Analysis
-
max time kernel
150s -
max time network
23s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
30-09-2021 11:16
Static task
static1
Behavioral task
behavioral1
Sample
727480f59a875531de664c9b0b28be52e89fefd526f0f48cf58a60b5cbd72e78.dll
Resource
win7-en-20210920
General
-
Target
727480f59a875531de664c9b0b28be52e89fefd526f0f48cf58a60b5cbd72e78.dll
-
Size
836KB
-
MD5
83fde71058621e61972a1ccb752287d1
-
SHA1
dab9e2ec800d9437556f4752470a5ba74bf53de6
-
SHA256
727480f59a875531de664c9b0b28be52e89fefd526f0f48cf58a60b5cbd72e78
-
SHA512
ac4902a487fe637929cde77709df2f34194f0f340f4fea943e7c5be7094b10d7de2dddd5583267b54deb2cf9a202ecb745841822d71d24067aad7018b256a759
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1544-54-0x0000000140000000-0x00000001400D1000-memory.dmp dridex_payload behavioral1/memory/1816-96-0x0000000140000000-0x00000001400D3000-memory.dmp dridex_payload behavioral1/memory/536-113-0x0000000140000000-0x00000001400D8000-memory.dmp dridex_payload -
Processes:
resource yara_rule behavioral1/memory/1404-57-0x0000000002570000-0x0000000002571000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
winlogon.exeWFS.exeshrpubw.exepid process 1816 winlogon.exe 548 WFS.exe 536 shrpubw.exe -
Loads dropped DLL 7 IoCs
Processes:
winlogon.exeWFS.exeshrpubw.exepid process 1404 1816 winlogon.exe 1404 548 WFS.exe 1404 536 shrpubw.exe 1404 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wbbdywj = "C:\\Users\\Admin\\AppData\\Roaming\\Macromedia\\Npu\\WFS.exe" -
Processes:
rundll32.exewinlogon.exeWFS.exeshrpubw.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlogon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WFS.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA shrpubw.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1544 rundll32.exe 1544 rundll32.exe 1544 rundll32.exe 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 1404 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1404 -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
pid process 1404 1404 1404 1404 -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
pid process 1404 1404 1404 1404 1404 1404 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1404 wrote to memory of 1452 1404 winlogon.exe PID 1404 wrote to memory of 1452 1404 winlogon.exe PID 1404 wrote to memory of 1452 1404 winlogon.exe PID 1404 wrote to memory of 1816 1404 winlogon.exe PID 1404 wrote to memory of 1816 1404 winlogon.exe PID 1404 wrote to memory of 1816 1404 winlogon.exe PID 1404 wrote to memory of 1236 1404 WFS.exe PID 1404 wrote to memory of 1236 1404 WFS.exe PID 1404 wrote to memory of 1236 1404 WFS.exe PID 1404 wrote to memory of 548 1404 WFS.exe PID 1404 wrote to memory of 548 1404 WFS.exe PID 1404 wrote to memory of 548 1404 WFS.exe PID 1404 wrote to memory of 1216 1404 shrpubw.exe PID 1404 wrote to memory of 1216 1404 shrpubw.exe PID 1404 wrote to memory of 1216 1404 shrpubw.exe PID 1404 wrote to memory of 536 1404 shrpubw.exe PID 1404 wrote to memory of 536 1404 shrpubw.exe PID 1404 wrote to memory of 536 1404 shrpubw.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\727480f59a875531de664c9b0b28be52e89fefd526f0f48cf58a60b5cbd72e78.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\winlogon.exeC:\Windows\system32\winlogon.exe1⤵
-
C:\Users\Admin\AppData\Local\8qbxkk9\winlogon.exeC:\Users\Admin\AppData\Local\8qbxkk9\winlogon.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\WFS.exeC:\Windows\system32\WFS.exe1⤵
-
C:\Users\Admin\AppData\Local\tumQ6\WFS.exeC:\Users\Admin\AppData\Local\tumQ6\WFS.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\shrpubw.exeC:\Windows\system32\shrpubw.exe1⤵
-
C:\Users\Admin\AppData\Local\AKjrGxy\shrpubw.exeC:\Users\Admin\AppData\Local\AKjrGxy\shrpubw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\8qbxkk9\WINSTA.dllMD5
49c06ea7d77e0ff9b0c0aec0a2f5f25e
SHA16f73a1b91ba3b62db6a65adfe11238e33378bef2
SHA256a608d3ad4e2450775258a90150953f724ee1f9b585392a9ae3e65cfcb124987c
SHA512770953ed29a0eb1fd6ebf5dd57192f7603710ff33bfb72ed3d8a753b36762208c56d7414e5e954a5ffb1d09597d97ac8c0b564b5053a749d2ff96cbbfb454efc
-
C:\Users\Admin\AppData\Local\8qbxkk9\winlogon.exeMD5
1151b1baa6f350b1db6598e0fea7c457
SHA1434856b834baf163c5ea4d26434eeae775a507fb
SHA256b1506e0a7e826eff0f5252ef5026070c46e2235438403a9a24d73ee69c0b8a49
SHA512df728d06238da1dece96f8b8d67a2423ed4dcb344b42d5958768d23bd570a79e7189e7c5ba783c1628fe8ddd1deaebeacb1b471c59c8a7c9beb21b4f1eb9edab
-
C:\Users\Admin\AppData\Local\AKjrGxy\MFC42u.dllMD5
e84b855923b3b2d483fce941b90f3607
SHA10007c43e9fae286c49bea4c175baee656e699de6
SHA256b898a35ff587553bb2e674766c1cfd8b3031ffce4ce06794e850ccab4e4b1ad5
SHA512e6208e6dc27fb4ad088766baf5e55aa6c232e5491b4c98dd016e02b8bbaf5589f9eb3ce9a86cbf4348f6cca9a1060d3e19c521d2a886d99869fbc23a2054b78d
-
C:\Users\Admin\AppData\Local\AKjrGxy\shrpubw.exeMD5
29e6d0016611c8f948db5ea71372f76c
SHA101d007a01020370709cd6580717f9ace049647e8
SHA25653c868882ebc9e0d4f703afeccb172043069ccc0b5b6f7cac1d2aad9c4640930
SHA512300216ab47ee44b8f68d4835bf26641f949039522b680af00fb602f57d31c38812428dc624461bc2cc7d6384cad396bc033718e41e11a65f7dd0eeb36ed924e4
-
C:\Users\Admin\AppData\Local\tumQ6\WFS.exeMD5
a943d670747778c7597987a4b5b9a679
SHA1c48b760ff9762205386563b93e8884352645ef40
SHA2561a582ebe780abc1143baccaf4910714d3e9f4195edd86939499d03ed6e756610
SHA5123d926ddead8afcb32b52b3eb3c416d197c15e5fff6ba9fa03a31a07522bdb9088b32500fc8b98d82af657071571d09cd336a65cf45c485ebcc145dea70b3a934
-
C:\Users\Admin\AppData\Local\tumQ6\WINMM.dllMD5
e483eaf0d4ace45951110b0b728e0ffc
SHA18344d8f8a1c84b0375d6503d994ed7f88b928382
SHA256dd0e0ad4ad8fae041e568cd88683157aa038d648081e32d0ea2e362f877650a5
SHA512aebe3a3a71b5f5ae8c806d61a448996f675292126e103f29f9320b1ef4f746c688edde725972d1ed6010c35a2bc7d0f85d7f9d11cc4211d41ba69fb0fe6dbead
-
\Users\Admin\AppData\Local\8qbxkk9\WINSTA.dllMD5
49c06ea7d77e0ff9b0c0aec0a2f5f25e
SHA16f73a1b91ba3b62db6a65adfe11238e33378bef2
SHA256a608d3ad4e2450775258a90150953f724ee1f9b585392a9ae3e65cfcb124987c
SHA512770953ed29a0eb1fd6ebf5dd57192f7603710ff33bfb72ed3d8a753b36762208c56d7414e5e954a5ffb1d09597d97ac8c0b564b5053a749d2ff96cbbfb454efc
-
\Users\Admin\AppData\Local\8qbxkk9\winlogon.exeMD5
1151b1baa6f350b1db6598e0fea7c457
SHA1434856b834baf163c5ea4d26434eeae775a507fb
SHA256b1506e0a7e826eff0f5252ef5026070c46e2235438403a9a24d73ee69c0b8a49
SHA512df728d06238da1dece96f8b8d67a2423ed4dcb344b42d5958768d23bd570a79e7189e7c5ba783c1628fe8ddd1deaebeacb1b471c59c8a7c9beb21b4f1eb9edab
-
\Users\Admin\AppData\Local\AKjrGxy\MFC42u.dllMD5
e84b855923b3b2d483fce941b90f3607
SHA10007c43e9fae286c49bea4c175baee656e699de6
SHA256b898a35ff587553bb2e674766c1cfd8b3031ffce4ce06794e850ccab4e4b1ad5
SHA512e6208e6dc27fb4ad088766baf5e55aa6c232e5491b4c98dd016e02b8bbaf5589f9eb3ce9a86cbf4348f6cca9a1060d3e19c521d2a886d99869fbc23a2054b78d
-
\Users\Admin\AppData\Local\AKjrGxy\shrpubw.exeMD5
29e6d0016611c8f948db5ea71372f76c
SHA101d007a01020370709cd6580717f9ace049647e8
SHA25653c868882ebc9e0d4f703afeccb172043069ccc0b5b6f7cac1d2aad9c4640930
SHA512300216ab47ee44b8f68d4835bf26641f949039522b680af00fb602f57d31c38812428dc624461bc2cc7d6384cad396bc033718e41e11a65f7dd0eeb36ed924e4
-
\Users\Admin\AppData\Local\tumQ6\WFS.exeMD5
a943d670747778c7597987a4b5b9a679
SHA1c48b760ff9762205386563b93e8884352645ef40
SHA2561a582ebe780abc1143baccaf4910714d3e9f4195edd86939499d03ed6e756610
SHA5123d926ddead8afcb32b52b3eb3c416d197c15e5fff6ba9fa03a31a07522bdb9088b32500fc8b98d82af657071571d09cd336a65cf45c485ebcc145dea70b3a934
-
\Users\Admin\AppData\Local\tumQ6\WINMM.dllMD5
e483eaf0d4ace45951110b0b728e0ffc
SHA18344d8f8a1c84b0375d6503d994ed7f88b928382
SHA256dd0e0ad4ad8fae041e568cd88683157aa038d648081e32d0ea2e362f877650a5
SHA512aebe3a3a71b5f5ae8c806d61a448996f675292126e103f29f9320b1ef4f746c688edde725972d1ed6010c35a2bc7d0f85d7f9d11cc4211d41ba69fb0fe6dbead
-
\Users\Admin\AppData\Roaming\Adobe\HGnR\shrpubw.exeMD5
29e6d0016611c8f948db5ea71372f76c
SHA101d007a01020370709cd6580717f9ace049647e8
SHA25653c868882ebc9e0d4f703afeccb172043069ccc0b5b6f7cac1d2aad9c4640930
SHA512300216ab47ee44b8f68d4835bf26641f949039522b680af00fb602f57d31c38812428dc624461bc2cc7d6384cad396bc033718e41e11a65f7dd0eeb36ed924e4
-
memory/536-108-0x0000000000000000-mapping.dmp
-
memory/536-113-0x0000000140000000-0x00000001400D8000-memory.dmpFilesize
864KB
-
memory/548-101-0x000007FEFBA11000-0x000007FEFBA13000-memory.dmpFilesize
8KB
-
memory/548-99-0x0000000000000000-mapping.dmp
-
memory/548-104-0x000000013FC91000-0x000000013FC93000-memory.dmpFilesize
8KB
-
memory/1404-67-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/1404-70-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/1404-75-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/1404-76-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/1404-77-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/1404-79-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/1404-78-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/1404-80-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/1404-81-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/1404-82-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/1404-83-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/1404-85-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/1404-84-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/1404-73-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/1404-57-0x0000000002570000-0x0000000002571000-memory.dmpFilesize
4KB
-
memory/1404-72-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/1404-71-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/1404-74-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/1404-58-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/1404-69-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/1404-68-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/1404-59-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/1404-66-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/1404-65-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/1404-64-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/1404-63-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/1404-60-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/1404-61-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/1404-62-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/1544-54-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/1544-56-0x0000000000200000-0x0000000000207000-memory.dmpFilesize
28KB
-
memory/1816-96-0x0000000140000000-0x00000001400D3000-memory.dmpFilesize
844KB
-
memory/1816-92-0x0000000000000000-mapping.dmp