Analysis
-
max time kernel
154s -
max time network
161s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
28-09-2021 09:17
Static task
static1
Behavioral task
behavioral1
Sample
67e634c8f431ed69d672dca57c2bd493772b24fdee37432aa8fc3e1822f0b804.dll
Resource
win7v20210408
General
-
Target
67e634c8f431ed69d672dca57c2bd493772b24fdee37432aa8fc3e1822f0b804.dll
-
Size
1.7MB
-
MD5
6966f6e2c68c1f536d63b50bb966c031
-
SHA1
c10eace5e0b5c0531895ed1d02332e3e8bd0fd32
-
SHA256
67e634c8f431ed69d672dca57c2bd493772b24fdee37432aa8fc3e1822f0b804
-
SHA512
365cefcf86f2d1b12e59d819c3dda9733003592a6a3cbf010b15d543547f2de2038dc659301a3f454881b76c644d929bb24c382bb70b349a621f95047457c19f
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3008-120-0x0000000000D00000-0x0000000000D01000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
SndVol.exeRDVGHelper.exeRdpSa.exepid process 3248 SndVol.exe 1008 RDVGHelper.exe 2308 RdpSa.exe -
Loads dropped DLL 3 IoCs
Processes:
SndVol.exeRDVGHelper.exeRdpSa.exepid process 3248 SndVol.exe 1008 RDVGHelper.exe 2308 RdpSa.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wjvmqhmsyzhtvy = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\ShHiS\\RDVGHelper.exe" -
Processes:
rundll32.exeSndVol.exeRDVGHelper.exeRdpSa.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SndVol.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RDVGHelper.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RdpSa.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2348 rundll32.exe 2348 rundll32.exe 2348 rundll32.exe 2348 rundll32.exe 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 3008 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3008 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3008 wrote to memory of 2284 3008 SndVol.exe PID 3008 wrote to memory of 2284 3008 SndVol.exe PID 3008 wrote to memory of 3248 3008 SndVol.exe PID 3008 wrote to memory of 3248 3008 SndVol.exe PID 3008 wrote to memory of 912 3008 RDVGHelper.exe PID 3008 wrote to memory of 912 3008 RDVGHelper.exe PID 3008 wrote to memory of 1008 3008 RDVGHelper.exe PID 3008 wrote to memory of 1008 3008 RDVGHelper.exe PID 3008 wrote to memory of 2196 3008 RdpSa.exe PID 3008 wrote to memory of 2196 3008 RdpSa.exe PID 3008 wrote to memory of 2308 3008 RdpSa.exe PID 3008 wrote to memory of 2308 3008 RdpSa.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\67e634c8f431ed69d672dca57c2bd493772b24fdee37432aa8fc3e1822f0b804.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\SndVol.exeC:\Windows\system32\SndVol.exe1⤵
-
C:\Users\Admin\AppData\Local\hC79Lp8\SndVol.exeC:\Users\Admin\AppData\Local\hC79Lp8\SndVol.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\RDVGHelper.exeC:\Windows\system32\RDVGHelper.exe1⤵
-
C:\Users\Admin\AppData\Local\bZQ\RDVGHelper.exeC:\Users\Admin\AppData\Local\bZQ\RDVGHelper.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\RdpSa.exeC:\Windows\system32\RdpSa.exe1⤵
-
C:\Users\Admin\AppData\Local\yPk2EZwI\RdpSa.exeC:\Users\Admin\AppData\Local\yPk2EZwI\RdpSa.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\bZQ\RDVGHelper.exeMD5
df98b824d9fa64358198283a97f453e3
SHA15328e86ede10063e77b988c9d2420d0c595800a1
SHA25678361d08e67beb2df4f81d36440a25c4812684f28ba20f98de9a3ac3cfcd67ec
SHA512984f7cc4dda5b1553df66678501ef3f5bfd79f7c327e1d0292f94cd65542cd6bca692bf6f02aa705df518d2a5630d9ba29bc0a85c00c5f9d45c5f11be9ceb213
-
C:\Users\Admin\AppData\Local\bZQ\WTSAPI32.dllMD5
c0afb473900c052309b06fcc8a6e5eb2
SHA12c3ad3d9e23a1749b14056c10dfba43358a8b59e
SHA2565d193f643cddc1eaf2e0ad6b8e5eb90be4d95891412078b9a1f8884f98f758e6
SHA51213b881a4bb5b3ae3c24cd15003e5f70e4fd024becf11162fe3011b196f58bcadc3c62875c72eecf9ddac8105a686408739e0f5f611f98b924f723b26f554ce01
-
C:\Users\Admin\AppData\Local\hC79Lp8\SndVol.exeMD5
27205270f880954ac16dbe3436a8699a
SHA1c94dee99c7a19f85be8feef0019969b972894437
SHA2569520ffcee5ece79190dcccc9020e212d43aa6f58e2e633e2a5ed701e909abb6f
SHA5125e9cbc33cb583c93db4df7781c8960185703da554db81b31087545cc82d4eaf7a3d94aa7aff2b9c999446c621896c264940f0b1c1b4ba0e71cb09ab3dcc6b44b
-
C:\Users\Admin\AppData\Local\hC79Lp8\UxTheme.dllMD5
71248ab9fad828bca6bdf961094c9be7
SHA1d10e80580873d5313054f9ac3020ad78f3d31c74
SHA256a7e67c9a94a750d09ef1fa0898682d0108dba74d079d7d25efee334bdd5d14fe
SHA512fce90302a6b87e4ebd3ce876c7ea3390eb807dd2598d1451e54401ede8d022efc78cff169cfc83f3073078842a0da70a05f797fa795017041303f7c2be0cd120
-
C:\Users\Admin\AppData\Local\yPk2EZwI\RdpSa.exeMD5
f1c2442f3ec5188998bf290c4cbd562a
SHA173fa6d853a92bfcc7671f82d3ab87ea3133bd9ad
SHA256f6ff99a61cf82ef5889b3dd359a3bb55772439b66c710a9899eb8768c73a0a72
SHA512310315718d7c684916f16754a1bceb9eb334c2dc8cb70634bf253b7b3d2fc8702e6ce7db52da0122a55fe53cadef1a6ec158d0056ebdbc2bcdc4832033e5d3f4
-
C:\Users\Admin\AppData\Local\yPk2EZwI\WINSTA.dllMD5
42d5499d135f5947802c7bc922707b60
SHA19bc201437515e56b572c36cfd8f2413ed575f6af
SHA2567480b609876984fc1b0ecdf9b8d162dcfaee1274fbab51e8720417d08d2e273f
SHA51210179a42297b84455622743ac8164564007581bd902a38ad9ed97acdd429f1413d41536b0ed5705babe25e1afb31436af5fc8d62f0e25a2a0963f4e4ee5a2e74
-
\Users\Admin\AppData\Local\bZQ\WTSAPI32.dllMD5
c0afb473900c052309b06fcc8a6e5eb2
SHA12c3ad3d9e23a1749b14056c10dfba43358a8b59e
SHA2565d193f643cddc1eaf2e0ad6b8e5eb90be4d95891412078b9a1f8884f98f758e6
SHA51213b881a4bb5b3ae3c24cd15003e5f70e4fd024becf11162fe3011b196f58bcadc3c62875c72eecf9ddac8105a686408739e0f5f611f98b924f723b26f554ce01
-
\Users\Admin\AppData\Local\hC79Lp8\UxTheme.dllMD5
71248ab9fad828bca6bdf961094c9be7
SHA1d10e80580873d5313054f9ac3020ad78f3d31c74
SHA256a7e67c9a94a750d09ef1fa0898682d0108dba74d079d7d25efee334bdd5d14fe
SHA512fce90302a6b87e4ebd3ce876c7ea3390eb807dd2598d1451e54401ede8d022efc78cff169cfc83f3073078842a0da70a05f797fa795017041303f7c2be0cd120
-
\Users\Admin\AppData\Local\yPk2EZwI\WINSTA.dllMD5
42d5499d135f5947802c7bc922707b60
SHA19bc201437515e56b572c36cfd8f2413ed575f6af
SHA2567480b609876984fc1b0ecdf9b8d162dcfaee1274fbab51e8720417d08d2e273f
SHA51210179a42297b84455622743ac8164564007581bd902a38ad9ed97acdd429f1413d41536b0ed5705babe25e1afb31436af5fc8d62f0e25a2a0963f4e4ee5a2e74
-
memory/1008-172-0x0000000000000000-mapping.dmp
-
memory/2308-185-0x0000000140000000-0x00000001401B4000-memory.dmpFilesize
1.7MB
-
memory/2308-181-0x0000000000000000-mapping.dmp
-
memory/2348-119-0x000001A452F70000-0x000001A452F77000-memory.dmpFilesize
28KB
-
memory/2348-115-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-137-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-142-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-129-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-130-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-131-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-132-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-133-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-134-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-135-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-136-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-127-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-138-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-139-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-140-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-141-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-143-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-144-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-145-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-146-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-128-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-147-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-148-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-149-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-151-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-152-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-150-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-160-0x00007FFA8CD64560-0x00007FFA8CD65560-memory.dmpFilesize
4KB
-
memory/3008-162-0x00007FFA8CEA0000-0x00007FFA8CEA2000-memory.dmpFilesize
8KB
-
memory/3008-126-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-125-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-124-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-123-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-122-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-121-0x0000000140000000-0x00000001401B2000-memory.dmpFilesize
1.7MB
-
memory/3008-120-0x0000000000D00000-0x0000000000D01000-memory.dmpFilesize
4KB
-
memory/3248-163-0x0000000000000000-mapping.dmp
-
memory/3248-167-0x0000000140000000-0x00000001401B3000-memory.dmpFilesize
1.7MB