Analysis
-
max time kernel
151s -
max time network
134s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
28-09-2021 09:22
Static task
static1
Behavioral task
behavioral1
Sample
8bcde178298b0263ce7cb8e4c6a5ef4d0fcea9729a21e2cef4eaec3f2ad27bc8.dll
Resource
win7-en-20210920
General
-
Target
8bcde178298b0263ce7cb8e4c6a5ef4d0fcea9729a21e2cef4eaec3f2ad27bc8.dll
-
Size
1.2MB
-
MD5
cbaf988697e5794257533479c39ed20a
-
SHA1
02d31d47c4bcb4285e847634be7483a31986b29e
-
SHA256
8bcde178298b0263ce7cb8e4c6a5ef4d0fcea9729a21e2cef4eaec3f2ad27bc8
-
SHA512
1fe2bf0286729b423da12dd20e81b80bc781d994afd3b9e3379f620e8ece49cb975b4fbaebe15108e9fb7b7e013c29080b9aa84e83ff562c6c8a190ae046678b
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1288-57-0x0000000002A90000-0x0000000002A91000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
FXSCOVER.exeUI0Detect.exerekeywiz.exepid process 1660 FXSCOVER.exe 112 UI0Detect.exe 1616 rekeywiz.exe -
Loads dropped DLL 7 IoCs
Processes:
FXSCOVER.exeUI0Detect.exerekeywiz.exepid process 1288 1660 FXSCOVER.exe 1288 112 UI0Detect.exe 1288 1616 rekeywiz.exe 1288 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wbbdywj = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\ACCESS~1\\SYSTEM~1\\80xfwKMo\\UI0DET~1.EXE" -
Processes:
rundll32.exeFXSCOVER.exeUI0Detect.exerekeywiz.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FXSCOVER.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA UI0Detect.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rekeywiz.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1500 rundll32.exe 1500 rundll32.exe 1500 rundll32.exe 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1288 -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
pid process 1288 1288 1288 1288 -
Suspicious use of SendNotifyMessage 10 IoCs
Processes:
pid process 1288 1288 1288 1288 1288 1288 1288 1288 1288 1288 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1288 wrote to memory of 1640 1288 FXSCOVER.exe PID 1288 wrote to memory of 1640 1288 FXSCOVER.exe PID 1288 wrote to memory of 1640 1288 FXSCOVER.exe PID 1288 wrote to memory of 1660 1288 FXSCOVER.exe PID 1288 wrote to memory of 1660 1288 FXSCOVER.exe PID 1288 wrote to memory of 1660 1288 FXSCOVER.exe PID 1288 wrote to memory of 1680 1288 UI0Detect.exe PID 1288 wrote to memory of 1680 1288 UI0Detect.exe PID 1288 wrote to memory of 1680 1288 UI0Detect.exe PID 1288 wrote to memory of 112 1288 UI0Detect.exe PID 1288 wrote to memory of 112 1288 UI0Detect.exe PID 1288 wrote to memory of 112 1288 UI0Detect.exe PID 1288 wrote to memory of 432 1288 rekeywiz.exe PID 1288 wrote to memory of 432 1288 rekeywiz.exe PID 1288 wrote to memory of 432 1288 rekeywiz.exe PID 1288 wrote to memory of 1616 1288 rekeywiz.exe PID 1288 wrote to memory of 1616 1288 rekeywiz.exe PID 1288 wrote to memory of 1616 1288 rekeywiz.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8bcde178298b0263ce7cb8e4c6a5ef4d0fcea9729a21e2cef4eaec3f2ad27bc8.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\FXSCOVER.exeC:\Windows\system32\FXSCOVER.exe1⤵
-
C:\Users\Admin\AppData\Local\zH8ARe7\FXSCOVER.exeC:\Users\Admin\AppData\Local\zH8ARe7\FXSCOVER.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\UI0Detect.exeC:\Windows\system32\UI0Detect.exe1⤵
-
C:\Users\Admin\AppData\Local\ION\UI0Detect.exeC:\Users\Admin\AppData\Local\ION\UI0Detect.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\rekeywiz.exeC:\Windows\system32\rekeywiz.exe1⤵
-
C:\Users\Admin\AppData\Local\hZZY\rekeywiz.exeC:\Users\Admin\AppData\Local\hZZY\rekeywiz.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\ION\UI0Detect.exeMD5
3cbdec8d06b9968aba702eba076364a1
SHA16e0fcaccadbdb5e3293aa3523ec1006d92191c58
SHA256b8dab8aa804fc23021bfebd7ae4d40fbe648d6c6ba21cc008e26d1c084972f9b
SHA512a8e434c925ef849ecef0efcb4873dbb95eea2821c967b05afbbe5733071cc2293fc94e7fdf1fdaee51cbcf9885b3b72bfd4d690f23af34558b056920263e465d
-
C:\Users\Admin\AppData\Local\ION\WTSAPI32.dllMD5
f820965a0c43908ef32bd8de959fb0f0
SHA19d98f3e43e1655e32e21211d03fd5885ff3af017
SHA256fd13219b4e3c71d6449031f1e5483bd9fa810789f18463ef1f0b0844bbe0d753
SHA51201218b890a13958fba72f6234092892afe0fd41499f4fd81440ae3eef0bb8d07d74c050bc315a07a56f4de756ef5ed2ab5144b053dde18d31d6a60b004d13950
-
C:\Users\Admin\AppData\Local\hZZY\rekeywiz.exeMD5
767c75767b00ccfd41a547bb7b2adfff
SHA191890853a5476def402910e6507417d400c0d3cb
SHA256bd70e504871a2ac1c883d19b87970c8d1b8b251c784bf777ba77ed764f5f2395
SHA512f096043452a1aa213a5e4d62638de3ee4b0b3ad3d12b7ee0372d8c79e00e2e13b4fd0ebc4206bbdb5124bed292dd5b30ef1641288046ef835f89c332985154f9
-
C:\Users\Admin\AppData\Local\hZZY\slc.dllMD5
8e27abf5c321587182ecf2041da8157e
SHA13876c82c6691da718c0921cf4f0e81ede0440ba6
SHA256fba2ca959c2fe2205fc46422cedb5659f0d78ea76c2c422be9d201bb35ea507a
SHA51298d5fe26ab2da57b27660c6ea1985a0a025436ed2fbc6eb0c527cff271b88e1517b1dfbe2ad6de8fc18736f22fbe17a0c47fb32b1eb856c9d0affb1bf5610d9f
-
C:\Users\Admin\AppData\Local\zH8ARe7\FXSCOVER.exeMD5
5e2c61be8e093dbfe7fc37585be42869
SHA1ed46cda4ece3ef187b0cf29ca843a6c6735af6c0
SHA2563d1719c1caa5d6b0358830a30713c43a9710fbf7bcedca20815be54d24aa9121
SHA51290bf180c8f6e3d0286a19fcd4727f23925a39c90113db979e1b4bbf8f0491471ad26c877a6e2cf49638b14050d952a9ee02a3c1293129843ec6bba01bc325d0b
-
C:\Users\Admin\AppData\Local\zH8ARe7\MFC42u.dllMD5
47ed7e6f9ed7691a6540fdb1aaefb7a2
SHA1a87bc29d089dbdb5d2ebd6bfaaa4c9ca04a8d6d2
SHA2568a8ef5b7d4380ab9ca83e7cd6cc684b94032b594305e9ca8abf64b11d2a96887
SHA5123cbfa441f338d8977eea8af0e9f2821afa51c95dc22018d7f753af18e55ca9f647341dbc59df5cb05dc33bea8bb67f17066fc6ac4c1775eb633c9c879cd2e9de
-
\Users\Admin\AppData\Local\ION\UI0Detect.exeMD5
3cbdec8d06b9968aba702eba076364a1
SHA16e0fcaccadbdb5e3293aa3523ec1006d92191c58
SHA256b8dab8aa804fc23021bfebd7ae4d40fbe648d6c6ba21cc008e26d1c084972f9b
SHA512a8e434c925ef849ecef0efcb4873dbb95eea2821c967b05afbbe5733071cc2293fc94e7fdf1fdaee51cbcf9885b3b72bfd4d690f23af34558b056920263e465d
-
\Users\Admin\AppData\Local\ION\WTSAPI32.dllMD5
f820965a0c43908ef32bd8de959fb0f0
SHA19d98f3e43e1655e32e21211d03fd5885ff3af017
SHA256fd13219b4e3c71d6449031f1e5483bd9fa810789f18463ef1f0b0844bbe0d753
SHA51201218b890a13958fba72f6234092892afe0fd41499f4fd81440ae3eef0bb8d07d74c050bc315a07a56f4de756ef5ed2ab5144b053dde18d31d6a60b004d13950
-
\Users\Admin\AppData\Local\hZZY\rekeywiz.exeMD5
767c75767b00ccfd41a547bb7b2adfff
SHA191890853a5476def402910e6507417d400c0d3cb
SHA256bd70e504871a2ac1c883d19b87970c8d1b8b251c784bf777ba77ed764f5f2395
SHA512f096043452a1aa213a5e4d62638de3ee4b0b3ad3d12b7ee0372d8c79e00e2e13b4fd0ebc4206bbdb5124bed292dd5b30ef1641288046ef835f89c332985154f9
-
\Users\Admin\AppData\Local\hZZY\slc.dllMD5
8e27abf5c321587182ecf2041da8157e
SHA13876c82c6691da718c0921cf4f0e81ede0440ba6
SHA256fba2ca959c2fe2205fc46422cedb5659f0d78ea76c2c422be9d201bb35ea507a
SHA51298d5fe26ab2da57b27660c6ea1985a0a025436ed2fbc6eb0c527cff271b88e1517b1dfbe2ad6de8fc18736f22fbe17a0c47fb32b1eb856c9d0affb1bf5610d9f
-
\Users\Admin\AppData\Local\zH8ARe7\FXSCOVER.exeMD5
5e2c61be8e093dbfe7fc37585be42869
SHA1ed46cda4ece3ef187b0cf29ca843a6c6735af6c0
SHA2563d1719c1caa5d6b0358830a30713c43a9710fbf7bcedca20815be54d24aa9121
SHA51290bf180c8f6e3d0286a19fcd4727f23925a39c90113db979e1b4bbf8f0491471ad26c877a6e2cf49638b14050d952a9ee02a3c1293129843ec6bba01bc325d0b
-
\Users\Admin\AppData\Local\zH8ARe7\MFC42u.dllMD5
47ed7e6f9ed7691a6540fdb1aaefb7a2
SHA1a87bc29d089dbdb5d2ebd6bfaaa4c9ca04a8d6d2
SHA2568a8ef5b7d4380ab9ca83e7cd6cc684b94032b594305e9ca8abf64b11d2a96887
SHA5123cbfa441f338d8977eea8af0e9f2821afa51c95dc22018d7f753af18e55ca9f647341dbc59df5cb05dc33bea8bb67f17066fc6ac4c1775eb633c9c879cd2e9de
-
\Users\Admin\AppData\Roaming\Adobe\Flash Player\AssetCache\Rx1LaRttpBS\rekeywiz.exeMD5
767c75767b00ccfd41a547bb7b2adfff
SHA191890853a5476def402910e6507417d400c0d3cb
SHA256bd70e504871a2ac1c883d19b87970c8d1b8b251c784bf777ba77ed764f5f2395
SHA512f096043452a1aa213a5e4d62638de3ee4b0b3ad3d12b7ee0372d8c79e00e2e13b4fd0ebc4206bbdb5124bed292dd5b30ef1641288046ef835f89c332985154f9
-
memory/112-115-0x0000000140000000-0x0000000140132000-memory.dmpFilesize
1.2MB
-
memory/112-111-0x0000000000000000-mapping.dmp
-
memory/1288-62-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-91-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-60-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-59-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-58-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-80-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-79-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-78-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-77-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-76-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-75-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-81-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-82-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-83-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-84-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-85-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-86-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-87-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-88-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-89-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-94-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-93-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-92-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-61-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-90-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-100-0x0000000077BF0000-0x0000000077BF2000-memory.dmpFilesize
8KB
-
memory/1288-57-0x0000000002A90000-0x0000000002A91000-memory.dmpFilesize
4KB
-
memory/1288-65-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-63-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-64-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-66-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-73-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-74-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-72-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-67-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-68-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-69-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-70-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1288-71-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1500-54-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1500-56-0x0000000001AC0000-0x0000000001AC7000-memory.dmpFilesize
28KB
-
memory/1616-118-0x0000000000000000-mapping.dmp
-
memory/1660-108-0x0000000140000000-0x0000000140138000-memory.dmpFilesize
1.2MB
-
memory/1660-107-0x000000013FA51000-0x000000013FA53000-memory.dmpFilesize
8KB
-
memory/1660-106-0x000007FEFC2C1000-0x000007FEFC2C3000-memory.dmpFilesize
8KB
-
memory/1660-102-0x0000000000000000-mapping.dmp