Analysis
-
max time kernel
150s -
max time network
74s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
29-09-2021 07:47
Static task
static1
Behavioral task
behavioral1
Sample
807f12238d1ff9667c31f44178796a63ce759c4ca78cd472f9975d0c753aebaf.dll
Resource
win7-en-20210920
General
-
Target
807f12238d1ff9667c31f44178796a63ce759c4ca78cd472f9975d0c753aebaf.dll
-
Size
836KB
-
MD5
f3a936183d790d82ae77402dbad857a2
-
SHA1
c569987ea8787f4edd108218052fcc7b9d79d38d
-
SHA256
807f12238d1ff9667c31f44178796a63ce759c4ca78cd472f9975d0c753aebaf
-
SHA512
7ba1542786cded740fbd1bf6f1ebe9a06083f7a36aa1468b7de61ccb712e3c186fa6d367efbba1ac24e0c33d551871c73a7d66ca36ffd30a666ce6e6a2b46197
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/664-114-0x0000000140000000-0x00000001400D1000-memory.dmp dridex_payload behavioral2/memory/3528-163-0x0000000140000000-0x00000001400D8000-memory.dmp dridex_payload behavioral2/memory/3992-172-0x0000000140000000-0x00000001400D2000-memory.dmp dridex_payload behavioral2/memory/508-182-0x000001EB64BA0000-0x000001EB64C72000-memory.dmp dridex_payload behavioral2/memory/508-184-0x000001EB64BA1000-0x000001EB64C1D000-memory.dmp dridex_payload -
Processes:
resource yara_rule behavioral2/memory/3024-120-0x0000000002640000-0x0000000002641000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
FXSCOVER.exerstrui.exePresentationHost.exepid process 3528 FXSCOVER.exe 3992 rstrui.exe 508 PresentationHost.exe -
Loads dropped DLL 4 IoCs
Processes:
FXSCOVER.exerstrui.exePresentationHost.exepid process 3528 FXSCOVER.exe 3992 rstrui.exe 508 PresentationHost.exe 508 PresentationHost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rvhohwdqaanc = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Proof\\umf\\rstrui.exe" -
Processes:
rundll32.exeFXSCOVER.exerstrui.exePresentationHost.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FXSCOVER.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rstrui.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PresentationHost.exe -
Modifies registry class 2 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 664 rundll32.exe 664 rundll32.exe 664 rundll32.exe 664 rundll32.exe 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 3024 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3024 -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3024 Token: SeCreatePagefilePrivilege 3024 Token: SeShutdownPrivilege 3024 Token: SeCreatePagefilePrivilege 3024 Token: SeShutdownPrivilege 3024 Token: SeCreatePagefilePrivilege 3024 Token: SeShutdownPrivilege 3024 Token: SeCreatePagefilePrivilege 3024 Token: SeShutdownPrivilege 3024 Token: SeCreatePagefilePrivilege 3024 -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
pid process 3024 3024 3024 3024 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3024 wrote to memory of 2796 3024 FXSCOVER.exe PID 3024 wrote to memory of 2796 3024 FXSCOVER.exe PID 3024 wrote to memory of 3528 3024 FXSCOVER.exe PID 3024 wrote to memory of 3528 3024 FXSCOVER.exe PID 3024 wrote to memory of 492 3024 rstrui.exe PID 3024 wrote to memory of 492 3024 rstrui.exe PID 3024 wrote to memory of 3992 3024 rstrui.exe PID 3024 wrote to memory of 3992 3024 rstrui.exe PID 3024 wrote to memory of 3736 3024 PresentationHost.exe PID 3024 wrote to memory of 3736 3024 PresentationHost.exe PID 3024 wrote to memory of 508 3024 PresentationHost.exe PID 3024 wrote to memory of 508 3024 PresentationHost.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\807f12238d1ff9667c31f44178796a63ce759c4ca78cd472f9975d0c753aebaf.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\FXSCOVER.exeC:\Windows\system32\FXSCOVER.exe1⤵
-
C:\Users\Admin\AppData\Local\72H4eD\FXSCOVER.exeC:\Users\Admin\AppData\Local\72H4eD\FXSCOVER.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\rstrui.exeC:\Windows\system32\rstrui.exe1⤵
-
C:\Users\Admin\AppData\Local\dLx\rstrui.exeC:\Users\Admin\AppData\Local\dLx\rstrui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\PresentationHost.exeC:\Windows\system32\PresentationHost.exe1⤵
-
C:\Users\Admin\AppData\Local\VeoC\PresentationHost.exeC:\Users\Admin\AppData\Local\VeoC\PresentationHost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\72H4eD\FXSCOVER.exeMD5
fd8a15f70619a553acd265264c3e435d
SHA1394f6a1db57b502eb5196d9276d1c00afc791663
SHA256b9eec80e92a71b7405db190ac0d1fc177ba3d1f97411c43328a340d30a9d71a4
SHA512af30027401e97a69aa57847c00c73ccafd4113e58349efd9addf5e7c3a5809f5ff35430d181844c5acd0abba947ff9acb450ff3e0383ef7c187bd9b7808a8799
-
C:\Users\Admin\AppData\Local\72H4eD\MFC42u.dllMD5
27e392deb5d24e0bf73dc08fb8575eee
SHA133475d7a0f2d12533282b809faa6ada25dae6b27
SHA256ff12399e881c2eb3f641953f0d32e0ab5a18b3cb4dfa99923282c5b3020e50a0
SHA512461f75d9e9fc2d8d5efce6726b99c3f77933e391868b55e8bfa84afad084d342ea363fc1555615bb9e70d80afb61f86764c92bf5907313df0798917d147ef5bb
-
C:\Users\Admin\AppData\Local\VeoC\PresentationHost.exeMD5
7009b2746734a3538e7735cf24f3c93b
SHA1f994c53697e0d9b6ab2b5d5dd5f31fafa30109b1
SHA256d0011ec1f0e14a3c6a515df997268a851c98722472f21c03b0fdc6477f14fdb7
SHA5127934cc17f7bbb6ec8b0f3fb4c775b21885693eaf3e332de97b14f294dac7a189801eeb6165dfc04e2a9aa019c444a9af65d498926fe9dc0c4fc1b71ba272f89b
-
C:\Users\Admin\AppData\Local\VeoC\VERSION.dllMD5
daac585172eebb055e27444e134e95ff
SHA1bf02a73ff8a076b597282975ff70b87e6f06466d
SHA256461169eec758283bddd8a634d313503e73072e50f2ae8832cb803f164ebb2794
SHA5129997d927b23961e9d97415b570d58be8e22853623d9b6ea71d69100eefdd08cc027e2a11eee9729de5b686040f5250e60721404835f3c81cfd89e766d6cb2d8b
-
C:\Users\Admin\AppData\Local\dLx\SPP.dllMD5
8dd8b8e5cd86c0b24c3bf5f51b2c529b
SHA1367cbbf56382820ad7685d67c309c0bef488f677
SHA25613aff12326b59983656dd8043f88b606d90d28e80ac20c232943883f0b33a09d
SHA512226d51d53a086bb1d7b1fc53acba55b1d460b9ceafcaa776cbb4c98355d14bedeff5273189ecb1b414ff1bd370afa9f97cee7495f548c7b14181d18bfdce4398
-
C:\Users\Admin\AppData\Local\dLx\rstrui.exeMD5
c0167cf19678a97a78a675ef18b7fc85
SHA1f7589dcdff216ca879dba1d68764b2cf69652d3b
SHA256b1aacd2735f524f8460c031a4f66e78fb09cffbc7350fac5695d448a287fb7cb
SHA512f71ca6d233784312dce0e5867d2710de40c738bb567aac212ccd78804176ac51b9ae82bc2ba0498cdd24893f3d3fa6cfddd0d7a9d2c1bd9148916961d6ee0c44
-
\Users\Admin\AppData\Local\72H4eD\MFC42u.dllMD5
27e392deb5d24e0bf73dc08fb8575eee
SHA133475d7a0f2d12533282b809faa6ada25dae6b27
SHA256ff12399e881c2eb3f641953f0d32e0ab5a18b3cb4dfa99923282c5b3020e50a0
SHA512461f75d9e9fc2d8d5efce6726b99c3f77933e391868b55e8bfa84afad084d342ea363fc1555615bb9e70d80afb61f86764c92bf5907313df0798917d147ef5bb
-
\Users\Admin\AppData\Local\VeoC\VERSION.dllMD5
daac585172eebb055e27444e134e95ff
SHA1bf02a73ff8a076b597282975ff70b87e6f06466d
SHA256461169eec758283bddd8a634d313503e73072e50f2ae8832cb803f164ebb2794
SHA5129997d927b23961e9d97415b570d58be8e22853623d9b6ea71d69100eefdd08cc027e2a11eee9729de5b686040f5250e60721404835f3c81cfd89e766d6cb2d8b
-
\Users\Admin\AppData\Local\VeoC\VERSION.dllMD5
daac585172eebb055e27444e134e95ff
SHA1bf02a73ff8a076b597282975ff70b87e6f06466d
SHA256461169eec758283bddd8a634d313503e73072e50f2ae8832cb803f164ebb2794
SHA5129997d927b23961e9d97415b570d58be8e22853623d9b6ea71d69100eefdd08cc027e2a11eee9729de5b686040f5250e60721404835f3c81cfd89e766d6cb2d8b
-
\Users\Admin\AppData\Local\dLx\SPP.dllMD5
8dd8b8e5cd86c0b24c3bf5f51b2c529b
SHA1367cbbf56382820ad7685d67c309c0bef488f677
SHA25613aff12326b59983656dd8043f88b606d90d28e80ac20c232943883f0b33a09d
SHA512226d51d53a086bb1d7b1fc53acba55b1d460b9ceafcaa776cbb4c98355d14bedeff5273189ecb1b414ff1bd370afa9f97cee7495f548c7b14181d18bfdce4398
-
memory/508-177-0x0000000000000000-mapping.dmp
-
memory/508-182-0x000001EB64BA0000-0x000001EB64C72000-memory.dmpFilesize
840KB
-
memory/508-184-0x000001EB64BA1000-0x000001EB64C1D000-memory.dmpFilesize
496KB
-
memory/664-114-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/664-119-0x000001A1D2300000-0x000001A1D2307000-memory.dmpFilesize
28KB
-
memory/3024-130-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3024-158-0x00007FFAEC674320-0x00007FFAEC675320-memory.dmpFilesize
4KB
-
memory/3024-135-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3024-136-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3024-137-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3024-138-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3024-139-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3024-140-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3024-141-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3024-142-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3024-143-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3024-144-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3024-145-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3024-146-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3024-147-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3024-148-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3024-149-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3024-134-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3024-133-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3024-120-0x0000000002640000-0x0000000002641000-memory.dmpFilesize
4KB
-
memory/3024-132-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3024-131-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3024-122-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3024-121-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3024-129-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3024-128-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3024-127-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3024-123-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3024-126-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3024-125-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3024-124-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3528-163-0x0000000140000000-0x00000001400D8000-memory.dmpFilesize
864KB
-
memory/3528-159-0x0000000000000000-mapping.dmp
-
memory/3992-172-0x0000000140000000-0x00000001400D2000-memory.dmpFilesize
840KB
-
memory/3992-168-0x0000000000000000-mapping.dmp