Analysis
-
max time kernel
152s -
max time network
119s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
28-09-2021 09:27
Static task
static1
Behavioral task
behavioral1
Sample
ff3aa75e4d4637599d3e97fb8b42ce8a1254425f856671ae56377df2676b1033.dll
Resource
win7-en-20210920
General
-
Target
ff3aa75e4d4637599d3e97fb8b42ce8a1254425f856671ae56377df2676b1033.dll
-
Size
1.1MB
-
MD5
c50f692a715db805e68e9655ff6a9ab2
-
SHA1
229b257301ed99d518364afd22c4276daa5b3d20
-
SHA256
ff3aa75e4d4637599d3e97fb8b42ce8a1254425f856671ae56377df2676b1033
-
SHA512
ad74f556ccef1f8fd4a3c18a18c27adcafd2f552025bf7f83864261c6944db5423c719ea161c341e593800499c6e01aba846031e79caf1e771b2b16e7d6e33d1
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/1676-115-0x0000000140000000-0x000000014010F000-memory.dmp dridex_payload behavioral2/memory/3696-164-0x000002B1168A0000-0x000002B1169B0000-memory.dmp dridex_payload behavioral2/memory/3696-166-0x000002B1168A1000-0x000002B11691D000-memory.dmp dridex_payload behavioral2/memory/660-190-0x0000000140000000-0x0000000140155000-memory.dmp dridex_payload behavioral2/memory/2956-201-0x000001E31E470000-0x000001E31E580000-memory.dmp dridex_payload behavioral2/memory/2956-203-0x000001E31E471000-0x000001E31E4ED000-memory.dmp dridex_payload -
Processes:
resource yara_rule behavioral2/memory/3028-121-0x0000000001030000-0x0000000001031000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
ie4uinit.exeSysResetErr.exeie4uinit.exepid process 3696 ie4uinit.exe 660 SysResetErr.exe 2956 ie4uinit.exe -
Loads dropped DLL 7 IoCs
Processes:
ie4uinit.exeSysResetErr.exeie4uinit.exepid process 3696 ie4uinit.exe 3696 ie4uinit.exe 3696 ie4uinit.exe 660 SysResetErr.exe 2956 ie4uinit.exe 2956 ie4uinit.exe 2956 ie4uinit.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wjvmqhmsyzhtvy = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\DC\\Collab\\Mr6Y64nuuO\\SysResetErr.exe" -
Processes:
SysResetErr.exeie4uinit.exerundll32.exeie4uinit.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SysResetErr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ie4uinit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ie4uinit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1676 rundll32.exe 1676 rundll32.exe 1676 rundll32.exe 1676 rundll32.exe 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3028 -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
pid process 3028 3028 -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
pid process 3028 3028 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3028 wrote to memory of 3488 3028 ie4uinit.exe PID 3028 wrote to memory of 3488 3028 ie4uinit.exe PID 3028 wrote to memory of 3696 3028 ie4uinit.exe PID 3028 wrote to memory of 3696 3028 ie4uinit.exe PID 3028 wrote to memory of 1184 3028 SysResetErr.exe PID 3028 wrote to memory of 1184 3028 SysResetErr.exe PID 3028 wrote to memory of 660 3028 SysResetErr.exe PID 3028 wrote to memory of 660 3028 SysResetErr.exe PID 3028 wrote to memory of 2400 3028 ie4uinit.exe PID 3028 wrote to memory of 2400 3028 ie4uinit.exe PID 3028 wrote to memory of 2956 3028 ie4uinit.exe PID 3028 wrote to memory of 2956 3028 ie4uinit.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ff3aa75e4d4637599d3e97fb8b42ce8a1254425f856671ae56377df2676b1033.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\ie4uinit.exeC:\Windows\system32\ie4uinit.exe1⤵
-
C:\Users\Admin\AppData\Local\oNeLOlCH\ie4uinit.exeC:\Users\Admin\AppData\Local\oNeLOlCH\ie4uinit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\SysResetErr.exeC:\Windows\system32\SysResetErr.exe1⤵
-
C:\Users\Admin\AppData\Local\8iCsWklu\SysResetErr.exeC:\Users\Admin\AppData\Local\8iCsWklu\SysResetErr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\ie4uinit.exeC:\Windows\system32\ie4uinit.exe1⤵
-
C:\Users\Admin\AppData\Local\BG3egyWz\ie4uinit.exeC:\Users\Admin\AppData\Local\BG3egyWz\ie4uinit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\8iCsWklu\DUI70.dllMD5
d199908383cde32ace64555345de957d
SHA1c56bd0815fa97e90d1d9e6e8cdc4f4bae506f99d
SHA2566ac7baa8c6bd34ecb9cbec85e490ad543a39847ed1068720e8abdb7367936f8d
SHA512f41e4a2c41a5e912d9dc9ba5f166063b672f15a8884e31dcf4e6a919e0e77f346addef9488755df54a223d9ed1d5cc0db123070916bd30f2f543b9b6663dde8c
-
C:\Users\Admin\AppData\Local\8iCsWklu\SysResetErr.exeMD5
432557a19cef7e1c23a4dcc7d148b712
SHA1b26c19de3b32108f8ac9307c30027e635615fc65
SHA256f519aba77298a8c04f3e9c8f5f1b40c8de05e41898f13033f337e13e05d4282a
SHA512542e71740094ea810651901ec23f06c495e0c2d57fae09d6dd9730e11650843ade34eeba0b2816df025179c597825129b3a26a0007c75e10f1a8857340452ff7
-
C:\Users\Admin\AppData\Local\BG3egyWz\VERSION.dllMD5
2fe18414b303492c4d86f171879ad976
SHA1c70061eb3de2a2f7092cb1961660d1054172885d
SHA2568870fc579b4c74bc4ba938184552d2e622454790c3fa2e5b620baf551cebb46b
SHA5123453a68d49b52f09028d99610f3d389846aa1da9193437004dc06086a9b0742597feaaf042db99dfacfc15fc49cde46d7289ac360d0119efeb67e6467b9090e1
-
C:\Users\Admin\AppData\Local\BG3egyWz\ie4uinit.exeMD5
e259e65dbf6958b4bbd816c6d890d3f8
SHA1ad0b061cdf69ab50977d64600fd33ad1e55773b1
SHA25626e2ba63d70090b4acaaab1746f07a42ca8d0b5d1ef3711847edf4d0784c2106
SHA5128a708480f8e595ac8d2c2a9b9d460ca3c933ffebb1f1d266b8fe77ee1a4b164ad58a4335c15d3843684488c34cc1bcfc79cfa66e750e41a203a5137b7c912a3b
-
C:\Users\Admin\AppData\Local\oNeLOlCH\VERSION.dllMD5
d0008781c726ea3164c69cc21877c7f5
SHA1cc1bd6d810e6f11f760c0765294914c9d0d93ba1
SHA2566e52079ecdb8cc9563479f54296f577819c17682478f80e0bbfb25f5182a5f81
SHA51224a0daf10aa96ce82ae6429a6f1cdc9db01377d3bacc966b101ba12b1ed57196fa02a9fd4390858c7516a664524677e3e29a6e21fedd8253c983f2362ace8af4
-
C:\Users\Admin\AppData\Local\oNeLOlCH\ie4uinit.exeMD5
e259e65dbf6958b4bbd816c6d890d3f8
SHA1ad0b061cdf69ab50977d64600fd33ad1e55773b1
SHA25626e2ba63d70090b4acaaab1746f07a42ca8d0b5d1ef3711847edf4d0784c2106
SHA5128a708480f8e595ac8d2c2a9b9d460ca3c933ffebb1f1d266b8fe77ee1a4b164ad58a4335c15d3843684488c34cc1bcfc79cfa66e750e41a203a5137b7c912a3b
-
\Users\Admin\AppData\Local\8iCsWklu\DUI70.dllMD5
d199908383cde32ace64555345de957d
SHA1c56bd0815fa97e90d1d9e6e8cdc4f4bae506f99d
SHA2566ac7baa8c6bd34ecb9cbec85e490ad543a39847ed1068720e8abdb7367936f8d
SHA512f41e4a2c41a5e912d9dc9ba5f166063b672f15a8884e31dcf4e6a919e0e77f346addef9488755df54a223d9ed1d5cc0db123070916bd30f2f543b9b6663dde8c
-
\Users\Admin\AppData\Local\BG3egyWz\VERSION.dllMD5
2fe18414b303492c4d86f171879ad976
SHA1c70061eb3de2a2f7092cb1961660d1054172885d
SHA2568870fc579b4c74bc4ba938184552d2e622454790c3fa2e5b620baf551cebb46b
SHA5123453a68d49b52f09028d99610f3d389846aa1da9193437004dc06086a9b0742597feaaf042db99dfacfc15fc49cde46d7289ac360d0119efeb67e6467b9090e1
-
\Users\Admin\AppData\Local\BG3egyWz\VERSION.dllMD5
2fe18414b303492c4d86f171879ad976
SHA1c70061eb3de2a2f7092cb1961660d1054172885d
SHA2568870fc579b4c74bc4ba938184552d2e622454790c3fa2e5b620baf551cebb46b
SHA5123453a68d49b52f09028d99610f3d389846aa1da9193437004dc06086a9b0742597feaaf042db99dfacfc15fc49cde46d7289ac360d0119efeb67e6467b9090e1
-
\Users\Admin\AppData\Local\BG3egyWz\VERSION.dllMD5
2fe18414b303492c4d86f171879ad976
SHA1c70061eb3de2a2f7092cb1961660d1054172885d
SHA2568870fc579b4c74bc4ba938184552d2e622454790c3fa2e5b620baf551cebb46b
SHA5123453a68d49b52f09028d99610f3d389846aa1da9193437004dc06086a9b0742597feaaf042db99dfacfc15fc49cde46d7289ac360d0119efeb67e6467b9090e1
-
\Users\Admin\AppData\Local\oNeLOlCH\VERSION.dllMD5
d0008781c726ea3164c69cc21877c7f5
SHA1cc1bd6d810e6f11f760c0765294914c9d0d93ba1
SHA2566e52079ecdb8cc9563479f54296f577819c17682478f80e0bbfb25f5182a5f81
SHA51224a0daf10aa96ce82ae6429a6f1cdc9db01377d3bacc966b101ba12b1ed57196fa02a9fd4390858c7516a664524677e3e29a6e21fedd8253c983f2362ace8af4
-
\Users\Admin\AppData\Local\oNeLOlCH\VERSION.dllMD5
d0008781c726ea3164c69cc21877c7f5
SHA1cc1bd6d810e6f11f760c0765294914c9d0d93ba1
SHA2566e52079ecdb8cc9563479f54296f577819c17682478f80e0bbfb25f5182a5f81
SHA51224a0daf10aa96ce82ae6429a6f1cdc9db01377d3bacc966b101ba12b1ed57196fa02a9fd4390858c7516a664524677e3e29a6e21fedd8253c983f2362ace8af4
-
\Users\Admin\AppData\Local\oNeLOlCH\VERSION.dllMD5
d0008781c726ea3164c69cc21877c7f5
SHA1cc1bd6d810e6f11f760c0765294914c9d0d93ba1
SHA2566e52079ecdb8cc9563479f54296f577819c17682478f80e0bbfb25f5182a5f81
SHA51224a0daf10aa96ce82ae6429a6f1cdc9db01377d3bacc966b101ba12b1ed57196fa02a9fd4390858c7516a664524677e3e29a6e21fedd8253c983f2362ace8af4
-
memory/660-186-0x0000000000000000-mapping.dmp
-
memory/660-190-0x0000000140000000-0x0000000140155000-memory.dmpFilesize
1.3MB
-
memory/1676-115-0x0000000140000000-0x000000014010F000-memory.dmpFilesize
1.1MB
-
memory/1676-120-0x00000215B0CD0000-0x00000215B0CD7000-memory.dmpFilesize
28KB
-
memory/2956-195-0x0000000000000000-mapping.dmp
-
memory/2956-201-0x000001E31E470000-0x000001E31E580000-memory.dmpFilesize
1.1MB
-
memory/2956-203-0x000001E31E471000-0x000001E31E4ED000-memory.dmpFilesize
496KB
-
memory/3028-132-0x0000000140000000-0x000000014010F000-memory.dmpFilesize
1.1MB
-
memory/3028-136-0x0000000140000000-0x000000014010F000-memory.dmpFilesize
1.1MB
-
memory/3028-141-0x0000000140000000-0x000000014010F000-memory.dmpFilesize
1.1MB
-
memory/3028-143-0x0000000140000000-0x000000014010F000-memory.dmpFilesize
1.1MB
-
memory/3028-142-0x0000000140000000-0x000000014010F000-memory.dmpFilesize
1.1MB
-
memory/3028-144-0x0000000140000000-0x000000014010F000-memory.dmpFilesize
1.1MB
-
memory/3028-145-0x0000000140000000-0x000000014010F000-memory.dmpFilesize
1.1MB
-
memory/3028-146-0x0000000140000000-0x000000014010F000-memory.dmpFilesize
1.1MB
-
memory/3028-147-0x0000000140000000-0x000000014010F000-memory.dmpFilesize
1.1MB
-
memory/3028-156-0x00007FFF21484320-0x00007FFF21485320-memory.dmpFilesize
4KB
-
memory/3028-157-0x00007FFF21454320-0x00007FFF21455320-memory.dmpFilesize
4KB
-
memory/3028-121-0x0000000001030000-0x0000000001031000-memory.dmpFilesize
4KB
-
memory/3028-140-0x0000000140000000-0x000000014010F000-memory.dmpFilesize
1.1MB
-
memory/3028-138-0x0000000140000000-0x000000014010F000-memory.dmpFilesize
1.1MB
-
memory/3028-137-0x0000000140000000-0x000000014010F000-memory.dmpFilesize
1.1MB
-
memory/3028-139-0x0000000140000000-0x000000014010F000-memory.dmpFilesize
1.1MB
-
memory/3028-135-0x0000000140000000-0x000000014010F000-memory.dmpFilesize
1.1MB
-
memory/3028-123-0x0000000140000000-0x000000014010F000-memory.dmpFilesize
1.1MB
-
memory/3028-122-0x0000000140000000-0x000000014010F000-memory.dmpFilesize
1.1MB
-
memory/3028-134-0x0000000140000000-0x000000014010F000-memory.dmpFilesize
1.1MB
-
memory/3028-133-0x0000000140000000-0x000000014010F000-memory.dmpFilesize
1.1MB
-
memory/3028-131-0x0000000140000000-0x000000014010F000-memory.dmpFilesize
1.1MB
-
memory/3028-130-0x0000000140000000-0x000000014010F000-memory.dmpFilesize
1.1MB
-
memory/3028-129-0x0000000140000000-0x000000014010F000-memory.dmpFilesize
1.1MB
-
memory/3028-128-0x0000000140000000-0x000000014010F000-memory.dmpFilesize
1.1MB
-
memory/3028-127-0x0000000140000000-0x000000014010F000-memory.dmpFilesize
1.1MB
-
memory/3028-126-0x0000000140000000-0x000000014010F000-memory.dmpFilesize
1.1MB
-
memory/3028-125-0x0000000140000000-0x000000014010F000-memory.dmpFilesize
1.1MB
-
memory/3028-124-0x0000000140000000-0x000000014010F000-memory.dmpFilesize
1.1MB
-
memory/3696-166-0x000002B1168A1000-0x000002B11691D000-memory.dmpFilesize
496KB
-
memory/3696-164-0x000002B1168A0000-0x000002B1169B0000-memory.dmpFilesize
1.1MB
-
memory/3696-158-0x0000000000000000-mapping.dmp