Analysis
-
max time kernel
153s -
max time network
139s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
28-09-2021 09:21
Static task
static1
Behavioral task
behavioral1
Sample
73541b82ca26c8c60a84354c657c42bd2ece5cfad3f49437a927b4265234b9da.dll
Resource
win7-en-20210920
General
-
Target
73541b82ca26c8c60a84354c657c42bd2ece5cfad3f49437a927b4265234b9da.dll
-
Size
1.3MB
-
MD5
d49772c85d426ce5fe41cf8c5529a5ff
-
SHA1
4eaa4a005cd6825706634cf5fb9b95c4f546778e
-
SHA256
73541b82ca26c8c60a84354c657c42bd2ece5cfad3f49437a927b4265234b9da
-
SHA512
ac76de00fd7f4cfaaac884990f02ff26883500d4a7c1c37e13a173de04b7228847527bca4737aa32e9498a05f473ac1a27ce98f35dead85fcc95e9c54efc924e
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1424-54-0x0000000140000000-0x000000014014E000-memory.dmp dridex_payload behavioral1/memory/1360-95-0x0000000140000000-0x000000014014F000-memory.dmp dridex_payload behavioral1/memory/828-104-0x0000000140000000-0x0000000140150000-memory.dmp dridex_payload -
Processes:
resource yara_rule behavioral1/memory/1428-57-0x00000000025E0000-0x00000000025E1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
notepad.exeWFS.exewinlogon.exepid process 1360 notepad.exe 828 WFS.exe 1076 winlogon.exe -
Loads dropped DLL 7 IoCs
Processes:
notepad.exeWFS.exewinlogon.exepid process 1428 1360 notepad.exe 1428 828 WFS.exe 1428 1076 winlogon.exe 1428 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wbbdywj = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\8V\\WFS.exe" -
Processes:
notepad.exeWFS.exewinlogon.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA notepad.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WFS.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlogon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1424 rundll32.exe 1424 rundll32.exe 1424 rundll32.exe 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1428 -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
pid process 1428 1428 1428 1428 -
Suspicious use of SendNotifyMessage 10 IoCs
Processes:
pid process 1428 1428 1428 1428 1428 1428 1428 1428 1428 1428 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1428 wrote to memory of 1336 1428 notepad.exe PID 1428 wrote to memory of 1336 1428 notepad.exe PID 1428 wrote to memory of 1336 1428 notepad.exe PID 1428 wrote to memory of 1360 1428 notepad.exe PID 1428 wrote to memory of 1360 1428 notepad.exe PID 1428 wrote to memory of 1360 1428 notepad.exe PID 1428 wrote to memory of 1324 1428 WFS.exe PID 1428 wrote to memory of 1324 1428 WFS.exe PID 1428 wrote to memory of 1324 1428 WFS.exe PID 1428 wrote to memory of 828 1428 WFS.exe PID 1428 wrote to memory of 828 1428 WFS.exe PID 1428 wrote to memory of 828 1428 WFS.exe PID 1428 wrote to memory of 1944 1428 winlogon.exe PID 1428 wrote to memory of 1944 1428 winlogon.exe PID 1428 wrote to memory of 1944 1428 winlogon.exe PID 1428 wrote to memory of 1076 1428 winlogon.exe PID 1428 wrote to memory of 1076 1428 winlogon.exe PID 1428 wrote to memory of 1076 1428 winlogon.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\73541b82ca26c8c60a84354c657c42bd2ece5cfad3f49437a927b4265234b9da.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\notepad.exeC:\Windows\system32\notepad.exe1⤵
-
C:\Users\Admin\AppData\Local\tKhUCnT\notepad.exeC:\Users\Admin\AppData\Local\tKhUCnT\notepad.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\WFS.exeC:\Windows\system32\WFS.exe1⤵
-
C:\Users\Admin\AppData\Local\X3psNv\WFS.exeC:\Users\Admin\AppData\Local\X3psNv\WFS.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\winlogon.exeC:\Windows\system32\winlogon.exe1⤵
-
C:\Users\Admin\AppData\Local\Wrmxe\winlogon.exeC:\Users\Admin\AppData\Local\Wrmxe\winlogon.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Wrmxe\WINSTA.dllMD5
d36fa8fd54eb61c2e8d6ced8c972947c
SHA1e1c34c19f362f6c09734d66f249258b69b085a34
SHA256406de11420f1aa10bdff5d7bbfba9c9b49ac93c2f0d798b01e2445042158766b
SHA512d10b8bd6cc33a24ca83ffcbd569adac478747e7b77d03d3a30fc145571c60c4a1cb4d567a618b23ab23c44c124688c9618ccee6b9f5b0455b45f1a89f0bb2523
-
C:\Users\Admin\AppData\Local\Wrmxe\winlogon.exeMD5
1151b1baa6f350b1db6598e0fea7c457
SHA1434856b834baf163c5ea4d26434eeae775a507fb
SHA256b1506e0a7e826eff0f5252ef5026070c46e2235438403a9a24d73ee69c0b8a49
SHA512df728d06238da1dece96f8b8d67a2423ed4dcb344b42d5958768d23bd570a79e7189e7c5ba783c1628fe8ddd1deaebeacb1b471c59c8a7c9beb21b4f1eb9edab
-
C:\Users\Admin\AppData\Local\X3psNv\WFS.exeMD5
a943d670747778c7597987a4b5b9a679
SHA1c48b760ff9762205386563b93e8884352645ef40
SHA2561a582ebe780abc1143baccaf4910714d3e9f4195edd86939499d03ed6e756610
SHA5123d926ddead8afcb32b52b3eb3c416d197c15e5fff6ba9fa03a31a07522bdb9088b32500fc8b98d82af657071571d09cd336a65cf45c485ebcc145dea70b3a934
-
C:\Users\Admin\AppData\Local\X3psNv\WINMM.dllMD5
f6bd3879991d5838438b450495f22117
SHA1285cb357448fae2b1ebe09ca845d504602192aae
SHA2563896b22192cb0298eb3e57696390629b1d0e5ea4cf5f78ce61c2330224dfbaa9
SHA512cf90d0f86ac6dccdc95bb58657615de58049b8cc10911546bd04ba9e106cadeeadbc1a79f3c77e41815ba193858256d151688f96405860aa24680d904deed0c6
-
C:\Users\Admin\AppData\Local\tKhUCnT\VERSION.dllMD5
e0eef18fb604c42d7b878474ef7a3ef2
SHA13e1f75a8a16aaf1a7355cfcb2c961d0a04e9e38f
SHA256338325b4e32dbb9b23656dc0261d6a63bd8e6f7a146a8ef452456f28bff062c4
SHA5123353b2ba8d3bb04e4bdc125590df39bf7639919be577f700a9b0d674ba89ddced6f27030e24adb80de97169f62557eddb5d73cae47d7daeca18234bc19e2d466
-
C:\Users\Admin\AppData\Local\tKhUCnT\notepad.exeMD5
f2c7bb8acc97f92e987a2d4087d021b1
SHA17eb0139d2175739b3ccb0d1110067820be6abd29
SHA256142e1d688ef0568370c37187fd9f2351d7ddeda574f8bfa9b0fa4ef42db85aa2
SHA5122f37a2e503cffbd7c05c7d8a125b55368ce11aad5b62f17aaac7aaf3391a6886fa6a0fd73223e9f30072419bf5762a8af7958e805a52d788ba41f61eb084bfe8
-
\Users\Admin\AppData\Local\Wrmxe\WINSTA.dllMD5
d36fa8fd54eb61c2e8d6ced8c972947c
SHA1e1c34c19f362f6c09734d66f249258b69b085a34
SHA256406de11420f1aa10bdff5d7bbfba9c9b49ac93c2f0d798b01e2445042158766b
SHA512d10b8bd6cc33a24ca83ffcbd569adac478747e7b77d03d3a30fc145571c60c4a1cb4d567a618b23ab23c44c124688c9618ccee6b9f5b0455b45f1a89f0bb2523
-
\Users\Admin\AppData\Local\Wrmxe\winlogon.exeMD5
1151b1baa6f350b1db6598e0fea7c457
SHA1434856b834baf163c5ea4d26434eeae775a507fb
SHA256b1506e0a7e826eff0f5252ef5026070c46e2235438403a9a24d73ee69c0b8a49
SHA512df728d06238da1dece96f8b8d67a2423ed4dcb344b42d5958768d23bd570a79e7189e7c5ba783c1628fe8ddd1deaebeacb1b471c59c8a7c9beb21b4f1eb9edab
-
\Users\Admin\AppData\Local\X3psNv\WFS.exeMD5
a943d670747778c7597987a4b5b9a679
SHA1c48b760ff9762205386563b93e8884352645ef40
SHA2561a582ebe780abc1143baccaf4910714d3e9f4195edd86939499d03ed6e756610
SHA5123d926ddead8afcb32b52b3eb3c416d197c15e5fff6ba9fa03a31a07522bdb9088b32500fc8b98d82af657071571d09cd336a65cf45c485ebcc145dea70b3a934
-
\Users\Admin\AppData\Local\X3psNv\WINMM.dllMD5
f6bd3879991d5838438b450495f22117
SHA1285cb357448fae2b1ebe09ca845d504602192aae
SHA2563896b22192cb0298eb3e57696390629b1d0e5ea4cf5f78ce61c2330224dfbaa9
SHA512cf90d0f86ac6dccdc95bb58657615de58049b8cc10911546bd04ba9e106cadeeadbc1a79f3c77e41815ba193858256d151688f96405860aa24680d904deed0c6
-
\Users\Admin\AppData\Local\tKhUCnT\VERSION.dllMD5
e0eef18fb604c42d7b878474ef7a3ef2
SHA13e1f75a8a16aaf1a7355cfcb2c961d0a04e9e38f
SHA256338325b4e32dbb9b23656dc0261d6a63bd8e6f7a146a8ef452456f28bff062c4
SHA5123353b2ba8d3bb04e4bdc125590df39bf7639919be577f700a9b0d674ba89ddced6f27030e24adb80de97169f62557eddb5d73cae47d7daeca18234bc19e2d466
-
\Users\Admin\AppData\Local\tKhUCnT\notepad.exeMD5
f2c7bb8acc97f92e987a2d4087d021b1
SHA17eb0139d2175739b3ccb0d1110067820be6abd29
SHA256142e1d688ef0568370c37187fd9f2351d7ddeda574f8bfa9b0fa4ef42db85aa2
SHA5122f37a2e503cffbd7c05c7d8a125b55368ce11aad5b62f17aaac7aaf3391a6886fa6a0fd73223e9f30072419bf5762a8af7958e805a52d788ba41f61eb084bfe8
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\zspP\winlogon.exeMD5
1151b1baa6f350b1db6598e0fea7c457
SHA1434856b834baf163c5ea4d26434eeae775a507fb
SHA256b1506e0a7e826eff0f5252ef5026070c46e2235438403a9a24d73ee69c0b8a49
SHA512df728d06238da1dece96f8b8d67a2423ed4dcb344b42d5958768d23bd570a79e7189e7c5ba783c1628fe8ddd1deaebeacb1b471c59c8a7c9beb21b4f1eb9edab
-
memory/828-104-0x0000000140000000-0x0000000140150000-memory.dmpFilesize
1.3MB
-
memory/828-98-0x0000000000000000-mapping.dmp
-
memory/828-103-0x000000013F7D1000-0x000000013F7D3000-memory.dmpFilesize
8KB
-
memory/1076-107-0x0000000000000000-mapping.dmp
-
memory/1360-92-0x000007FEFBB51000-0x000007FEFBB53000-memory.dmpFilesize
8KB
-
memory/1360-95-0x0000000140000000-0x000000014014F000-memory.dmpFilesize
1.3MB
-
memory/1360-90-0x0000000000000000-mapping.dmp
-
memory/1424-54-0x0000000140000000-0x000000014014E000-memory.dmpFilesize
1.3MB
-
memory/1424-56-0x0000000000280000-0x0000000000287000-memory.dmpFilesize
28KB
-
memory/1428-75-0x0000000140000000-0x000000014014E000-memory.dmpFilesize
1.3MB
-
memory/1428-80-0x0000000140000000-0x000000014014E000-memory.dmpFilesize
1.3MB
-
memory/1428-68-0x0000000140000000-0x000000014014E000-memory.dmpFilesize
1.3MB
-
memory/1428-65-0x0000000140000000-0x000000014014E000-memory.dmpFilesize
1.3MB
-
memory/1428-64-0x0000000140000000-0x000000014014E000-memory.dmpFilesize
1.3MB
-
memory/1428-59-0x0000000140000000-0x000000014014E000-memory.dmpFilesize
1.3MB
-
memory/1428-58-0x0000000140000000-0x000000014014E000-memory.dmpFilesize
1.3MB
-
memory/1428-71-0x0000000140000000-0x000000014014E000-memory.dmpFilesize
1.3MB
-
memory/1428-83-0x0000000140000000-0x000000014014E000-memory.dmpFilesize
1.3MB
-
memory/1428-74-0x0000000140000000-0x000000014014E000-memory.dmpFilesize
1.3MB
-
memory/1428-76-0x0000000140000000-0x000000014014E000-memory.dmpFilesize
1.3MB
-
memory/1428-81-0x0000000140000000-0x000000014014E000-memory.dmpFilesize
1.3MB
-
memory/1428-82-0x0000000140000000-0x000000014014E000-memory.dmpFilesize
1.3MB
-
memory/1428-69-0x0000000140000000-0x000000014014E000-memory.dmpFilesize
1.3MB
-
memory/1428-78-0x0000000140000000-0x000000014014E000-memory.dmpFilesize
1.3MB
-
memory/1428-79-0x0000000140000000-0x000000014014E000-memory.dmpFilesize
1.3MB
-
memory/1428-77-0x0000000140000000-0x000000014014E000-memory.dmpFilesize
1.3MB
-
memory/1428-73-0x0000000140000000-0x000000014014E000-memory.dmpFilesize
1.3MB
-
memory/1428-72-0x0000000140000000-0x000000014014E000-memory.dmpFilesize
1.3MB
-
memory/1428-70-0x0000000140000000-0x000000014014E000-memory.dmpFilesize
1.3MB
-
memory/1428-67-0x0000000140000000-0x000000014014E000-memory.dmpFilesize
1.3MB
-
memory/1428-66-0x0000000140000000-0x000000014014E000-memory.dmpFilesize
1.3MB
-
memory/1428-62-0x0000000140000000-0x000000014014E000-memory.dmpFilesize
1.3MB
-
memory/1428-63-0x0000000140000000-0x000000014014E000-memory.dmpFilesize
1.3MB
-
memory/1428-61-0x0000000140000000-0x000000014014E000-memory.dmpFilesize
1.3MB
-
memory/1428-60-0x0000000140000000-0x000000014014E000-memory.dmpFilesize
1.3MB
-
memory/1428-57-0x00000000025E0000-0x00000000025E1000-memory.dmpFilesize
4KB