Users\Admin\AppData\Local\q7oSWD7eC\psr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD53cbdec8d06b9968aba702eba076364a1
SHA16e0fcaccadbdb5e3293aa3523ec1006d92191c58
SHA256b8dab8aa804fc23021bfebd7ae4d40fbe648d6c6ba21cc008e26d1c084972f9b
SHA512a8e434c925ef849ecef0efcb4873dbb95eea2821c967b05afbbe5733071cc2293fc94e7fdf1fdaee51cbcf9885b3b72bfd4d690f23af34558b056920263e465d
-
Filesize
788KB
MD55ae3e956a5123bfdc49f2005df1500cd
SHA1d86c15cca57bae74780aa60c3282189f841b4da9
SHA256e6cd27850d2cdcc9c36218f19a157c1805eb0b8a166e7691ae294dfc58f29515
SHA5122947e6193e674eaa3edb44d6a1f223e3d2d09986463b441ca5285080c86e247b4d674955b6a8a028966b39045720991caabd001a05077ed0fa85bc4d9d931e02
-
Filesize
780KB
MD531a6854f19cc88d23ebf49aca63e8403
SHA1d330b06de39f67b11db0cdd1bc46303f3b91ab7c
SHA256925fe9dc20dd39b94a3aac277b23c21290618662b676605e24dfe12b396b9ad7
SHA512c94939e429128d501f18c003d2da5b63868d225614786a2fece38ebf97f5723040bb08cbdf87283f308f3059972098304e91d49c519d432284528bdbe5087c89
-
Filesize
780KB
MD5b294ac6a4f6687c2d4c9da519c964b3d
SHA18651c15edd438eca517cc78b09565b0b3928d5c2
SHA2562e497f556294cb5fcc23215b6e09061a300177f81a5f75eae322e5deb5f0fcd3
SHA51274d4c40152b6ef22b3f515a52e36ab9b3e1939fd8a8f2900c0a3e7f12d6aff8114e02c7d42bea5fd908fe6346d46218624b689308ef249f4689c33b008db4961
-
Filesize
715KB
MD5a80527109d75cba125d940b007eea151
SHA1facf32a9ede6abfaa09368bfdfcfec8554107272
SHA25668910f8aae867e938b6a3b76cdf176898ba275d9ade85b4ce00b03232de4c495
SHA51277b86a597c33af8d3fbd9711f4abe6e0ca33b86279b1d28a25dcf3545a34b221be1ad7d11004d016203809cead1ebfd4b7e889ee9df2efc100eabf77963c1774
-
Filesize
1KB
MD5e02d292e4f70206353bd3c26279eda8f
SHA127811e73db0091bd012f77d47925bf7e5a48663e
SHA2569e472022268c63ed2754ab7d233f003c498d95927afc1bb76a1cbb4a977b034e
SHA512d3870706817249fee5acb20961517dbffdf74f9865c4c996f3f0b89d408c5a5a1f8ae9ca8e60606bcaebffe7556f050e186f58e1bb993e793f623d163f4296be
-
Filesize
93KB
MD553fda4af81e7c4895357a50e848b7cfe
SHA101fb2d0210f1c47aaf684e31a9fb78f89bba9c0f
SHA25662ab8c2c5b5bd84fd07e96b6a3b87a4ea56946107ed9b7f8076580ae1fefd038
SHA512dbbda90a57d27160c5a3a5e4e94cfc43b1663fcbfe424fdec851e52356f61492bdcf677c46be8aa4e8ccc8be7c389b6aa7bbbce8447e1fae32f03e5e409f4051