Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
15-09-2021 07:38
Static task
static1
Behavioral task
behavioral1
Sample
bf9ad9586d3a1594e627b0e4c13615cc806d8f73be0ac8fa8b79e08436ac503d.dll
Resource
win7v20210408
General
-
Target
bf9ad9586d3a1594e627b0e4c13615cc806d8f73be0ac8fa8b79e08436ac503d.dll
-
Size
1.7MB
-
MD5
0d4820d7d8af4fd62be7375b1529f047
-
SHA1
6bdbde14cf1bfc55c70c1e6c75e4290f11676f3f
-
SHA256
bf9ad9586d3a1594e627b0e4c13615cc806d8f73be0ac8fa8b79e08436ac503d
-
SHA512
7e647cf441b51898c4ee3e1cc6047b7cae3e6cfe1f09b4034cb7628869b8b1288617b65a76a517d3580b42f8214eb0acb6ab4b6edea031c47bfb46da3ded99c8
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1252-62-0x0000000002AF0000-0x0000000002AF1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
AdapterTroubleshooter.exeBdeUISrv.exedvdupgrd.exepid process 1504 AdapterTroubleshooter.exe 1740 BdeUISrv.exe 1084 dvdupgrd.exe -
Loads dropped DLL 7 IoCs
Processes:
AdapterTroubleshooter.exeBdeUISrv.exedvdupgrd.exepid process 1252 1504 AdapterTroubleshooter.exe 1252 1740 BdeUISrv.exe 1252 1084 dvdupgrd.exe 1252 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\Axiifu = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\IETldCache\\KtbHYgbBcA\\BdeUISrv.exe" -
Processes:
rundll32.exeAdapterTroubleshooter.exeBdeUISrv.exedvdupgrd.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA AdapterTroubleshooter.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BdeUISrv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dvdupgrd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1924 rundll32.exe 1924 rundll32.exe 1924 rundll32.exe 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1252 -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
pid process 1252 1252 1252 1252 -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
pid process 1252 1252 1252 1252 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1252 wrote to memory of 628 1252 AdapterTroubleshooter.exe PID 1252 wrote to memory of 628 1252 AdapterTroubleshooter.exe PID 1252 wrote to memory of 628 1252 AdapterTroubleshooter.exe PID 1252 wrote to memory of 1504 1252 AdapterTroubleshooter.exe PID 1252 wrote to memory of 1504 1252 AdapterTroubleshooter.exe PID 1252 wrote to memory of 1504 1252 AdapterTroubleshooter.exe PID 1252 wrote to memory of 920 1252 BdeUISrv.exe PID 1252 wrote to memory of 920 1252 BdeUISrv.exe PID 1252 wrote to memory of 920 1252 BdeUISrv.exe PID 1252 wrote to memory of 1740 1252 BdeUISrv.exe PID 1252 wrote to memory of 1740 1252 BdeUISrv.exe PID 1252 wrote to memory of 1740 1252 BdeUISrv.exe PID 1252 wrote to memory of 1076 1252 dvdupgrd.exe PID 1252 wrote to memory of 1076 1252 dvdupgrd.exe PID 1252 wrote to memory of 1076 1252 dvdupgrd.exe PID 1252 wrote to memory of 1084 1252 dvdupgrd.exe PID 1252 wrote to memory of 1084 1252 dvdupgrd.exe PID 1252 wrote to memory of 1084 1252 dvdupgrd.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bf9ad9586d3a1594e627b0e4c13615cc806d8f73be0ac8fa8b79e08436ac503d.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\AdapterTroubleshooter.exeC:\Windows\system32\AdapterTroubleshooter.exe1⤵
-
C:\Users\Admin\AppData\Local\Vm4ut\AdapterTroubleshooter.exeC:\Users\Admin\AppData\Local\Vm4ut\AdapterTroubleshooter.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\BdeUISrv.exeC:\Windows\system32\BdeUISrv.exe1⤵
-
C:\Users\Admin\AppData\Local\17o\BdeUISrv.exeC:\Users\Admin\AppData\Local\17o\BdeUISrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\dvdupgrd.exeC:\Windows\system32\dvdupgrd.exe1⤵
-
C:\Users\Admin\AppData\Local\iJMan\dvdupgrd.exeC:\Users\Admin\AppData\Local\iJMan\dvdupgrd.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\17o\BdeUISrv.exeMD5
1da6b19be5d4949c868a264bc5e74206
SHA1d5ee86ba03a03ef8c93d93accafe40461084c839
SHA25600330a0e0eb1dbb6ee84997963f8e15c7c15c1df787f1c7f109609d7b31bd35c
SHA5129cee858c55eb0852e5bad53a675a094ae591b46b07afe9fb4224cac32e0be577fe36c1ed3e9f6bda4d4eb0c924a773d00e3181cd97f07e24c6c68c70f2b002c6
-
C:\Users\Admin\AppData\Local\17o\WTSAPI32.dllMD5
6c6e812a428ae0a2dcb4b29c83a15474
SHA115102796e1ad7e1b37a2d8e5c8992c11a67f3f6e
SHA256ba4680b377407575bd0a2b93992fdbff5345d93aed15743483b1e4c343d59698
SHA512327fba142edb591a4c07eb83a16ca790f4e9f96fd685ceac852e67bb5f299acc8cf057780592d85ce0da08facbc4d7faa7b68cc4a95706c6704e91663e75e56d
-
C:\Users\Admin\AppData\Local\Vm4ut\AdapterTroubleshooter.exeMD5
d4170c9ff5b2f85b0ce0246033d26919
SHA1a76118e8775e16237cf00f2fb79718be0dc84db1
SHA256d05e010a2570cdd5a67f62c99483aeeecb6a8d5ecc523cd49b158a460c9be5da
SHA5129c85a9ea4002bd55cf9c51e470dd1bec527ff04b5d0d6f83094a998c541416cd47c9f42c6ca7e35ffa2842877f79e3c2e989489b9bf81644c5c57bb406b89608
-
C:\Users\Admin\AppData\Local\Vm4ut\d3d9.dllMD5
fae6b3eb93f380e266a2670a45f45b75
SHA1fd33aee98188597022613cc6f8f48e65d67c26f3
SHA2561164a04f2b8e7183739b08b74d54840bb75898f16fbddd7351dc5a7a25fa3720
SHA5122250f0ce70edeb060ceb6e387096be63ee07b2cdaa492842b256c735c1925c5c6b4dcaf18f46ba8a2b3f9bb14f6a97484bfc6fa7e8c770ecfc0186f5f86acd43
-
C:\Users\Admin\AppData\Local\iJMan\VERSION.dllMD5
3e85939124d4901a51e082c892df698d
SHA101a057c35f8ba6513bcc0f537d9f8c3b9207b11a
SHA256f7a8e2b92a632c008f77d77949dd8e680c1585db221c9a12f11f183394869a51
SHA512c3bd59446787e17a10875960f829bd3446a2768edc4a0e8607a7e1670e8f0e7dcb16a1c7ba11192c77fc9facd76e07e51ca614d9afc121ad04fbafe36d84d2b3
-
C:\Users\Admin\AppData\Local\iJMan\dvdupgrd.exeMD5
75a9b4172eac01d9648c6d2133af952f
SHA163c7e1af762d2b584e9cc841e8b0100f2a482b81
SHA25618f9f520c7157023b0e7dfe7433a63c4dedd47b04d24aac4038b795893050736
SHA5125a7a2c7f184efd9c84256a1a0a5e7aeb95432d63a567196be54e7a9437a5ada9b922983c5fc0cafb16eab4493665d8e56e2f646f9f6a2d6179986925ffcdf769
-
\Users\Admin\AppData\Local\17o\BdeUISrv.exeMD5
1da6b19be5d4949c868a264bc5e74206
SHA1d5ee86ba03a03ef8c93d93accafe40461084c839
SHA25600330a0e0eb1dbb6ee84997963f8e15c7c15c1df787f1c7f109609d7b31bd35c
SHA5129cee858c55eb0852e5bad53a675a094ae591b46b07afe9fb4224cac32e0be577fe36c1ed3e9f6bda4d4eb0c924a773d00e3181cd97f07e24c6c68c70f2b002c6
-
\Users\Admin\AppData\Local\17o\WTSAPI32.dllMD5
6c6e812a428ae0a2dcb4b29c83a15474
SHA115102796e1ad7e1b37a2d8e5c8992c11a67f3f6e
SHA256ba4680b377407575bd0a2b93992fdbff5345d93aed15743483b1e4c343d59698
SHA512327fba142edb591a4c07eb83a16ca790f4e9f96fd685ceac852e67bb5f299acc8cf057780592d85ce0da08facbc4d7faa7b68cc4a95706c6704e91663e75e56d
-
\Users\Admin\AppData\Local\Vm4ut\AdapterTroubleshooter.exeMD5
d4170c9ff5b2f85b0ce0246033d26919
SHA1a76118e8775e16237cf00f2fb79718be0dc84db1
SHA256d05e010a2570cdd5a67f62c99483aeeecb6a8d5ecc523cd49b158a460c9be5da
SHA5129c85a9ea4002bd55cf9c51e470dd1bec527ff04b5d0d6f83094a998c541416cd47c9f42c6ca7e35ffa2842877f79e3c2e989489b9bf81644c5c57bb406b89608
-
\Users\Admin\AppData\Local\Vm4ut\d3d9.dllMD5
fae6b3eb93f380e266a2670a45f45b75
SHA1fd33aee98188597022613cc6f8f48e65d67c26f3
SHA2561164a04f2b8e7183739b08b74d54840bb75898f16fbddd7351dc5a7a25fa3720
SHA5122250f0ce70edeb060ceb6e387096be63ee07b2cdaa492842b256c735c1925c5c6b4dcaf18f46ba8a2b3f9bb14f6a97484bfc6fa7e8c770ecfc0186f5f86acd43
-
\Users\Admin\AppData\Local\iJMan\VERSION.dllMD5
3e85939124d4901a51e082c892df698d
SHA101a057c35f8ba6513bcc0f537d9f8c3b9207b11a
SHA256f7a8e2b92a632c008f77d77949dd8e680c1585db221c9a12f11f183394869a51
SHA512c3bd59446787e17a10875960f829bd3446a2768edc4a0e8607a7e1670e8f0e7dcb16a1c7ba11192c77fc9facd76e07e51ca614d9afc121ad04fbafe36d84d2b3
-
\Users\Admin\AppData\Local\iJMan\dvdupgrd.exeMD5
75a9b4172eac01d9648c6d2133af952f
SHA163c7e1af762d2b584e9cc841e8b0100f2a482b81
SHA25618f9f520c7157023b0e7dfe7433a63c4dedd47b04d24aac4038b795893050736
SHA5125a7a2c7f184efd9c84256a1a0a5e7aeb95432d63a567196be54e7a9437a5ada9b922983c5fc0cafb16eab4493665d8e56e2f646f9f6a2d6179986925ffcdf769
-
\Users\Admin\AppData\Roaming\Identities\rlu\dvdupgrd.exeMD5
75a9b4172eac01d9648c6d2133af952f
SHA163c7e1af762d2b584e9cc841e8b0100f2a482b81
SHA25618f9f520c7157023b0e7dfe7433a63c4dedd47b04d24aac4038b795893050736
SHA5125a7a2c7f184efd9c84256a1a0a5e7aeb95432d63a567196be54e7a9437a5ada9b922983c5fc0cafb16eab4493665d8e56e2f646f9f6a2d6179986925ffcdf769
-
memory/1084-125-0x0000000000000000-mapping.dmp
-
memory/1252-90-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-97-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-76-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-77-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-78-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-79-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-80-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-81-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-82-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-83-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-84-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-85-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-86-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-87-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-88-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-89-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-62-0x0000000002AF0000-0x0000000002AF1000-memory.dmpFilesize
4KB
-
memory/1252-91-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-93-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-92-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-94-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-95-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-96-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-75-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-98-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-100-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-99-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-101-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-102-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-103-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-109-0x0000000077740000-0x0000000077742000-memory.dmpFilesize
8KB
-
memory/1252-74-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-64-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-73-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-72-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-69-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-63-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-70-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-65-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-71-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-68-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-67-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1252-66-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1504-115-0x0000000140000000-0x00000001401C0000-memory.dmpFilesize
1.8MB
-
memory/1504-111-0x0000000000000000-mapping.dmp
-
memory/1740-118-0x0000000000000000-mapping.dmp
-
memory/1924-59-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/1924-61-0x0000000000110000-0x0000000000117000-memory.dmpFilesize
28KB