Resubmissions
Analysis
-
max time kernel
149s -
max time network
133s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
14-07-2020 05:12
Static task
static1
Behavioral task
behavioral1
Sample
DUI70.dll
Resource
win7
General
-
Target
DUI70.dll
-
Size
1.2MB
-
MD5
ca7f847ac49ea5ec058b9455bacbb326
-
SHA1
9ea5760c8d7b2f1a479901677338e487e62aaad0
-
SHA256
1bc4755b2828092f30c53c4099d2a1b118d1a68686a82b7c11ef12c6ae93f8d4
-
SHA512
5e57d36b700f030c977213899b2d5e4421abcaf54a41ccb336067e52f779066916b58ff1c81441be8c4e69240106569d40371b6ba862e6d89cbeda1cc65d6818
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3008-2-0x0000000140000000-0x0000000140138000-memory.dmp dridex_ldr -
Processes:
resource yara_rule behavioral2/memory/3008-2-0x0000000140000000-0x0000000140138000-memory.dmp dridex_ldr_dmod -
Executes dropped EXE 3 IoCs
Processes:
msinfo32.exeraserver.exepsr.exepid process 2868 msinfo32.exe 3752 raserver.exe 3024 psr.exe -
Loads dropped DLL 3 IoCs
Processes:
msinfo32.exeraserver.exepsr.exepid process 2868 msinfo32.exe 3752 raserver.exe 3024 psr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ywfbribtuthwh = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Templates\\l5\\raserver.exe" -
Processes:
rundll32.exemsinfo32.exeraserver.exepsr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msinfo32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA raserver.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA psr.exe -
Suspicious behavior: EnumeratesProcesses 638 IoCs
Processes:
rundll32.exepid process 4012 rundll32.exe 4012 rundll32.exe 4012 rundll32.exe 4012 rundll32.exe 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3008 Token: SeCreatePagefilePrivilege 3008 Token: SeShutdownPrivilege 3008 Token: SeCreatePagefilePrivilege 3008 Token: SeShutdownPrivilege 3008 Token: SeCreatePagefilePrivilege 3008 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3008 wrote to memory of 2816 3008 msinfo32.exe PID 3008 wrote to memory of 2816 3008 msinfo32.exe PID 3008 wrote to memory of 2868 3008 msinfo32.exe PID 3008 wrote to memory of 2868 3008 msinfo32.exe PID 3008 wrote to memory of 3696 3008 raserver.exe PID 3008 wrote to memory of 3696 3008 raserver.exe PID 3008 wrote to memory of 3752 3008 raserver.exe PID 3008 wrote to memory of 3752 3008 raserver.exe PID 3008 wrote to memory of 3180 3008 psr.exe PID 3008 wrote to memory of 3180 3008 psr.exe PID 3008 wrote to memory of 3024 3008 psr.exe PID 3008 wrote to memory of 3024 3008 psr.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\DUI70.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:4012
-
C:\Windows\system32\msinfo32.exeC:\Windows\system32\msinfo32.exe1⤵PID:2816
-
C:\Users\Admin\AppData\Local\SbOCQ4r\msinfo32.exeC:\Users\Admin\AppData\Local\SbOCQ4r\msinfo32.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2868
-
C:\Windows\system32\raserver.exeC:\Windows\system32\raserver.exe1⤵PID:3696
-
C:\Users\Admin\AppData\Local\Wx98eXbam\raserver.exeC:\Users\Admin\AppData\Local\Wx98eXbam\raserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3752
-
C:\Windows\system32\psr.exeC:\Windows\system32\psr.exe1⤵PID:3180
-
C:\Users\Admin\AppData\Local\m0bstPc\psr.exeC:\Users\Admin\AppData\Local\m0bstPc\psr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3024
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
e7fb505ab151e7fdace791d4b705bcc4
SHA1cc531c276b302d28b02d01cdb69c77c6dabecf28
SHA256e4355fb8dab0a9bc06e065c630cca18c2bf49e6f12023eb636d239519c6bacdc
SHA5123a05cec485fdb451f1621f7c93543c8154bf34bc7b16e552562375739e4de274e9ef6bdc4081922215341a5192e42187a2376c6679cde79ac9010d8f2eb738bd
-
MD5
255861c59cdfbf86c03560d39a92932a
SHA118353cb8a58d25ab62687b69fee44d007b994f19
SHA25657aeba5f7f9de579f3c334e7e013114f6b2257b810b2fc8c1f96331ad1c4909c
SHA512f695394f344f07036684dc4ba4ba011bc0b5b0b27898c82714cbd072c6218870234deb18044c00bf3fda618480e4e517cba50d577c228a63ee3e2676029e430b
-
MD5
6cabaa4d174403f6aa901099fe744bab
SHA1e2978a65e1e6ddcd782d64fec79e81081da199d1
SHA2567e66abc19b37370f0c4b56844c92dfc406f03d794dad260889ab38afacb3da20
SHA5126e7b8f6bb92c93127fec41c4d6eea99ff70587e7c89cceec3d877ff412a14892d8ab0bac632ec2e2183d85a5994fc67a5330e22ac83aaf642c5d65fd1e889fee
-
MD5
71cacb0f5b7b70055fbba02055e503b1
SHA149e247edcc721fc7329045a8587877b645b7531f
SHA2567a4aa698ea00d4347a1b85a2510c2502fdf23cc5d487079097999be9780f8eb1
SHA5123cce7df2ab1ece95baf888982a0664fb53c1378029dc2aee1c583fc6e9065968074a9f8135988f1b9f50937e3eb69edc118976b61067c3461fe8351535295a18
-
MD5
2483ea4ac2d5de6dd987c36f16bb6cc4
SHA12b117b4e5dcd315a16b4838fe7462340eebbc359
SHA256b96c71d922274c6e47c6956840e7338e7b8b40719819c0cdcf9375186969cbdd
SHA51259e2548e9d9e20fa0a348dd52bdfac8ec3b6a5a958691a50814b88efc0ab3715a3b7312d3342b8c53e900d45d406e246768cf523d4fd4dd37a493bf6779eee08
-
MD5
264a61b365dd314f3c82d1efba60fe17
SHA19a778a13f5e85d7c5bf2e21ceb398ae0a4300ffa
SHA256880fafbd4087442964a7780331a0e8dd43b78e2106e9df545f0432d4aa15ce93
SHA5129b26021b49ed0f8cfb05d9c8f5e0cec7beaebe9ee14acfc3237cec1255bb9e6a4f5f7a6b902f3d561bbbac7489f64e5a39f498261eef7e93178be97f9cc15e3c
-
MD5
e7fb505ab151e7fdace791d4b705bcc4
SHA1cc531c276b302d28b02d01cdb69c77c6dabecf28
SHA256e4355fb8dab0a9bc06e065c630cca18c2bf49e6f12023eb636d239519c6bacdc
SHA5123a05cec485fdb451f1621f7c93543c8154bf34bc7b16e552562375739e4de274e9ef6bdc4081922215341a5192e42187a2376c6679cde79ac9010d8f2eb738bd
-
MD5
6cabaa4d174403f6aa901099fe744bab
SHA1e2978a65e1e6ddcd782d64fec79e81081da199d1
SHA2567e66abc19b37370f0c4b56844c92dfc406f03d794dad260889ab38afacb3da20
SHA5126e7b8f6bb92c93127fec41c4d6eea99ff70587e7c89cceec3d877ff412a14892d8ab0bac632ec2e2183d85a5994fc67a5330e22ac83aaf642c5d65fd1e889fee
-
MD5
2483ea4ac2d5de6dd987c36f16bb6cc4
SHA12b117b4e5dcd315a16b4838fe7462340eebbc359
SHA256b96c71d922274c6e47c6956840e7338e7b8b40719819c0cdcf9375186969cbdd
SHA51259e2548e9d9e20fa0a348dd52bdfac8ec3b6a5a958691a50814b88efc0ab3715a3b7312d3342b8c53e900d45d406e246768cf523d4fd4dd37a493bf6779eee08