Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10_x64 -
resource
win10-en -
submitted
15-09-2021 08:08
Static task
static1
Behavioral task
behavioral1
Sample
236e749601b76cf6364ab17d337e7dff0ac592006b89c1cbfe711cc8e718c7e3.dll
Resource
win7v20210408
General
-
Target
236e749601b76cf6364ab17d337e7dff0ac592006b89c1cbfe711cc8e718c7e3.dll
-
Size
1.4MB
-
MD5
26e1e972b9847ae521995ce31119e1d6
-
SHA1
e1fc1d82f2462496bb1c18d575c0d5b2275ba21a
-
SHA256
236e749601b76cf6364ab17d337e7dff0ac592006b89c1cbfe711cc8e718c7e3
-
SHA512
27b7903ada4de94b181ed65275cd0afa92e5cde0235dd64014d582446db2348ebfe9c659056360a4aa59b9e4eef998e11dbed8ee2c9c76a583db92d0b264ae4f
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/1512-120-0x0000000002910000-0x0000000002911000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
omadmclient.exeSystemPropertiesAdvanced.exeBitLockerWizardElev.exepid process 1148 omadmclient.exe 1556 SystemPropertiesAdvanced.exe 1860 BitLockerWizardElev.exe -
Loads dropped DLL 3 IoCs
Processes:
omadmclient.exeSystemPropertiesAdvanced.exeBitLockerWizardElev.exepid process 1148 omadmclient.exe 1556 SystemPropertiesAdvanced.exe 1860 BitLockerWizardElev.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wzmtblrj = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\CustomDestinations\\Qjw\\SystemPropertiesAdvanced.exe" -
Processes:
rundll32.exeomadmclient.exeSystemPropertiesAdvanced.exeBitLockerWizardElev.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA omadmclient.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesAdvanced.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizardElev.exe -
Modifies registry class 2 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 4080 rundll32.exe 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 1512 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1512 -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 1512 Token: SeCreatePagefilePrivilege 1512 Token: SeShutdownPrivilege 1512 Token: SeCreatePagefilePrivilege 1512 Token: SeShutdownPrivilege 1512 Token: SeCreatePagefilePrivilege 1512 Token: SeShutdownPrivilege 1512 Token: SeCreatePagefilePrivilege 1512 -
Suspicious use of FindShellTrayWindow 9 IoCs
Processes:
pid process 1512 1512 1512 1512 1512 1512 1512 1512 1512 -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
pid process 1512 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 1512 wrote to memory of 1076 1512 omadmclient.exe PID 1512 wrote to memory of 1076 1512 omadmclient.exe PID 1512 wrote to memory of 1148 1512 omadmclient.exe PID 1512 wrote to memory of 1148 1512 omadmclient.exe PID 1512 wrote to memory of 1444 1512 SystemPropertiesAdvanced.exe PID 1512 wrote to memory of 1444 1512 SystemPropertiesAdvanced.exe PID 1512 wrote to memory of 1556 1512 SystemPropertiesAdvanced.exe PID 1512 wrote to memory of 1556 1512 SystemPropertiesAdvanced.exe PID 1512 wrote to memory of 1784 1512 BitLockerWizardElev.exe PID 1512 wrote to memory of 1784 1512 BitLockerWizardElev.exe PID 1512 wrote to memory of 1860 1512 BitLockerWizardElev.exe PID 1512 wrote to memory of 1860 1512 BitLockerWizardElev.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\236e749601b76cf6364ab17d337e7dff0ac592006b89c1cbfe711cc8e718c7e3.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\omadmclient.exeC:\Windows\system32\omadmclient.exe1⤵
-
C:\Users\Admin\AppData\Local\32ekyRlom\omadmclient.exeC:\Users\Admin\AppData\Local\32ekyRlom\omadmclient.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\SystemPropertiesAdvanced.exeC:\Windows\system32\SystemPropertiesAdvanced.exe1⤵
-
C:\Users\Admin\AppData\Local\DYLyeI7\SystemPropertiesAdvanced.exeC:\Users\Admin\AppData\Local\DYLyeI7\SystemPropertiesAdvanced.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\BitLockerWizardElev.exeC:\Windows\system32\BitLockerWizardElev.exe1⤵
-
C:\Users\Admin\AppData\Local\egEmfbNiQ\BitLockerWizardElev.exeC:\Users\Admin\AppData\Local\egEmfbNiQ\BitLockerWizardElev.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\32ekyRlom\XmlLite.dllMD5
ee5c4869a68330ba49fe94c465c6e492
SHA164c5ce6c27404036209005af2cca757cf9559157
SHA256b18fea435a4547c16800bb3745c882876e27e16e608f1c3b8abcf01a7ca3554f
SHA512ca4ff6eb982d8b8894e7654db2f79a5fc23ce3cf1c8b73373e677c251fc17a634076707c094752554ac2be31f125b9ab2e9d259e7588f8a1ecba07c4d04a267f
-
C:\Users\Admin\AppData\Local\32ekyRlom\omadmclient.exeMD5
0f8c6315c9458cab5b3aae2df853edb6
SHA1ff59734b75896b422e8d7a642c4ea59bf6dab759
SHA25676eb6879858ab42089e369984f6e0e775b32b6756a605ed5f2fb1a06c1151498
SHA512966045c25685a0f01bcd49f6e9ec5bbdaa8a3e261129c03db85031fb1d8705bfba967894d2530c2691e16fdbed11a9df9122d9093db2b46c6ce1b641db36bb3c
-
C:\Users\Admin\AppData\Local\DYLyeI7\SYSDM.CPLMD5
32a1db4c9ea1c60bc2e5f29704edc2d5
SHA12459c7331d1abd05c18317bca5055ddc44dec174
SHA2561bbc274d5a964f1a295e23b906b53174bd3ff75e152f09ccf838a8b84e7d385e
SHA5123486a376ff7a7b6ed7538766824da72418bfb694f18b261c0662402a0305ca0a7c028f8f4aae2c00deac52cf3502306e2614c17ff81f4d703ca5e2f30849247e
-
C:\Users\Admin\AppData\Local\DYLyeI7\SystemPropertiesAdvanced.exeMD5
375b58f4fced878a37108c3e5ad9b20c
SHA18a05b43085e2ccf4ad1b041cabb4fe91498e98e5
SHA256480aa5e419e066e1dd84ae98f07cca9e21e6b72e82f6fbc9b54bbbefbe2f79b9
SHA512e803d80e72c17cde65190678389182188dd3035465598fd2a89c31f80518a6eda07be06373e133403dbcdb5f076ee4204c5d702524b12ccb6a2ba21e4c815441
-
C:\Users\Admin\AppData\Local\egEmfbNiQ\BitLockerWizardElev.exeMD5
43d63950e411885e21eeb33a7f33dc85
SHA1aa5489c400ae898ba8590e7198846ca51d4ae872
SHA25682f381697c3ea8df147de184892751a5c99475617c245b3caece870bb0a5418a
SHA51265b87ecb21289f3ce72f8ea00e877f6023551d4ba5f62e27ac00df7376c1f1d3d612419fac54211a91383b016e03a7f82ac8bc0beaa10262767538dba09423ca
-
C:\Users\Admin\AppData\Local\egEmfbNiQ\FVEWIZ.dllMD5
4db5d0ee9d5fe83abcf7cc1cb9905067
SHA1599763a1af56700211f81f62598c08889fd42843
SHA256c4e6b15c43abda0a4af628a2fd269f1169178cef707fe57897b69c3796f18209
SHA512e6df33f4e5f10c48144f17326182bd6b530410fbf33693192aaa1e78fec7255f8b3404e8ed4ef5d2b6d2883c0f26dc05e3fee3ff0aca729470f263b1bcc658bf
-
\Users\Admin\AppData\Local\32ekyRlom\XmlLite.dllMD5
ee5c4869a68330ba49fe94c465c6e492
SHA164c5ce6c27404036209005af2cca757cf9559157
SHA256b18fea435a4547c16800bb3745c882876e27e16e608f1c3b8abcf01a7ca3554f
SHA512ca4ff6eb982d8b8894e7654db2f79a5fc23ce3cf1c8b73373e677c251fc17a634076707c094752554ac2be31f125b9ab2e9d259e7588f8a1ecba07c4d04a267f
-
\Users\Admin\AppData\Local\DYLyeI7\SYSDM.CPLMD5
32a1db4c9ea1c60bc2e5f29704edc2d5
SHA12459c7331d1abd05c18317bca5055ddc44dec174
SHA2561bbc274d5a964f1a295e23b906b53174bd3ff75e152f09ccf838a8b84e7d385e
SHA5123486a376ff7a7b6ed7538766824da72418bfb694f18b261c0662402a0305ca0a7c028f8f4aae2c00deac52cf3502306e2614c17ff81f4d703ca5e2f30849247e
-
\Users\Admin\AppData\Local\egEmfbNiQ\FVEWIZ.dllMD5
4db5d0ee9d5fe83abcf7cc1cb9905067
SHA1599763a1af56700211f81f62598c08889fd42843
SHA256c4e6b15c43abda0a4af628a2fd269f1169178cef707fe57897b69c3796f18209
SHA512e6df33f4e5f10c48144f17326182bd6b530410fbf33693192aaa1e78fec7255f8b3404e8ed4ef5d2b6d2883c0f26dc05e3fee3ff0aca729470f263b1bcc658bf
-
memory/1148-163-0x0000000000000000-mapping.dmp
-
memory/1148-168-0x0000000140000000-0x0000000140173000-memory.dmpFilesize
1.4MB
-
memory/1512-142-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1512-148-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1512-131-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1512-132-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1512-133-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1512-134-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1512-135-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1512-136-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1512-137-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1512-138-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1512-139-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1512-140-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1512-141-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1512-120-0x0000000002910000-0x0000000002911000-memory.dmpFilesize
4KB
-
memory/1512-144-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1512-143-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1512-145-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1512-146-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1512-147-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1512-130-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1512-149-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1512-150-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1512-151-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1512-152-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1512-153-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1512-161-0x00007FFFE85F4560-0x00007FFFE85F5560-memory.dmpFilesize
4KB
-
memory/1512-129-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1512-128-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1512-127-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1512-126-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1512-167-0x00007FFFE8730000-0x00007FFFE8732000-memory.dmpFilesize
8KB
-
memory/1512-125-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1512-121-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1512-124-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1512-123-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1512-122-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/1556-173-0x0000000000000000-mapping.dmp
-
memory/1860-182-0x0000000000000000-mapping.dmp
-
memory/4080-115-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/4080-119-0x000002CC0CC60000-0x000002CC0CC67000-memory.dmpFilesize
28KB