Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
30-09-2021 10:23
Static task
static1
Behavioral task
behavioral1
Sample
202a5ee7d2833ecaae0120d63636567895cfcc9ea1cdae12debf6b9131147225.dll
Resource
win7v20210408
General
-
Target
202a5ee7d2833ecaae0120d63636567895cfcc9ea1cdae12debf6b9131147225.dll
-
Size
836KB
-
MD5
dc4936a8b1123fcb1ce8334adeff0f65
-
SHA1
966b336176a72d29e98c6aeaaa211f790df79427
-
SHA256
202a5ee7d2833ecaae0120d63636567895cfcc9ea1cdae12debf6b9131147225
-
SHA512
8f2b2e51dc553188a4626c85dc44368fd6b28c6eb1688ed3af61454d36c79191f234ae4dba306b32eb6e37540ef2a2f1844eeabfd73b5998328459e39f852ba0
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2068-115-0x0000000140000000-0x00000001400D1000-memory.dmp dridex_payload behavioral2/memory/3612-165-0x0000000140000000-0x00000001400D2000-memory.dmp dridex_payload behavioral2/memory/340-174-0x0000000140000000-0x0000000140117000-memory.dmp dridex_payload behavioral2/memory/992-183-0x0000000140000000-0x00000001400D3000-memory.dmp dridex_payload -
Processes:
resource yara_rule behavioral2/memory/2648-121-0x0000000000B80000-0x0000000000B81000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
SystemPropertiesComputerName.exeDmNotificationBroker.exerdpinput.exepid process 3612 SystemPropertiesComputerName.exe 340 DmNotificationBroker.exe 992 rdpinput.exe -
Loads dropped DLL 3 IoCs
Processes:
SystemPropertiesComputerName.exeDmNotificationBroker.exerdpinput.exepid process 3612 SystemPropertiesComputerName.exe 340 DmNotificationBroker.exe 992 rdpinput.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wjvmqhmsyzhtvy = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\DC\\iOe\\DmNotificationBroker.exe" -
Processes:
SystemPropertiesComputerName.exeDmNotificationBroker.exerdpinput.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesComputerName.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DmNotificationBroker.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpinput.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Modifies registry class 2 IoCs
Processes:
description ioc process Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2068 rundll32.exe 2068 rundll32.exe 2068 rundll32.exe 2068 rundll32.exe 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 2648 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2648 -
Suspicious use of AdjustPrivilegeToken 12 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 2648 Token: SeCreatePagefilePrivilege 2648 Token: SeShutdownPrivilege 2648 Token: SeCreatePagefilePrivilege 2648 Token: SeShutdownPrivilege 2648 Token: SeCreatePagefilePrivilege 2648 Token: SeShutdownPrivilege 2648 Token: SeCreatePagefilePrivilege 2648 Token: SeShutdownPrivilege 2648 Token: SeCreatePagefilePrivilege 2648 Token: SeShutdownPrivilege 2648 Token: SeCreatePagefilePrivilege 2648 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 2648 wrote to memory of 3600 2648 SystemPropertiesComputerName.exe PID 2648 wrote to memory of 3600 2648 SystemPropertiesComputerName.exe PID 2648 wrote to memory of 3612 2648 SystemPropertiesComputerName.exe PID 2648 wrote to memory of 3612 2648 SystemPropertiesComputerName.exe PID 2648 wrote to memory of 940 2648 DmNotificationBroker.exe PID 2648 wrote to memory of 940 2648 DmNotificationBroker.exe PID 2648 wrote to memory of 340 2648 DmNotificationBroker.exe PID 2648 wrote to memory of 340 2648 DmNotificationBroker.exe PID 2648 wrote to memory of 1288 2648 rdpinput.exe PID 2648 wrote to memory of 1288 2648 rdpinput.exe PID 2648 wrote to memory of 992 2648 rdpinput.exe PID 2648 wrote to memory of 992 2648 rdpinput.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\202a5ee7d2833ecaae0120d63636567895cfcc9ea1cdae12debf6b9131147225.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\SystemPropertiesComputerName.exeC:\Windows\system32\SystemPropertiesComputerName.exe1⤵
-
C:\Users\Admin\AppData\Local\q3ub\SystemPropertiesComputerName.exeC:\Users\Admin\AppData\Local\q3ub\SystemPropertiesComputerName.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\DmNotificationBroker.exeC:\Windows\system32\DmNotificationBroker.exe1⤵
-
C:\Users\Admin\AppData\Local\0Arqp0L\DmNotificationBroker.exeC:\Users\Admin\AppData\Local\0Arqp0L\DmNotificationBroker.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\rdpinput.exeC:\Windows\system32\rdpinput.exe1⤵
-
C:\Users\Admin\AppData\Local\z5dotW\rdpinput.exeC:\Users\Admin\AppData\Local\z5dotW\rdpinput.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\0Arqp0L\DUI70.dllMD5
6f0028edc08ee92299d952dfe5bd69ff
SHA1491e5076cff4119ef8bc0f6e04a4e4b061f5fd61
SHA256f113272d659cd8145916b690406c8a8d3c70f01c2ef7ec9e2b5d6c8f5d1b9c20
SHA51299747f5a6498081a06ea38b693528fa745e4225dc8e20d5b1008e3b6dd03c2eecd5ce0f1705242a9b4bc2dc67df6f0270f1f7d154bf682e67639eaf9941de858
-
C:\Users\Admin\AppData\Local\0Arqp0L\DmNotificationBroker.exeMD5
80650482bacf349d2d4aadc99e916da7
SHA17c3d6eb2fc82cfa2122f115b80d49a9887d089de
SHA2561cb2fe49a4d07375b6216bc51c372a3c78a96443765672ded3624d279c37c715
SHA512d3bf9501b25ffe7145dda9cf3aa521854949ed11ebb5dd48aba7aab16d3b0d75dfe8976d3c3b932cc4eb2f77cf185a0b2d81965e055fdb3c5606400d77824a56
-
C:\Users\Admin\AppData\Local\q3ub\SYSDM.CPLMD5
9fb2a59303eb7e12588dffc56c0bd8ba
SHA1cb67b26946fb2dd09b720c25a8b0fb0980ffab8c
SHA256583220a5e565cfd7245187123f2a7d1ee68a588a6f1f4e10ad7a4e2f1cc437cc
SHA5126053a74d31661c7941995741e83ff8d687903cad3426b5c1f22b214068d976234d8eec34fe1c2b9983772869d9713d2db7b8d1f6b9564d4b5bcc320a1ebbee03
-
C:\Users\Admin\AppData\Local\q3ub\SystemPropertiesComputerName.exeMD5
d2d62d055f517f71b0fd9a649727ff6c
SHA143f627215d57e0396ad74e9b0ed4bd29f60fca33
SHA256222d3d4f7c8f64beb0a0007120b4411c2040c50e1d376420228151bdd230fe7d
SHA512f46e02a465425a148fcd4be5fda0889c412eeab4c50abf9874b3ee02af83c96403167c99aa57961e1c631a5a7a5070e8a1c363688581ff83ed176b4206564cd0
-
C:\Users\Admin\AppData\Local\z5dotW\WINSTA.dllMD5
db1ad05870c2abd8874ba4df2e0a7d3d
SHA1a3f36cecf67a7714a8df407d7bf15168b8911999
SHA2564e9f1cbdb2fe43380a92d3a293bf29b23ca33db67314dc925399473ccaebbdd4
SHA512e7b4f2d9da51335f4ef957725dfda6100d9f813db799b07fcbf7fe3f0e1102f7bae957e48409cca207f6ad6aad1f80ed8d8af3d29078cd321f6fcb2b7e912ad7
-
C:\Users\Admin\AppData\Local\z5dotW\rdpinput.exeMD5
431364c49991ebfea19b468020368e08
SHA1c36c8a01ccd17b8ec754fe92d1e03558bb3f05ac
SHA2566c59ea8b7807d9cc9de5c67cf679a1fb1bed4629da1f0a071e03af775de8e4fc
SHA5126b2baeb9abc1277fef874ead7d0c4b2b5c5953b8f9db5ae056a14a0af6edb6482b303e7f4ba5237a22e62919f09cd8334692dd58053754ed18837ace14565d8f
-
\Users\Admin\AppData\Local\0Arqp0L\DUI70.dllMD5
6f0028edc08ee92299d952dfe5bd69ff
SHA1491e5076cff4119ef8bc0f6e04a4e4b061f5fd61
SHA256f113272d659cd8145916b690406c8a8d3c70f01c2ef7ec9e2b5d6c8f5d1b9c20
SHA51299747f5a6498081a06ea38b693528fa745e4225dc8e20d5b1008e3b6dd03c2eecd5ce0f1705242a9b4bc2dc67df6f0270f1f7d154bf682e67639eaf9941de858
-
\Users\Admin\AppData\Local\q3ub\SYSDM.CPLMD5
9fb2a59303eb7e12588dffc56c0bd8ba
SHA1cb67b26946fb2dd09b720c25a8b0fb0980ffab8c
SHA256583220a5e565cfd7245187123f2a7d1ee68a588a6f1f4e10ad7a4e2f1cc437cc
SHA5126053a74d31661c7941995741e83ff8d687903cad3426b5c1f22b214068d976234d8eec34fe1c2b9983772869d9713d2db7b8d1f6b9564d4b5bcc320a1ebbee03
-
\Users\Admin\AppData\Local\z5dotW\WINSTA.dllMD5
db1ad05870c2abd8874ba4df2e0a7d3d
SHA1a3f36cecf67a7714a8df407d7bf15168b8911999
SHA2564e9f1cbdb2fe43380a92d3a293bf29b23ca33db67314dc925399473ccaebbdd4
SHA512e7b4f2d9da51335f4ef957725dfda6100d9f813db799b07fcbf7fe3f0e1102f7bae957e48409cca207f6ad6aad1f80ed8d8af3d29078cd321f6fcb2b7e912ad7
-
memory/340-174-0x0000000140000000-0x0000000140117000-memory.dmpFilesize
1.1MB
-
memory/340-170-0x0000000000000000-mapping.dmp
-
memory/992-179-0x0000000000000000-mapping.dmp
-
memory/992-183-0x0000000140000000-0x00000001400D3000-memory.dmpFilesize
844KB
-
memory/2068-115-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/2068-120-0x000001604E290000-0x000001604E297000-memory.dmpFilesize
28KB
-
memory/2648-131-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/2648-159-0x00007FFE19694320-0x00007FFE19695320-memory.dmpFilesize
4KB
-
memory/2648-136-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/2648-137-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/2648-138-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/2648-139-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/2648-140-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/2648-142-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/2648-141-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/2648-143-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/2648-144-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/2648-145-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/2648-147-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/2648-148-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/2648-149-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/2648-150-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/2648-146-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/2648-135-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/2648-160-0x00007FFE19664320-0x00007FFE19665320-memory.dmpFilesize
4KB
-
memory/2648-121-0x0000000000B80000-0x0000000000B81000-memory.dmpFilesize
4KB
-
memory/2648-134-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/2648-133-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/2648-132-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/2648-123-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/2648-130-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/2648-129-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/2648-128-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/2648-126-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/2648-127-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/2648-125-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/2648-124-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/2648-122-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3612-165-0x0000000140000000-0x00000001400D2000-memory.dmpFilesize
840KB
-
memory/3612-161-0x0000000000000000-mapping.dmp