Analysis
-
max time kernel
151s -
max time network
44s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
28-09-2021 09:26
Static task
static1
Behavioral task
behavioral1
Sample
97058d4465daae2446886d425d9a8215df518e6845e8a4bedb30acea4e8d2070.dll
Resource
win7-en-20210920
General
-
Target
97058d4465daae2446886d425d9a8215df518e6845e8a4bedb30acea4e8d2070.dll
-
Size
1.2MB
-
MD5
2955d4759afce09a41c1df5b108f0287
-
SHA1
11e277c3c987b4119909dd099a5f901e074698e3
-
SHA256
97058d4465daae2446886d425d9a8215df518e6845e8a4bedb30acea4e8d2070
-
SHA512
1cb1adb483d7652ac7c41fc471612d9ee14415763c753e269645a97917050cf1e144daa679f09714a29b9d00d6234606eed407c9735c0d4bb3bfe12ca9b74a80
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1204-57-0x0000000002930000-0x0000000002931000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
wextract.exemsdtc.exeSystemPropertiesComputerName.exepid process 1796 wextract.exe 1472 msdtc.exe 1812 SystemPropertiesComputerName.exe -
Loads dropped DLL 7 IoCs
Processes:
wextract.exemsdtc.exeSystemPropertiesComputerName.exepid process 1204 1796 wextract.exe 1204 1472 msdtc.exe 1204 1812 SystemPropertiesComputerName.exe 1204 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wbbdywj = "C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Extensions\\LooMec5Ip\\msdtc.exe" -
Processes:
SystemPropertiesComputerName.exerundll32.exewextract.exemsdtc.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesComputerName.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wextract.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msdtc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1432 rundll32.exe 1432 rundll32.exe 1432 rundll32.exe 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1204 -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
pid process 1204 1204 1204 1204 -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
pid process 1204 1204 1204 1204 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1204 wrote to memory of 608 1204 wextract.exe PID 1204 wrote to memory of 608 1204 wextract.exe PID 1204 wrote to memory of 608 1204 wextract.exe PID 1204 wrote to memory of 1796 1204 wextract.exe PID 1204 wrote to memory of 1796 1204 wextract.exe PID 1204 wrote to memory of 1796 1204 wextract.exe PID 1204 wrote to memory of 1124 1204 msdtc.exe PID 1204 wrote to memory of 1124 1204 msdtc.exe PID 1204 wrote to memory of 1124 1204 msdtc.exe PID 1204 wrote to memory of 1472 1204 msdtc.exe PID 1204 wrote to memory of 1472 1204 msdtc.exe PID 1204 wrote to memory of 1472 1204 msdtc.exe PID 1204 wrote to memory of 1808 1204 SystemPropertiesComputerName.exe PID 1204 wrote to memory of 1808 1204 SystemPropertiesComputerName.exe PID 1204 wrote to memory of 1808 1204 SystemPropertiesComputerName.exe PID 1204 wrote to memory of 1812 1204 SystemPropertiesComputerName.exe PID 1204 wrote to memory of 1812 1204 SystemPropertiesComputerName.exe PID 1204 wrote to memory of 1812 1204 SystemPropertiesComputerName.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\97058d4465daae2446886d425d9a8215df518e6845e8a4bedb30acea4e8d2070.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\wextract.exeC:\Windows\system32\wextract.exe1⤵
-
C:\Users\Admin\AppData\Local\hmM\wextract.exeC:\Users\Admin\AppData\Local\hmM\wextract.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\msdtc.exeC:\Windows\system32\msdtc.exe1⤵
-
C:\Users\Admin\AppData\Local\CXfb2EeHw\msdtc.exeC:\Users\Admin\AppData\Local\CXfb2EeHw\msdtc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\SystemPropertiesComputerName.exeC:\Windows\system32\SystemPropertiesComputerName.exe1⤵
-
C:\Users\Admin\AppData\Local\A9ExTAy\SystemPropertiesComputerName.exeC:\Users\Admin\AppData\Local\A9ExTAy\SystemPropertiesComputerName.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\A9ExTAy\SYSDM.CPLMD5
636986fc3205e5038698e54d38d086c9
SHA174de62503bd924ecee2c29273e4f1d19343c47e0
SHA2565c7f33a5ccf4b0e333226925b5bdcdb656e19d63456ce2bba1ebe5c8903c88a8
SHA512047d882667a68676ab93e76ee68d5c1476c4e538205b04fa737f5bef1f0bc05203102ab41dc0402408155d586144e95200136bbe39304d2f40bb50dfd9f080eb
-
C:\Users\Admin\AppData\Local\A9ExTAy\SystemPropertiesComputerName.exeMD5
bd889683916aa93e84e1a75802918acf
SHA15ee66571359178613a4256a7470c2c3e6dd93cfa
SHA2560e22894595891a9ff9706e03b3db31a751541c4a773f82420fce57237d6c47cf
SHA5129d76de848b319f44657fb7fbe5a3b927774ae999362ff811a199002ffa77ad9e1638a65a271388e605ab5e5a7cb6ce5aa7fcabc3ed583ade00eaa4c265552026
-
C:\Users\Admin\AppData\Local\CXfb2EeHw\VERSION.dllMD5
c5db4ce74fc22b5aae27f2dccbc6a422
SHA110b6128bb46078378fe3389e179eae506e23e8ff
SHA256fea1bdd1156049f64d91815bb14cfea1f2dc801ff1d8005c1043c28c841ff083
SHA5123180f7e0ed59e932ea2843e538bfef3679965533ceaae63764c9d42b4d0b0665d5c7bee34e3301676b1acb8bc342e5f601e896f122baf289c31293f139991647
-
C:\Users\Admin\AppData\Local\CXfb2EeHw\msdtc.exeMD5
de0ece52236cfa3ed2dbfc03f28253a8
SHA184bbd2495c1809fcd19b535d41114e4fb101466c
SHA2562fbbec4cacb5161f68d7c2935852a5888945ca0f107cf8a1c01f4528ce407de3
SHA51269386134667626c60c99d941c8ab52f8e5235e3897b5af76965572287afd5dcd42b8207a520587844a57a268e4decb3f3c550e5b7a06230ee677dc5e40c50bb3
-
C:\Users\Admin\AppData\Local\hmM\VERSION.dllMD5
676e2db931d2c79597632b55b3a7e4e2
SHA181074e3503557e67d4408547824969f16ba17ae7
SHA256d3641fbd788057afc08ccbc4eff63dd85131a61de8fe4ecf87136f6dc66ca8d6
SHA512c491eed674af70b8b50c9c094b78137327b429f5768afa78fd52084061911d4b383c43024ac404f084057aab3d6cbf229f17b545c43e01b45b8648a3d82bb3ea
-
C:\Users\Admin\AppData\Local\hmM\wextract.exeMD5
1ea6500c25a80e8bdb65099c509af993
SHA16a090ef561feb4ae1c6794de5b19c5e893c4aafc
SHA25699123d4e7bf93aa7f3315a432307c8b0cbaf24ad2cfb46edc149edbe24de4ca2
SHA512b8f9f1ab48671e382d1385c34f0f19fc52fc0061e00db53bbbc2cdaee6d8a3f245707329f98e9167c53721aeaddcebfe66632729b6bcc98892031fd9914fb1fb
-
\Users\Admin\AppData\Local\A9ExTAy\SYSDM.CPLMD5
636986fc3205e5038698e54d38d086c9
SHA174de62503bd924ecee2c29273e4f1d19343c47e0
SHA2565c7f33a5ccf4b0e333226925b5bdcdb656e19d63456ce2bba1ebe5c8903c88a8
SHA512047d882667a68676ab93e76ee68d5c1476c4e538205b04fa737f5bef1f0bc05203102ab41dc0402408155d586144e95200136bbe39304d2f40bb50dfd9f080eb
-
\Users\Admin\AppData\Local\A9ExTAy\SystemPropertiesComputerName.exeMD5
bd889683916aa93e84e1a75802918acf
SHA15ee66571359178613a4256a7470c2c3e6dd93cfa
SHA2560e22894595891a9ff9706e03b3db31a751541c4a773f82420fce57237d6c47cf
SHA5129d76de848b319f44657fb7fbe5a3b927774ae999362ff811a199002ffa77ad9e1638a65a271388e605ab5e5a7cb6ce5aa7fcabc3ed583ade00eaa4c265552026
-
\Users\Admin\AppData\Local\CXfb2EeHw\VERSION.dllMD5
c5db4ce74fc22b5aae27f2dccbc6a422
SHA110b6128bb46078378fe3389e179eae506e23e8ff
SHA256fea1bdd1156049f64d91815bb14cfea1f2dc801ff1d8005c1043c28c841ff083
SHA5123180f7e0ed59e932ea2843e538bfef3679965533ceaae63764c9d42b4d0b0665d5c7bee34e3301676b1acb8bc342e5f601e896f122baf289c31293f139991647
-
\Users\Admin\AppData\Local\CXfb2EeHw\msdtc.exeMD5
de0ece52236cfa3ed2dbfc03f28253a8
SHA184bbd2495c1809fcd19b535d41114e4fb101466c
SHA2562fbbec4cacb5161f68d7c2935852a5888945ca0f107cf8a1c01f4528ce407de3
SHA51269386134667626c60c99d941c8ab52f8e5235e3897b5af76965572287afd5dcd42b8207a520587844a57a268e4decb3f3c550e5b7a06230ee677dc5e40c50bb3
-
\Users\Admin\AppData\Local\hmM\VERSION.dllMD5
676e2db931d2c79597632b55b3a7e4e2
SHA181074e3503557e67d4408547824969f16ba17ae7
SHA256d3641fbd788057afc08ccbc4eff63dd85131a61de8fe4ecf87136f6dc66ca8d6
SHA512c491eed674af70b8b50c9c094b78137327b429f5768afa78fd52084061911d4b383c43024ac404f084057aab3d6cbf229f17b545c43e01b45b8648a3d82bb3ea
-
\Users\Admin\AppData\Local\hmM\wextract.exeMD5
1ea6500c25a80e8bdb65099c509af993
SHA16a090ef561feb4ae1c6794de5b19c5e893c4aafc
SHA25699123d4e7bf93aa7f3315a432307c8b0cbaf24ad2cfb46edc149edbe24de4ca2
SHA512b8f9f1ab48671e382d1385c34f0f19fc52fc0061e00db53bbbc2cdaee6d8a3f245707329f98e9167c53721aeaddcebfe66632729b6bcc98892031fd9914fb1fb
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\iSQaq1cAl\SystemPropertiesComputerName.exeMD5
bd889683916aa93e84e1a75802918acf
SHA15ee66571359178613a4256a7470c2c3e6dd93cfa
SHA2560e22894595891a9ff9706e03b3db31a751541c4a773f82420fce57237d6c47cf
SHA5129d76de848b319f44657fb7fbe5a3b927774ae999362ff811a199002ffa77ad9e1638a65a271388e605ab5e5a7cb6ce5aa7fcabc3ed583ade00eaa4c265552026
-
memory/1204-68-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-91-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-70-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-71-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-72-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-73-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-82-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-86-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-87-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-85-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-84-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-83-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-81-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-80-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-79-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-78-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-77-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-76-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-75-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-88-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-74-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-57-0x0000000002930000-0x0000000002931000-memory.dmpFilesize
4KB
-
memory/1204-90-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-89-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-97-0x0000000077900000-0x0000000077902000-memory.dmpFilesize
8KB
-
memory/1204-69-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-58-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-67-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-59-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-64-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-66-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-60-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-65-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-63-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-61-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1204-62-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1432-54-0x0000000140000000-0x000000014012B000-memory.dmpFilesize
1.2MB
-
memory/1432-56-0x00000000002A0000-0x00000000002A7000-memory.dmpFilesize
28KB
-
memory/1472-107-0x0000000000000000-mapping.dmp
-
memory/1796-104-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/1796-101-0x000007FEFBFD1000-0x000007FEFBFD3000-memory.dmpFilesize
8KB
-
memory/1796-99-0x0000000000000000-mapping.dmp
-
memory/1812-114-0x0000000000000000-mapping.dmp