Resubmissions
Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7 -
submitted
14-07-2020 05:12
Static task
static1
Behavioral task
behavioral1
Sample
VERSION.dll
Resource
win7
General
-
Target
VERSION.dll
-
Size
972KB
-
MD5
07b6339df2acddd30de436999071fc4b
-
SHA1
2550d842be80b811afa930384c0db06908bc1011
-
SHA256
4ed7566f8b70e42f52615a3c06512b10c6b3feef33627a82cdef1f054aa4cc75
-
SHA512
ef2b54af64064f6fdd4224b3b283e9e6b76d8d92a01d6e9044d016bbf2b2b295f4ed66a48d389a08ed4fc3d72a843f7ed32f43f91280658f897b2ad078324586
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1228-2-0x0000000140000000-0x00000001400F3000-memory.dmp dridex_ldr -
Processes:
resource yara_rule behavioral1/memory/1228-2-0x0000000140000000-0x00000001400F3000-memory.dmp dridex_ldr_dmod -
Executes dropped EXE 3 IoCs
Processes:
vmicsvc.exeVaultSysUi.exexpsrchvw.exepid process 1044 vmicsvc.exe 1508 VaultSysUi.exe 1768 xpsrchvw.exe -
Loads dropped DLL 8 IoCs
Processes:
vmicsvc.exeVaultSysUi.exexpsrchvw.exepid process 1228 1044 vmicsvc.exe 1228 1228 1508 VaultSysUi.exe 1228 1768 xpsrchvw.exe 1228 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\Run\Vpubrqhrepmzp = "C:\\Users\\Admin\\AppData\\Roaming\\MACROM~1\\FLASHP~1\\MACROM~1.COM\\support\\FLASHP~1\\sys\\KlP\\VAULTS~1.EXE" -
Processes:
rundll32.exevmicsvc.exeVaultSysUi.exexpsrchvw.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA vmicsvc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA VaultSysUi.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xpsrchvw.exe -
Suspicious behavior: EnumeratesProcesses 622 IoCs
Processes:
rundll32.exepid process 1496 rundll32.exe 1496 rundll32.exe 1496 rundll32.exe 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 1228 -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
pid process 1228 1228 1228 1228 1228 -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
pid process 1228 1228 1228 1228 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1228 wrote to memory of 324 1228 vmicsvc.exe PID 1228 wrote to memory of 324 1228 vmicsvc.exe PID 1228 wrote to memory of 324 1228 vmicsvc.exe PID 1228 wrote to memory of 1044 1228 vmicsvc.exe PID 1228 wrote to memory of 1044 1228 vmicsvc.exe PID 1228 wrote to memory of 1044 1228 vmicsvc.exe PID 1228 wrote to memory of 1520 1228 VaultSysUi.exe PID 1228 wrote to memory of 1520 1228 VaultSysUi.exe PID 1228 wrote to memory of 1520 1228 VaultSysUi.exe PID 1228 wrote to memory of 1508 1228 VaultSysUi.exe PID 1228 wrote to memory of 1508 1228 VaultSysUi.exe PID 1228 wrote to memory of 1508 1228 VaultSysUi.exe PID 1228 wrote to memory of 1812 1228 xpsrchvw.exe PID 1228 wrote to memory of 1812 1228 xpsrchvw.exe PID 1228 wrote to memory of 1812 1228 xpsrchvw.exe PID 1228 wrote to memory of 1768 1228 xpsrchvw.exe PID 1228 wrote to memory of 1768 1228 xpsrchvw.exe PID 1228 wrote to memory of 1768 1228 xpsrchvw.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\VERSION.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:1496
-
C:\Windows\system32\vmicsvc.exeC:\Windows\system32\vmicsvc.exe1⤵PID:324
-
C:\Users\Admin\AppData\Local\EJVDtL\vmicsvc.exeC:\Users\Admin\AppData\Local\EJVDtL\vmicsvc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1044
-
C:\Windows\system32\VaultSysUi.exeC:\Windows\system32\VaultSysUi.exe1⤵PID:1520
-
C:\Users\Admin\AppData\Local\NoA\VaultSysUi.exeC:\Users\Admin\AppData\Local\NoA\VaultSysUi.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1508
-
C:\Windows\system32\xpsrchvw.exeC:\Windows\system32\xpsrchvw.exe1⤵PID:1812
-
C:\Users\Admin\AppData\Local\3LlFKaD\xpsrchvw.exeC:\Users\Admin\AppData\Local\3LlFKaD\xpsrchvw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1768
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
7f9455685cf18115c2d6f460cd3f816e
SHA17957afec4d51a504426e71a1c65489f2542f2428
SHA2561f89d73f2f622e5af25662ff0d7b7e792da53021b40acdc1d6ddf2b2cd30e088
SHA5128d9be0b24b1f5907ecb4fa7a4bb429daa6fe5ff50f336539c8974c8caa062a01901b4060616c4f1cff4e7bdcd9e37cf3babb1aa002de89f43e3c0d7744150125
-
MD5
492cb6a624d5dad73ee0294b5db37dd6
SHA1e74806af04a5147ccabfb5b167eb95a0177c43b3
SHA256ccb4ecd48561ce024ea176b7036f0f2713b98bc82aa37347a30d8187762a8784
SHA51263bf2931764efe767fb42f9576702dd585a032f74ad2be2481eaf309f34950f05974d77b5cb220a3ff89c92af0c7693dc558f8e3a3ee2a0be6c5c07171d03835
-
MD5
d0cb849dba0f5003423174a6d40fe23e
SHA13071e56ebe196017b4f7966a64d41f61bd967251
SHA256aa62cb6975ae257c2298890e1f37de6c088280bf44bdc408632b5997ef886b33
SHA5120834faf7dcf4359d37b53fbcf8f1ed0a25f4b42f72444d8dc40b22f8b90840304b4e150e79074cc0dcb104d991b736dc7b9e16a307a60cb3e38789401b771393
-
MD5
79e14b291ca96a02f1eb22bd721deccd
SHA14c8dbff611acd8a92cd2280239f78bebd2a9947e
SHA256d829166db30923406a025bf33d6a0997be0a3df950114d1f34547a9525b749e8
SHA512f3d1fa7732b6b027bbaf22530331d27ede85f92c9fd64f940139fd262bd7468211a8a54c835d3934b1974b3d8ecddefa79ea77901b9ef49ab36069963693f988
-
MD5
f40ef105d94350d36c799ee23f7fec0f
SHA1ee3a5cfe8b807e1c1718a27eb97fa134360816e3
SHA256eeb3f79be414b81f4eb8167390641787f14a033414533fb8de651c2247d054b2
SHA512f16bcca6f6cecbdae117d5a41de7e86a6d9dfdfa2ce8c75ebff10d097083c106e7f9d030debed8cb20fdd71815a8aa7723a1d3c68b38ec382e55370331c594a1
-
MD5
b269b3e2fb5c4926fd5b1252ed256733
SHA11a4f51c92dacc1a16beff950998d3ab5ec22adab
SHA2566f95cafd4f2471b64076c18e8870705371ea574661b578ce629cac303b89a8d8
SHA512cbe3bb680b1dd32a6dd7cd1b5e18454a818649aa64a129f6d098116d3f0cf2c8adb62e01fe57811db1278121915e320a49ee07074268f872c269b98e8cefc81a
-
MD5
7f9455685cf18115c2d6f460cd3f816e
SHA17957afec4d51a504426e71a1c65489f2542f2428
SHA2561f89d73f2f622e5af25662ff0d7b7e792da53021b40acdc1d6ddf2b2cd30e088
SHA5128d9be0b24b1f5907ecb4fa7a4bb429daa6fe5ff50f336539c8974c8caa062a01901b4060616c4f1cff4e7bdcd9e37cf3babb1aa002de89f43e3c0d7744150125
-
MD5
492cb6a624d5dad73ee0294b5db37dd6
SHA1e74806af04a5147ccabfb5b167eb95a0177c43b3
SHA256ccb4ecd48561ce024ea176b7036f0f2713b98bc82aa37347a30d8187762a8784
SHA51263bf2931764efe767fb42f9576702dd585a032f74ad2be2481eaf309f34950f05974d77b5cb220a3ff89c92af0c7693dc558f8e3a3ee2a0be6c5c07171d03835
-
MD5
d0cb849dba0f5003423174a6d40fe23e
SHA13071e56ebe196017b4f7966a64d41f61bd967251
SHA256aa62cb6975ae257c2298890e1f37de6c088280bf44bdc408632b5997ef886b33
SHA5120834faf7dcf4359d37b53fbcf8f1ed0a25f4b42f72444d8dc40b22f8b90840304b4e150e79074cc0dcb104d991b736dc7b9e16a307a60cb3e38789401b771393
-
MD5
79e14b291ca96a02f1eb22bd721deccd
SHA14c8dbff611acd8a92cd2280239f78bebd2a9947e
SHA256d829166db30923406a025bf33d6a0997be0a3df950114d1f34547a9525b749e8
SHA512f3d1fa7732b6b027bbaf22530331d27ede85f92c9fd64f940139fd262bd7468211a8a54c835d3934b1974b3d8ecddefa79ea77901b9ef49ab36069963693f988
-
MD5
f40ef105d94350d36c799ee23f7fec0f
SHA1ee3a5cfe8b807e1c1718a27eb97fa134360816e3
SHA256eeb3f79be414b81f4eb8167390641787f14a033414533fb8de651c2247d054b2
SHA512f16bcca6f6cecbdae117d5a41de7e86a6d9dfdfa2ce8c75ebff10d097083c106e7f9d030debed8cb20fdd71815a8aa7723a1d3c68b38ec382e55370331c594a1
-
MD5
f40ef105d94350d36c799ee23f7fec0f
SHA1ee3a5cfe8b807e1c1718a27eb97fa134360816e3
SHA256eeb3f79be414b81f4eb8167390641787f14a033414533fb8de651c2247d054b2
SHA512f16bcca6f6cecbdae117d5a41de7e86a6d9dfdfa2ce8c75ebff10d097083c106e7f9d030debed8cb20fdd71815a8aa7723a1d3c68b38ec382e55370331c594a1
-
MD5
b269b3e2fb5c4926fd5b1252ed256733
SHA11a4f51c92dacc1a16beff950998d3ab5ec22adab
SHA2566f95cafd4f2471b64076c18e8870705371ea574661b578ce629cac303b89a8d8
SHA512cbe3bb680b1dd32a6dd7cd1b5e18454a818649aa64a129f6d098116d3f0cf2c8adb62e01fe57811db1278121915e320a49ee07074268f872c269b98e8cefc81a
-
MD5
492cb6a624d5dad73ee0294b5db37dd6
SHA1e74806af04a5147ccabfb5b167eb95a0177c43b3
SHA256ccb4ecd48561ce024ea176b7036f0f2713b98bc82aa37347a30d8187762a8784
SHA51263bf2931764efe767fb42f9576702dd585a032f74ad2be2481eaf309f34950f05974d77b5cb220a3ff89c92af0c7693dc558f8e3a3ee2a0be6c5c07171d03835