Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
28-09-2021 09:23
Static task
static1
Behavioral task
behavioral1
Sample
dc684f824a7deaf6028f6266b48cc3f982a4931ce2db003f692a448da8e255e3.dll
Resource
win7v20210408
General
-
Target
dc684f824a7deaf6028f6266b48cc3f982a4931ce2db003f692a448da8e255e3.dll
-
Size
1.2MB
-
MD5
ecdfff8b0ece2175cd699e690de1fcaf
-
SHA1
9359770d71e743832ca22597db917dfa817038b2
-
SHA256
dc684f824a7deaf6028f6266b48cc3f982a4931ce2db003f692a448da8e255e3
-
SHA512
106ecdecdc64b395ae74fd231dc858f0c18a75baba52729ec928451884462d7f5e828f20dd0de3fc750c817d96461708030679873d7a675327b35f51bb8fcc3d
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3068-120-0x0000000000CD0000-0x0000000000CD1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
raserver.exewextract.exeSnippingTool.exepid process 2636 raserver.exe 916 wextract.exe 1012 SnippingTool.exe -
Loads dropped DLL 3 IoCs
Processes:
raserver.exewextract.exeSnippingTool.exepid process 2636 raserver.exe 916 wextract.exe 1012 SnippingTool.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wjvmqhmsyzhtvy = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\UProof\\4bUeVLGu\\wextract.exe" -
Processes:
rundll32.exeraserver.exewextract.exeSnippingTool.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA raserver.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wextract.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SnippingTool.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2168 rundll32.exe 2168 rundll32.exe 2168 rundll32.exe 2168 rundll32.exe 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 3068 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3068 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3068 wrote to memory of 2288 3068 raserver.exe PID 3068 wrote to memory of 2288 3068 raserver.exe PID 3068 wrote to memory of 2636 3068 raserver.exe PID 3068 wrote to memory of 2636 3068 raserver.exe PID 3068 wrote to memory of 400 3068 wextract.exe PID 3068 wrote to memory of 400 3068 wextract.exe PID 3068 wrote to memory of 916 3068 wextract.exe PID 3068 wrote to memory of 916 3068 wextract.exe PID 3068 wrote to memory of 2736 3068 SnippingTool.exe PID 3068 wrote to memory of 2736 3068 SnippingTool.exe PID 3068 wrote to memory of 1012 3068 SnippingTool.exe PID 3068 wrote to memory of 1012 3068 SnippingTool.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\dc684f824a7deaf6028f6266b48cc3f982a4931ce2db003f692a448da8e255e3.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\raserver.exeC:\Windows\system32\raserver.exe1⤵
-
C:\Users\Admin\AppData\Local\pLTpszW\raserver.exeC:\Users\Admin\AppData\Local\pLTpszW\raserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\wextract.exeC:\Windows\system32\wextract.exe1⤵
-
C:\Users\Admin\AppData\Local\dfhM8\wextract.exeC:\Users\Admin\AppData\Local\dfhM8\wextract.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\SnippingTool.exeC:\Windows\system32\SnippingTool.exe1⤵
-
C:\Users\Admin\AppData\Local\o3R\SnippingTool.exeC:\Users\Admin\AppData\Local\o3R\SnippingTool.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\dfhM8\VERSION.dllMD5
e2440718e9135927846a9e805c6ab135
SHA121c2a9bd00984a9e05e2f269c86e93be6d84d948
SHA256309a2b33a6f5933fa635ada99b8fee86ff5f2d688f0f5018eab3767ad1514f73
SHA51249fd3119566c1c4316d1c2aa065121d82fc1160d634d0ac7d5e6ab3db969b74d2c381ffc8607469aa85e6d1a71713c0a760c1f6bb80de4abf464eb4238a15946
-
C:\Users\Admin\AppData\Local\dfhM8\wextract.exeMD5
e78764b49f5806ce029cd547004493c9
SHA18c1f3f989913bebf827a707c04754047507a8cf3
SHA256ab519b1c2711219a9f262b23bf72343eec3c0df4c7ddd135d30d05e700ec302e
SHA51271040e5f0d2d409efaba70a7daaebe7a4675cb19009436a826a679671cc0d7c960498364ec7a29fb163ce8dada65218b75bebb973e6c8b194734e01970fd3a6b
-
C:\Users\Admin\AppData\Local\o3R\SnippingTool.exeMD5
e40c6c256043c143f7b8cdca70f69f4f
SHA1129f4f0257715715d50fd7b7129ce231771ae1ea
SHA25676610fec5aabe77401425bc8a437f58e9307b636197ffd048ece9e02e955f88d
SHA512fb83e4feb112cbee5fb922178795df1f02f29cbe009d8b3b4d9b4f1a62c08d184a64df52e57ee3d4d8be839621f875a5279d15f39b94ff3a987a863fa4d743ba
-
C:\Users\Admin\AppData\Local\o3R\UxTheme.dllMD5
675fac1537b8f210bcbb07903c346b63
SHA185cd081a6c195e9c2de3633109f56a737fb55de4
SHA2567c9d68c61de4ff7290b1b0460e76d85a74dbdb6e87ce3e854b518188935c93b9
SHA512cf67b8e31fd1dc67feb5dd50d0ba39a00e63ee82dad14006f24877635aa485a41289f199e8821884c0d0a2f63f2bea6246cb77e94afffc53f24e286b6b19a6ff
-
C:\Users\Admin\AppData\Local\pLTpszW\WTSAPI32.dllMD5
598ad33eab43aaa10cf18a8f64c8aa49
SHA1ec135064f90f5705c2a77c9b8643e708b3ebf3fd
SHA256e56d725325b8257da757851cee3fb30cb60d4fd7fede45caf3c76263bccad76b
SHA5129cb9cfc91c3a427f94a1ea535b91d0007bc4fa2f7c604cf524340221e944005e27d9e54e48fc07893543487010d4e5c8ad77d32d601a2ce4a4e66aaf56fdce4f
-
C:\Users\Admin\AppData\Local\pLTpszW\raserver.exeMD5
71cacb0f5b7b70055fbba02055e503b1
SHA149e247edcc721fc7329045a8587877b645b7531f
SHA2567a4aa698ea00d4347a1b85a2510c2502fdf23cc5d487079097999be9780f8eb1
SHA5123cce7df2ab1ece95baf888982a0664fb53c1378029dc2aee1c583fc6e9065968074a9f8135988f1b9f50937e3eb69edc118976b61067c3461fe8351535295a18
-
\Users\Admin\AppData\Local\dfhM8\VERSION.dllMD5
e2440718e9135927846a9e805c6ab135
SHA121c2a9bd00984a9e05e2f269c86e93be6d84d948
SHA256309a2b33a6f5933fa635ada99b8fee86ff5f2d688f0f5018eab3767ad1514f73
SHA51249fd3119566c1c4316d1c2aa065121d82fc1160d634d0ac7d5e6ab3db969b74d2c381ffc8607469aa85e6d1a71713c0a760c1f6bb80de4abf464eb4238a15946
-
\Users\Admin\AppData\Local\o3R\UxTheme.dllMD5
675fac1537b8f210bcbb07903c346b63
SHA185cd081a6c195e9c2de3633109f56a737fb55de4
SHA2567c9d68c61de4ff7290b1b0460e76d85a74dbdb6e87ce3e854b518188935c93b9
SHA512cf67b8e31fd1dc67feb5dd50d0ba39a00e63ee82dad14006f24877635aa485a41289f199e8821884c0d0a2f63f2bea6246cb77e94afffc53f24e286b6b19a6ff
-
\Users\Admin\AppData\Local\pLTpszW\WTSAPI32.dllMD5
598ad33eab43aaa10cf18a8f64c8aa49
SHA1ec135064f90f5705c2a77c9b8643e708b3ebf3fd
SHA256e56d725325b8257da757851cee3fb30cb60d4fd7fede45caf3c76263bccad76b
SHA5129cb9cfc91c3a427f94a1ea535b91d0007bc4fa2f7c604cf524340221e944005e27d9e54e48fc07893543487010d4e5c8ad77d32d601a2ce4a4e66aaf56fdce4f
-
memory/916-175-0x0000000000000000-mapping.dmp
-
memory/1012-184-0x0000000000000000-mapping.dmp
-
memory/2168-115-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/2168-119-0x000002549DD00000-0x000002549DD07000-memory.dmpFilesize
28KB
-
memory/2636-170-0x0000000140000000-0x0000000140132000-memory.dmpFilesize
1.2MB
-
memory/2636-166-0x0000000000000000-mapping.dmp
-
memory/3068-144-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-153-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-135-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-136-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-137-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-138-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-139-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-140-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-141-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-142-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-143-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-133-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-145-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-146-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-147-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-148-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-149-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-150-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-152-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-134-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-154-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-151-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-155-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-163-0x00007FFBCC984560-0x00007FFBCC985560-memory.dmpFilesize
4KB
-
memory/3068-165-0x00007FFBCC8B0000-0x00007FFBCC8C0000-memory.dmpFilesize
64KB
-
memory/3068-132-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-131-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-130-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-129-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-128-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-127-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-126-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-125-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-124-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-123-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-122-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-121-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/3068-120-0x0000000000CD0000-0x0000000000CD1000-memory.dmpFilesize
4KB