Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
28-09-2021 08:47
Static task
static1
Behavioral task
behavioral1
Sample
2c1cbd4e7a27c47468c2e806e5559c3680f1cd6497c33a65c0a565fe8bab1add.dll
Resource
win7-en-20210920
General
-
Target
2c1cbd4e7a27c47468c2e806e5559c3680f1cd6497c33a65c0a565fe8bab1add.dll
-
Size
2.0MB
-
MD5
24628d042b24ccca20dfc18374ee15c1
-
SHA1
0deb91aa0e4c63080d71db61bfed0c7a5fb967ca
-
SHA256
2c1cbd4e7a27c47468c2e806e5559c3680f1cd6497c33a65c0a565fe8bab1add
-
SHA512
dd3c8457810dc1f17d1ea38be7d8884a89fd668a1b8b3d3d41f221e3997ef434e23a716433e7b214503e10649dba4830a1bf648c5a8dd23ff494d49a6d10aa23
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1384-57-0x00000000025B0000-0x00000000025B1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
fvenotify.exewisptis.exeBitLockerWizard.exepid process 1604 fvenotify.exe 540 wisptis.exe 1956 BitLockerWizard.exe -
Loads dropped DLL 7 IoCs
Processes:
fvenotify.exewisptis.exeBitLockerWizard.exepid process 1384 1604 fvenotify.exe 1384 540 wisptis.exe 1384 1956 BitLockerWizard.exe 1384 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wbbdywj = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\UserData\\Low\\AXNNSI~1\\wisptis.exe" -
Processes:
rundll32.exefvenotify.exewisptis.exeBitLockerWizard.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fvenotify.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wisptis.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizard.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2012 rundll32.exe 2012 rundll32.exe 2012 rundll32.exe 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1384 -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
pid process 1384 1384 1384 1384 -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
pid process 1384 1384 1384 1384 1384 1384 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1384 wrote to memory of 588 1384 fvenotify.exe PID 1384 wrote to memory of 588 1384 fvenotify.exe PID 1384 wrote to memory of 588 1384 fvenotify.exe PID 1384 wrote to memory of 1604 1384 fvenotify.exe PID 1384 wrote to memory of 1604 1384 fvenotify.exe PID 1384 wrote to memory of 1604 1384 fvenotify.exe PID 1384 wrote to memory of 436 1384 wisptis.exe PID 1384 wrote to memory of 436 1384 wisptis.exe PID 1384 wrote to memory of 436 1384 wisptis.exe PID 1384 wrote to memory of 540 1384 wisptis.exe PID 1384 wrote to memory of 540 1384 wisptis.exe PID 1384 wrote to memory of 540 1384 wisptis.exe PID 1384 wrote to memory of 1260 1384 BitLockerWizard.exe PID 1384 wrote to memory of 1260 1384 BitLockerWizard.exe PID 1384 wrote to memory of 1260 1384 BitLockerWizard.exe PID 1384 wrote to memory of 1956 1384 BitLockerWizard.exe PID 1384 wrote to memory of 1956 1384 BitLockerWizard.exe PID 1384 wrote to memory of 1956 1384 BitLockerWizard.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2c1cbd4e7a27c47468c2e806e5559c3680f1cd6497c33a65c0a565fe8bab1add.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\fvenotify.exeC:\Windows\system32\fvenotify.exe1⤵
-
C:\Users\Admin\AppData\Local\DQ5u66\fvenotify.exeC:\Users\Admin\AppData\Local\DQ5u66\fvenotify.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\wisptis.exeC:\Windows\system32\wisptis.exe1⤵
-
C:\Users\Admin\AppData\Local\e1Zx7\wisptis.exeC:\Users\Admin\AppData\Local\e1Zx7\wisptis.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\BitLockerWizard.exeC:\Windows\system32\BitLockerWizard.exe1⤵
-
C:\Users\Admin\AppData\Local\CfOd\BitLockerWizard.exeC:\Users\Admin\AppData\Local\CfOd\BitLockerWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\CfOd\BitLockerWizard.exeMD5
08a761595ad21d152db2417d6fdb239a
SHA1d84c1bc2e8c9afce9fb79916df9bca169f93a936
SHA256ec0b9e5f29a43f9db44fa76b85701058f26776ab974044c1d4741591b74d0620
SHA5128b07828e9c0edf09277f89294b8e1a54816f6f3d1fe132b3eb70370b81feb82d056ec31566793bd6f451725f79c3b4aeedb15a83216115e00943e0c19cab37c9
-
C:\Users\Admin\AppData\Local\CfOd\FVEWIZ.dllMD5
b5ecf325ed68ae0d334eef78502b71d3
SHA1b21324f5adf12da39dcbe9d6b072aa5cdd1d2fef
SHA25622b2162a1da367b54e84ceefae5ec1843e335a5e0ff0ca1358c4f5f350bcdfd5
SHA5123e2f296b3319c8aeae637a032a77ce98aab14f33b602a83e51278ee1e37fae0f3663c40985771961badf7028d8a13872e116497855bcad5e13fb7db97b3706c1
-
C:\Users\Admin\AppData\Local\DQ5u66\fvenotify.exeMD5
e61d644998e07c02f0999388808ac109
SHA1183130ad81ff4c7997582a484e759bf7769592d6
SHA25615a85cd6fbcb1ec57d78f986d6dd8908bd56231ce0cf65775075512303f7e5fa
SHA512310141b73394ae12a35f8d4f0c097868ee8a8045a62dd402a5dfbe2151980dd4fe18409ae3ca9422e3b88b2fa9afb04c1acbf8ec23a937a0a242b32a9a1e9272
-
C:\Users\Admin\AppData\Local\DQ5u66\slc.dllMD5
87cec6cce3ebe35c15a35e1f8fcbf471
SHA176068c9a4a5d4afe5a4b422fd65690a24864103b
SHA25681eeacd372b30933349ec5cbe47ff0540ccfc6ad55aa8deeb284c4b9607ba1fa
SHA51248889289c04d0293611c94aeaa333c5b72ccbcbb1ffd9f637604a258967817e58ccebbbc6f4323994ac1d2250c32703608afce46cfa8513cc9e9f96896f4983b
-
C:\Users\Admin\AppData\Local\e1Zx7\MAGNIFICATION.dllMD5
01610d390b6ba66237577d58187acf17
SHA1f78042fe07bd01d296daa7a8680ee6e757c1c3bc
SHA2560bd1922bebbb23fd16958c6f984795b3e7f8516ddfc844600d9b66309c4a4d8e
SHA512251ea9a540f3fa2d3e8327fbca16111d2f0ad76dc9365deea67f8f32d4647eaa52ac382584c38b6641d22e3fbe8d373ace643a6d905f3275e93bced3cdeb1af9
-
C:\Users\Admin\AppData\Local\e1Zx7\wisptis.exeMD5
02e20372d9d6d28e37ba9704edc90b67
SHA1d7d18ba0df95c3507bf20be8d72e25c5d11ab40c
SHA2563338129ddf6fb53d6e743c10bc39ec372d9b2c39c607cbe8a71cff929f854144
SHA512bcad8894614dcfc1429be04829c217e7c8ac3c40ea3927073de3421d96d9815739ee1b84f0200eb18b3b8406b972bd934204b7b31638c9fe7c297fb201ed4200
-
\Users\Admin\AppData\Local\CfOd\BitLockerWizard.exeMD5
08a761595ad21d152db2417d6fdb239a
SHA1d84c1bc2e8c9afce9fb79916df9bca169f93a936
SHA256ec0b9e5f29a43f9db44fa76b85701058f26776ab974044c1d4741591b74d0620
SHA5128b07828e9c0edf09277f89294b8e1a54816f6f3d1fe132b3eb70370b81feb82d056ec31566793bd6f451725f79c3b4aeedb15a83216115e00943e0c19cab37c9
-
\Users\Admin\AppData\Local\CfOd\FVEWIZ.dllMD5
b5ecf325ed68ae0d334eef78502b71d3
SHA1b21324f5adf12da39dcbe9d6b072aa5cdd1d2fef
SHA25622b2162a1da367b54e84ceefae5ec1843e335a5e0ff0ca1358c4f5f350bcdfd5
SHA5123e2f296b3319c8aeae637a032a77ce98aab14f33b602a83e51278ee1e37fae0f3663c40985771961badf7028d8a13872e116497855bcad5e13fb7db97b3706c1
-
\Users\Admin\AppData\Local\DQ5u66\fvenotify.exeMD5
e61d644998e07c02f0999388808ac109
SHA1183130ad81ff4c7997582a484e759bf7769592d6
SHA25615a85cd6fbcb1ec57d78f986d6dd8908bd56231ce0cf65775075512303f7e5fa
SHA512310141b73394ae12a35f8d4f0c097868ee8a8045a62dd402a5dfbe2151980dd4fe18409ae3ca9422e3b88b2fa9afb04c1acbf8ec23a937a0a242b32a9a1e9272
-
\Users\Admin\AppData\Local\DQ5u66\slc.dllMD5
87cec6cce3ebe35c15a35e1f8fcbf471
SHA176068c9a4a5d4afe5a4b422fd65690a24864103b
SHA25681eeacd372b30933349ec5cbe47ff0540ccfc6ad55aa8deeb284c4b9607ba1fa
SHA51248889289c04d0293611c94aeaa333c5b72ccbcbb1ffd9f637604a258967817e58ccebbbc6f4323994ac1d2250c32703608afce46cfa8513cc9e9f96896f4983b
-
\Users\Admin\AppData\Local\e1Zx7\MAGNIFICATION.dllMD5
01610d390b6ba66237577d58187acf17
SHA1f78042fe07bd01d296daa7a8680ee6e757c1c3bc
SHA2560bd1922bebbb23fd16958c6f984795b3e7f8516ddfc844600d9b66309c4a4d8e
SHA512251ea9a540f3fa2d3e8327fbca16111d2f0ad76dc9365deea67f8f32d4647eaa52ac382584c38b6641d22e3fbe8d373ace643a6d905f3275e93bced3cdeb1af9
-
\Users\Admin\AppData\Local\e1Zx7\wisptis.exeMD5
02e20372d9d6d28e37ba9704edc90b67
SHA1d7d18ba0df95c3507bf20be8d72e25c5d11ab40c
SHA2563338129ddf6fb53d6e743c10bc39ec372d9b2c39c607cbe8a71cff929f854144
SHA512bcad8894614dcfc1429be04829c217e7c8ac3c40ea3927073de3421d96d9815739ee1b84f0200eb18b3b8406b972bd934204b7b31638c9fe7c297fb201ed4200
-
\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\yPzih4ZQZY\BitLockerWizard.exeMD5
08a761595ad21d152db2417d6fdb239a
SHA1d84c1bc2e8c9afce9fb79916df9bca169f93a936
SHA256ec0b9e5f29a43f9db44fa76b85701058f26776ab974044c1d4741591b74d0620
SHA5128b07828e9c0edf09277f89294b8e1a54816f6f3d1fe132b3eb70370b81feb82d056ec31566793bd6f451725f79c3b4aeedb15a83216115e00943e0c19cab37c9
-
memory/540-114-0x0000000000000000-mapping.dmp
-
memory/1384-78-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-63-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-93-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-94-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-96-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-97-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-98-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-95-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-92-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-91-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-89-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-87-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-85-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-81-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-82-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-79-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-57-0x00000000025B0000-0x00000000025B1000-memory.dmpFilesize
4KB
-
memory/1384-74-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-73-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-72-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-70-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-69-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-68-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-66-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-65-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-90-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-62-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-61-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-59-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-58-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-104-0x00000000773C0000-0x00000000773C2000-memory.dmpFilesize
8KB
-
memory/1384-88-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-60-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-86-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-64-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-84-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-83-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-67-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-80-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-77-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-76-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-75-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1384-71-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/1604-111-0x0000000140000000-0x000000014020B000-memory.dmpFilesize
2.0MB
-
memory/1604-108-0x000007FEFBC31000-0x000007FEFBC33000-memory.dmpFilesize
8KB
-
memory/1604-106-0x0000000000000000-mapping.dmp
-
memory/1956-121-0x0000000000000000-mapping.dmp
-
memory/2012-54-0x0000000140000000-0x000000014020A000-memory.dmpFilesize
2.0MB
-
memory/2012-56-0x00000000002A0000-0x00000000002A7000-memory.dmpFilesize
28KB