Analysis
-
max time kernel
150s -
max time network
158s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18/02/2025, 21:55
Static task
static1
Behavioral task
behavioral1
Sample
3bb3888ef9a0a1f5a252f43431f3c25c4f4265c0834a114b1ae1a2faee5b5dfa.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3bb3888ef9a0a1f5a252f43431f3c25c4f4265c0834a114b1ae1a2faee5b5dfa.dll
Resource
win10v2004-20250217-en
General
-
Target
3bb3888ef9a0a1f5a252f43431f3c25c4f4265c0834a114b1ae1a2faee5b5dfa.dll
-
Size
608KB
-
MD5
b97901b96456a2d1574acd475800a052
-
SHA1
9c1898dec863ab35f8271b3dbbbc56fb0321bea4
-
SHA256
3bb3888ef9a0a1f5a252f43431f3c25c4f4265c0834a114b1ae1a2faee5b5dfa
-
SHA512
72c745badd19fbff29ed18bb416ebbb362ba89e24185e3e39bd2b0f18536c9f35f5518298883138bd84abd3ddbd51f19bb2a15b18625bb6c7d8960fe9f9f4f32
-
SSDEEP
6144:ug12AzW5HsiScvtNybiR8g0ISTFCRVe9/JE+++sKS1JGWWsca65eu9K2zqc4CWAZ:u82AK5HOEksJ1YW7DwzqyQ
Malware Config
Signatures
-
Dridex family
-
resource yara_rule behavioral1/memory/2472-0-0x0000000074A00000-0x0000000074A98000-memory.dmp dridex_ldr_dmod behavioral1/memory/2472-3-0x0000000074A00000-0x0000000074A98000-memory.dmp dridex_ldr_dmod -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 22 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe 2472 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeShutdownPrivilege 2956 explorer.exe Token: SeShutdownPrivilege 2956 explorer.exe Token: SeShutdownPrivilege 2908 explorer.exe Token: SeShutdownPrivilege 2908 explorer.exe Token: SeShutdownPrivilege 2616 explorer.exe Token: SeShutdownPrivilege 2752 explorer.exe Token: SeShutdownPrivilege 2752 explorer.exe Token: SeShutdownPrivilege 2560 explorer.exe Token: SeShutdownPrivilege 2560 explorer.exe Token: SeShutdownPrivilege 1660 explorer.exe Token: SeShutdownPrivilege 1660 explorer.exe Token: SeShutdownPrivilege 2012 explorer.exe Token: SeShutdownPrivilege 2012 explorer.exe Token: SeShutdownPrivilege 3056 explorer.exe Token: SeShutdownPrivilege 2836 explorer.exe Token: SeShutdownPrivilege 2836 explorer.exe Token: SeShutdownPrivilege 2836 explorer.exe Token: SeShutdownPrivilege 2836 explorer.exe Token: SeShutdownPrivilege 2836 explorer.exe Token: SeShutdownPrivilege 1976 explorer.exe Token: SeShutdownPrivilege 1976 explorer.exe Token: SeShutdownPrivilege 2112 explorer.exe Token: SeShutdownPrivilege 2112 explorer.exe Token: SeShutdownPrivilege 2564 explorer.exe Token: SeShutdownPrivilege 2564 explorer.exe Token: SeShutdownPrivilege 1072 explorer.exe Token: SeShutdownPrivilege 1072 explorer.exe Token: SeShutdownPrivilege 2160 explorer.exe Token: SeShutdownPrivilege 792 explorer.exe Token: SeShutdownPrivilege 792 explorer.exe Token: SeShutdownPrivilege 1192 explorer.exe Token: SeShutdownPrivilege 1192 explorer.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe 2836 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2448 wrote to memory of 2472 2448 rundll32.exe 29 PID 2448 wrote to memory of 2472 2448 rundll32.exe 29 PID 2448 wrote to memory of 2472 2448 rundll32.exe 29 PID 2448 wrote to memory of 2472 2448 rundll32.exe 29 PID 2448 wrote to memory of 2472 2448 rundll32.exe 29 PID 2448 wrote to memory of 2472 2448 rundll32.exe 29 PID 2448 wrote to memory of 2472 2448 rundll32.exe 29 PID 2472 wrote to memory of 2944 2472 rundll32.exe 31 PID 2472 wrote to memory of 2944 2472 rundll32.exe 31 PID 2472 wrote to memory of 2944 2472 rundll32.exe 31 PID 2472 wrote to memory of 2944 2472 rundll32.exe 31 PID 2472 wrote to memory of 2908 2472 rundll32.exe 32 PID 2472 wrote to memory of 2908 2472 rundll32.exe 32 PID 2472 wrote to memory of 2908 2472 rundll32.exe 32 PID 2472 wrote to memory of 2908 2472 rundll32.exe 32 PID 2472 wrote to memory of 2616 2472 rundll32.exe 33 PID 2472 wrote to memory of 2616 2472 rundll32.exe 33 PID 2472 wrote to memory of 2616 2472 rundll32.exe 33 PID 2472 wrote to memory of 2616 2472 rundll32.exe 33 PID 2472 wrote to memory of 2752 2472 rundll32.exe 34 PID 2472 wrote to memory of 2752 2472 rundll32.exe 34 PID 2472 wrote to memory of 2752 2472 rundll32.exe 34 PID 2472 wrote to memory of 2752 2472 rundll32.exe 34 PID 2472 wrote to memory of 2604 2472 rundll32.exe 35 PID 2472 wrote to memory of 2604 2472 rundll32.exe 35 PID 2472 wrote to memory of 2604 2472 rundll32.exe 35 PID 2472 wrote to memory of 2604 2472 rundll32.exe 35 PID 2472 wrote to memory of 2560 2472 rundll32.exe 36 PID 2472 wrote to memory of 2560 2472 rundll32.exe 36 PID 2472 wrote to memory of 2560 2472 rundll32.exe 36 PID 2472 wrote to memory of 2560 2472 rundll32.exe 36 PID 2472 wrote to memory of 1660 2472 rundll32.exe 37 PID 2472 wrote to memory of 1660 2472 rundll32.exe 37 PID 2472 wrote to memory of 1660 2472 rundll32.exe 37 PID 2472 wrote to memory of 1660 2472 rundll32.exe 37 PID 2472 wrote to memory of 2012 2472 rundll32.exe 38 PID 2472 wrote to memory of 2012 2472 rundll32.exe 38 PID 2472 wrote to memory of 2012 2472 rundll32.exe 38 PID 2472 wrote to memory of 2012 2472 rundll32.exe 38 PID 2472 wrote to memory of 2816 2472 rundll32.exe 39 PID 2472 wrote to memory of 2816 2472 rundll32.exe 39 PID 2472 wrote to memory of 2816 2472 rundll32.exe 39 PID 2472 wrote to memory of 2816 2472 rundll32.exe 39 PID 2472 wrote to memory of 3056 2472 rundll32.exe 40 PID 2472 wrote to memory of 3056 2472 rundll32.exe 40 PID 2472 wrote to memory of 3056 2472 rundll32.exe 40 PID 2472 wrote to memory of 3056 2472 rundll32.exe 40 PID 2472 wrote to memory of 2368 2472 rundll32.exe 41 PID 2472 wrote to memory of 2368 2472 rundll32.exe 41 PID 2472 wrote to memory of 2368 2472 rundll32.exe 41 PID 2472 wrote to memory of 2368 2472 rundll32.exe 41 PID 2472 wrote to memory of 2836 2472 rundll32.exe 42 PID 2472 wrote to memory of 2836 2472 rundll32.exe 42 PID 2472 wrote to memory of 2836 2472 rundll32.exe 42 PID 2472 wrote to memory of 2836 2472 rundll32.exe 42 PID 2472 wrote to memory of 1176 2472 rundll32.exe 43 PID 2472 wrote to memory of 1176 2472 rundll32.exe 43 PID 2472 wrote to memory of 1176 2472 rundll32.exe 43 PID 2472 wrote to memory of 1176 2472 rundll32.exe 43 PID 2472 wrote to memory of 1976 2472 rundll32.exe 44 PID 2472 wrote to memory of 1976 2472 rundll32.exe 44 PID 2472 wrote to memory of 1976 2472 rundll32.exe 44 PID 2472 wrote to memory of 1976 2472 rundll32.exe 44 PID 2472 wrote to memory of 2252 2472 rundll32.exe 45
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3bb3888ef9a0a1f5a252f43431f3c25c4f4265c0834a114b1ae1a2faee5b5dfa.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3bb3888ef9a0a1f5a252f43431f3c25c4f4265c0834a114b1ae1a2faee5b5dfa.dll,#12⤵
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵PID:2944
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Suspicious use of AdjustPrivilegeToken
PID:2908
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
PID:2604
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Suspicious use of AdjustPrivilegeToken
PID:2012
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
PID:2816
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
PID:2368
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2836
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
PID:1176
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Suspicious use of AdjustPrivilegeToken
PID:1976
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵PID:2252
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Suspicious use of AdjustPrivilegeToken
PID:2112
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Suspicious use of AdjustPrivilegeToken
PID:2564
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵PID:2640
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Suspicious use of AdjustPrivilegeToken
PID:2160
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
PID:2480
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Suspicious use of AdjustPrivilegeToken
PID:792
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
PID:1836
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Suspicious use of AdjustPrivilegeToken
PID:1192
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"3⤵PID:584
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
C:\Windows\explorer.exeexplorer.exe1⤵PID:2384