Analysis
-
max time kernel
161s -
max time network
167s -
platform
windows10_x64 -
resource
win10-en -
submitted
15-09-2021 07:38
Static task
static1
Behavioral task
behavioral1
Sample
bf9ad9586d3a1594e627b0e4c13615cc806d8f73be0ac8fa8b79e08436ac503d.dll
Resource
win7v20210408
General
-
Target
bf9ad9586d3a1594e627b0e4c13615cc806d8f73be0ac8fa8b79e08436ac503d.dll
-
Size
1.7MB
-
MD5
0d4820d7d8af4fd62be7375b1529f047
-
SHA1
6bdbde14cf1bfc55c70c1e6c75e4290f11676f3f
-
SHA256
bf9ad9586d3a1594e627b0e4c13615cc806d8f73be0ac8fa8b79e08436ac503d
-
SHA512
7e647cf441b51898c4ee3e1cc6047b7cae3e6cfe1f09b4034cb7628869b8b1288617b65a76a517d3580b42f8214eb0acb6ab4b6edea031c47bfb46da3ded99c8
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3040-120-0x00000000011C0000-0x00000000011C1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
DisplaySwitch.exeTaskmgr.exeSystemPropertiesPerformance.exepid process 5096 DisplaySwitch.exe 3568 Taskmgr.exe 3016 SystemPropertiesPerformance.exe -
Loads dropped DLL 3 IoCs
Processes:
DisplaySwitch.exeTaskmgr.exeSystemPropertiesPerformance.exepid process 5096 DisplaySwitch.exe 3568 Taskmgr.exe 3016 SystemPropertiesPerformance.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wzmtblrj = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\FLASHP~1\\92tVRK\\Taskmgr.exe" -
Processes:
rundll32.exeDisplaySwitch.exeTaskmgr.exeSystemPropertiesPerformance.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DisplaySwitch.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Taskmgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesPerformance.exe -
Modifies registry class 2 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Key created \REGISTRY\USER\S-1-5-21-2559286294-2439613352-4032193287-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 4772 rundll32.exe 4772 rundll32.exe 4772 rundll32.exe 4772 rundll32.exe 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 3040 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3040 -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 Token: SeShutdownPrivilege 3040 Token: SeCreatePagefilePrivilege 3040 -
Suspicious use of FindShellTrayWindow 9 IoCs
Processes:
pid process 3040 3040 3040 3040 3040 3040 3040 3040 3040 -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
pid process 3040 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3040 wrote to memory of 5084 3040 DisplaySwitch.exe PID 3040 wrote to memory of 5084 3040 DisplaySwitch.exe PID 3040 wrote to memory of 5096 3040 DisplaySwitch.exe PID 3040 wrote to memory of 5096 3040 DisplaySwitch.exe PID 3040 wrote to memory of 3724 3040 Taskmgr.exe PID 3040 wrote to memory of 3724 3040 Taskmgr.exe PID 3040 wrote to memory of 3568 3040 Taskmgr.exe PID 3040 wrote to memory of 3568 3040 Taskmgr.exe PID 3040 wrote to memory of 3028 3040 SystemPropertiesPerformance.exe PID 3040 wrote to memory of 3028 3040 SystemPropertiesPerformance.exe PID 3040 wrote to memory of 3016 3040 SystemPropertiesPerformance.exe PID 3040 wrote to memory of 3016 3040 SystemPropertiesPerformance.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bf9ad9586d3a1594e627b0e4c13615cc806d8f73be0ac8fa8b79e08436ac503d.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\DisplaySwitch.exeC:\Windows\system32\DisplaySwitch.exe1⤵
-
C:\Users\Admin\AppData\Local\RRda\DisplaySwitch.exeC:\Users\Admin\AppData\Local\RRda\DisplaySwitch.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\Taskmgr.exeC:\Windows\system32\Taskmgr.exe1⤵
-
C:\Users\Admin\AppData\Local\mIDsNAD\Taskmgr.exeC:\Users\Admin\AppData\Local\mIDsNAD\Taskmgr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\SystemPropertiesPerformance.exeC:\Windows\system32\SystemPropertiesPerformance.exe1⤵
-
C:\Users\Admin\AppData\Local\3CMD\SystemPropertiesPerformance.exeC:\Users\Admin\AppData\Local\3CMD\SystemPropertiesPerformance.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\3CMD\SYSDM.CPLMD5
725f040c13b34481ab84866d6645eb4f
SHA1e78af39982b892759df4239258aac10338d96fb0
SHA25664f90f368bb26055c7ca82e2ea35f2c796781540393054799f93fbc2654710a6
SHA5124555c26e502cc7f483c5171b253df09c540d6a624b717c89662dca273bf4419fcf83348ce523e42c907162fe58210591acf3766976083bf2337879a4012aed25
-
C:\Users\Admin\AppData\Local\3CMD\SystemPropertiesPerformance.exeMD5
0a23dbe5f3926280d0eeef6e35b8e603
SHA13023d1eaef3944a8487c18672af1d562114b9f5f
SHA25624482d0a1972e7424e50de2aeb37d6f0d8a05e3f09afe4a0c7354817193a2d40
SHA512ef7c1f4fe4d20f47f4d8576df86cdd14f89e35a88e1253f27a0432e4963885acede7622e350116135f0f90eb2eaea60cba5f0612c127cb495e5e4f54333126f4
-
C:\Users\Admin\AppData\Local\RRda\DisplaySwitch.exeMD5
9e139d8cdf910f624c4cb0a63cbab22d
SHA114b7259a609fddb0c561e1154dac638fa0db06b3
SHA2563374874744179d8f880791ff4373736d9bb93ae3275be6ff26b296b4d8b9619c
SHA512d2c7521cc65c92da10a337303f5902560f3dc30ba0dfb959196337d4dcbc13a2ef69de7e7cfdc5e983affc3fc6938a485ef8ead0cf1c485aa0893c667fe08357
-
C:\Users\Admin\AppData\Local\RRda\UxTheme.dllMD5
755e8e792b3fefa4f85a62e3be57c62e
SHA198ee03b1e07d209e69f11354648c08587c91b0f1
SHA256d2e76705573dd0d88efbb02984d8fd341886d8836f59948bb57e49209be0f9bc
SHA512a922c60fb28ed0d670170f4dad0dd4c9ed144026e22d6ba77035ad5248f18b1109b5e637efcda99eec8b600e2339ded2e1c6d406ac36aa32abf81183989b9c5c
-
C:\Users\Admin\AppData\Local\mIDsNAD\DUser.dllMD5
4a76019277e7084fdb54b55ae017a459
SHA1b0ae49af5e21cfb5bfadc13ed95db2114976351b
SHA2566036b7ac8ce9f51c23114340279c2e941431b88fd794bda0397796ca7614aabf
SHA512af285c8f549eca155cfef57eb0f18c72c208c19417549df44cfa646d08e12c33b2bc0fc25dd5b6ae81e01575d6044a12e5edddca7570573450692adf735faab9
-
C:\Users\Admin\AppData\Local\mIDsNAD\Taskmgr.exeMD5
d3ef2efc7232674315e0573e464e8aa7
SHA1237ee3acc4743d05858056e09147a071b6e956e7
SHA256feecaba50bc95bd6540e5a075693d6dc961a9d5ef86f1bfb38f7bcde6e757472
SHA5121e03b1ad8059c28bfaa42f63626f2025cf1659266323255871a90b5ef2db9ab754ba4ffe9abe37bf3f5d92e494231c5fb81ba4d893f3a9833c2a5edf23825cc5
-
\Users\Admin\AppData\Local\3CMD\SYSDM.CPLMD5
725f040c13b34481ab84866d6645eb4f
SHA1e78af39982b892759df4239258aac10338d96fb0
SHA25664f90f368bb26055c7ca82e2ea35f2c796781540393054799f93fbc2654710a6
SHA5124555c26e502cc7f483c5171b253df09c540d6a624b717c89662dca273bf4419fcf83348ce523e42c907162fe58210591acf3766976083bf2337879a4012aed25
-
\Users\Admin\AppData\Local\RRda\UxTheme.dllMD5
755e8e792b3fefa4f85a62e3be57c62e
SHA198ee03b1e07d209e69f11354648c08587c91b0f1
SHA256d2e76705573dd0d88efbb02984d8fd341886d8836f59948bb57e49209be0f9bc
SHA512a922c60fb28ed0d670170f4dad0dd4c9ed144026e22d6ba77035ad5248f18b1109b5e637efcda99eec8b600e2339ded2e1c6d406ac36aa32abf81183989b9c5c
-
\Users\Admin\AppData\Local\mIDsNAD\DUser.dllMD5
4a76019277e7084fdb54b55ae017a459
SHA1b0ae49af5e21cfb5bfadc13ed95db2114976351b
SHA2566036b7ac8ce9f51c23114340279c2e941431b88fd794bda0397796ca7614aabf
SHA512af285c8f549eca155cfef57eb0f18c72c208c19417549df44cfa646d08e12c33b2bc0fc25dd5b6ae81e01575d6044a12e5edddca7570573450692adf735faab9
-
memory/3016-194-0x0000000000000000-mapping.dmp
-
memory/3040-149-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-153-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-130-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-131-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-132-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-133-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-134-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-135-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-136-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-137-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-138-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-139-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-141-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-142-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-143-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-144-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-145-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-146-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-147-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-148-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-120-0x00000000011C0000-0x00000000011C1000-memory.dmpFilesize
4KB
-
memory/3040-140-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-150-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-151-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-152-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-129-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-154-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-157-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-158-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-159-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-160-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-156-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-161-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-155-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-169-0x00007FFBA1CE4560-0x00007FFBA1CE5560-memory.dmpFilesize
4KB
-
memory/3040-121-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-128-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-174-0x00007FFBA1E20000-0x00007FFBA1E22000-memory.dmpFilesize
8KB
-
memory/3040-127-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-126-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-122-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-124-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-123-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3040-125-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/3568-185-0x0000000140000000-0x00000001401C1000-memory.dmpFilesize
1.8MB
-
memory/3568-181-0x0000000000000000-mapping.dmp
-
memory/4772-115-0x0000000140000000-0x00000001401BF000-memory.dmpFilesize
1.7MB
-
memory/4772-119-0x0000028B33EC0000-0x0000028B33EC7000-memory.dmpFilesize
28KB
-
memory/5096-176-0x0000000140000000-0x00000001401C0000-memory.dmpFilesize
1.8MB
-
memory/5096-171-0x0000000000000000-mapping.dmp