Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2025 03:53
Static task
static1
Behavioral task
behavioral1
Sample
138cd54735f5ce4b638c5bb68c9e0bf5776cf81d776e46592ef10a9bc58b0277.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
138cd54735f5ce4b638c5bb68c9e0bf5776cf81d776e46592ef10a9bc58b0277.dll
Resource
win10v2004-20241007-en
General
-
Target
138cd54735f5ce4b638c5bb68c9e0bf5776cf81d776e46592ef10a9bc58b0277.dll
-
Size
984KB
-
MD5
89f99b617454ae1d26f9c5614f19fd30
-
SHA1
43194372fae7b50a95e00580ce5d64134e4c1b7d
-
SHA256
138cd54735f5ce4b638c5bb68c9e0bf5776cf81d776e46592ef10a9bc58b0277
-
SHA512
fb0445aba4301466b7c5d8dea9afbf87e0ab5d0bbbcee924d22af97700370f0dd13a80691ab322ffabbbb16e287df160344f5f7a54b1834be2b0fda0089470a3
-
SSDEEP
24576:yWyoHFMVMKkN3ZvxEhb0IsaQ4KriCo0j6Ijg:1nuVMK6vx2RsIKNrj
Malware Config
Signatures
-
Dridex family
-
resource yara_rule behavioral2/memory/3424-5-0x0000000002760000-0x0000000002761000-memory.dmp dridex_stager_shellcode -
Drops startup file 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\ekaK6OMJr Process not Found File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\ekaK6OMJr\Secur32.dll Process not Found File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\ekaK6OMJr\msdt.exe Process not Found -
Executes dropped EXE 3 IoCs
pid Process 3368 msdt.exe 4548 LicensingUI.exe 4680 FXSCOVER.exe -
Loads dropped DLL 3 IoCs
pid Process 3368 msdt.exe 4548 LicensingUI.exe 4680 FXSCOVER.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Rrsphmonwo = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Protect\\fl8CBUXJj\\LicensingUI.exe" Process not Found -
Checks whether UAC is enabled 1 TTPs 4 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FXSCOVER.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msdt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA LicensingUI.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3744 rundll32.exe 3744 rundll32.exe 3744 rundll32.exe 3744 rundll32.exe 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found 3424 Process not Found -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3424 wrote to memory of 976 3424 Process not Found 82 PID 3424 wrote to memory of 976 3424 Process not Found 82 PID 3424 wrote to memory of 3368 3424 Process not Found 83 PID 3424 wrote to memory of 3368 3424 Process not Found 83 PID 3424 wrote to memory of 4700 3424 Process not Found 84 PID 3424 wrote to memory of 4700 3424 Process not Found 84 PID 3424 wrote to memory of 4548 3424 Process not Found 85 PID 3424 wrote to memory of 4548 3424 Process not Found 85 PID 3424 wrote to memory of 3624 3424 Process not Found 86 PID 3424 wrote to memory of 3624 3424 Process not Found 86 PID 3424 wrote to memory of 4680 3424 Process not Found 87 PID 3424 wrote to memory of 4680 3424 Process not Found 87 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\138cd54735f5ce4b638c5bb68c9e0bf5776cf81d776e46592ef10a9bc58b0277.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:3744
-
C:\Windows\system32\msdt.exeC:\Windows\system32\msdt.exe1⤵PID:976
-
C:\Users\Admin\AppData\Local\TAoGUj9TV\msdt.exeC:\Users\Admin\AppData\Local\TAoGUj9TV\msdt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3368
-
C:\Windows\system32\LicensingUI.exeC:\Windows\system32\LicensingUI.exe1⤵PID:4700
-
C:\Users\Admin\AppData\Local\G8hXq\LicensingUI.exeC:\Users\Admin\AppData\Local\G8hXq\LicensingUI.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4548
-
C:\Windows\system32\FXSCOVER.exeC:\Windows\system32\FXSCOVER.exe1⤵PID:3624
-
C:\Users\Admin\AppData\Local\A26\FXSCOVER.exeC:\Users\Admin\AppData\Local\A26\FXSCOVER.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4680
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
242KB
MD55769f78d00f22f76a4193dc720d0b2bd
SHA1d62b6cab057e88737cba43fe9b0c6d11a28b53e8
SHA25640e8e6dabfa1485b11cdccf220eb86eeaa8256e99e344cf2b2098d4cdb788a31
SHA512b4b3448a2635b21690c71254d964832e89bf947f7a0d32e79dcc84730f11d4afb4149a810a768878e52f88fc8baec45f1a2fec8e22c5301e9f39fe4fc6a57e3f
-
Filesize
1012KB
MD556bbff0b8acda583a16acb8705a97063
SHA127a6faebd654325fdd6376a75857b3e675fe49f3
SHA256d4e7974f4cc6328ae7e9b895cd732139bf5a00dd7f0cfdd8ba3510ab3d9d6046
SHA512d370b6b41179576e1c500c748c6123f552cf0d380eb838cb82d378ef6a3334af306682737a67d3001ebad363150fc7667c0fb70d7fe9ad1107c6d3d0222a3108
-
Filesize
1.2MB
MD5b00f4194767b8ce4cc33230b744f56b0
SHA1914142303a297050fd5a5e6ac5503f600d7ae656
SHA2565a4a16a5cdcbde6968239a951e6fe6b5e2df381199ff0cea0ffbe1226c7d451f
SHA5124c347507953be77b639e304731643adb4eb530df80a9a63d60bbde62de32e01d21e86495e8f36d900e64133ad8581ada8d288b27e102d8834a62899b914762f5
-
Filesize
142KB
MD58b4abc637473c79a003d30bb9c7a05e5
SHA1d1cab953c16d4fdec2b53262f56ac14a914558ca
SHA2560e9eb89aa0df9bb84a8f11b0bb3e9d89905355de34c91508968b4cb78bc3f6c5
SHA5125a40c846c5b3a53ae09114709239d8238c322a7d3758b20ed3fc8e097fc1409f62b4990557c1192e894eabfa89741a9d88bd5175850d039b97dfdf380d1c6eeb
-
Filesize
988KB
MD530aa7e4c1d3ffee0bbb71701cf33fcfd
SHA1d80bfc9fa7f362a42c5d8a4a27e10c9c73519e42
SHA2564cb1b8d1e24ffbc758225f5321a15c6480080ed7989a74c8f869e7b3f780dbbd
SHA512c044312f61b86f54a9d44696ca0fb886c80cddb1cee67286b9d6599c1570779edf3dde4dc45a2b6f736a698cedce6bcbfd7cabac983067e4408c2f2366e867c7
-
Filesize
421KB
MD5992c3f0cc8180f2f51156671e027ae75
SHA1942ec8c2ccfcacd75a1cd86cbe8873aee5115e29
SHA2566859d1b5d1beaa2985b298f3fcee67f0aac747687a9dec2b4376585e99e9756f
SHA5121f1b8d39e29274cfc87a9ef1510adb9c530086a421c121523376731c8933c6e234e9146310d3767ce888a8dce7a5713221f4d25e5b7b6398d06ae2be2b99eadf
-
Filesize
1KB
MD5c3b25c7c936c538c0a3e406b03e22c31
SHA1cde73ccb1b4ba8c90771696ee7391fb66ba3850f
SHA256ddeeb9b2386593eb6a46a019c2686cfd6143e33149ee06daf9a5d829d989bb51
SHA512671f0692048ddf79a0e12743546bf196de7b02cc792bf73d021a6585ecbb5810c40fbcb9ee1307883705a3acb98fafd5a1564e7f8e026dbb9ce3969960fd3ac5