Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
30-09-2021 11:16
Static task
static1
Behavioral task
behavioral1
Sample
727480f59a875531de664c9b0b28be52e89fefd526f0f48cf58a60b5cbd72e78.dll
Resource
win7-en-20210920
General
-
Target
727480f59a875531de664c9b0b28be52e89fefd526f0f48cf58a60b5cbd72e78.dll
-
Size
836KB
-
MD5
83fde71058621e61972a1ccb752287d1
-
SHA1
dab9e2ec800d9437556f4752470a5ba74bf53de6
-
SHA256
727480f59a875531de664c9b0b28be52e89fefd526f0f48cf58a60b5cbd72e78
-
SHA512
ac4902a487fe637929cde77709df2f34194f0f340f4fea943e7c5be7094b10d7de2dddd5583267b54deb2cf9a202ecb745841822d71d24067aad7018b256a759
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4060-114-0x0000000140000000-0x00000001400D1000-memory.dmp dridex_payload behavioral2/memory/836-164-0x0000000140000000-0x00000001400D3000-memory.dmp dridex_payload behavioral2/memory/1396-172-0x0000000140000000-0x00000001400D2000-memory.dmp dridex_payload -
Processes:
resource yara_rule behavioral2/memory/3016-120-0x0000000000FC0000-0x0000000000FC1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
mfpmp.exephoneactivate.exewextract.exepid process 836 mfpmp.exe 1396 phoneactivate.exe 1852 wextract.exe -
Loads dropped DLL 3 IoCs
Processes:
mfpmp.exephoneactivate.exewextract.exepid process 836 mfpmp.exe 1396 phoneactivate.exe 1852 wextract.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rvhohwdqaanc = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\SendTo\\2Wmg\\phoneactivate.exe" -
Processes:
mfpmp.exephoneactivate.exewextract.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mfpmp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA phoneactivate.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wextract.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Modifies registry class 2 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 4060 rundll32.exe 4060 rundll32.exe 4060 rundll32.exe 4060 rundll32.exe 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3016 -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3016 Token: SeCreatePagefilePrivilege 3016 Token: SeShutdownPrivilege 3016 Token: SeCreatePagefilePrivilege 3016 Token: SeShutdownPrivilege 3016 Token: SeCreatePagefilePrivilege 3016 -
Suspicious use of FindShellTrayWindow 10 IoCs
Processes:
pid process 3016 3016 3016 3016 3016 3016 3016 3016 3016 3016 -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
pid process 3016 3016 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3016 wrote to memory of 492 3016 mfpmp.exe PID 3016 wrote to memory of 492 3016 mfpmp.exe PID 3016 wrote to memory of 836 3016 mfpmp.exe PID 3016 wrote to memory of 836 3016 mfpmp.exe PID 3016 wrote to memory of 1292 3016 phoneactivate.exe PID 3016 wrote to memory of 1292 3016 phoneactivate.exe PID 3016 wrote to memory of 1396 3016 phoneactivate.exe PID 3016 wrote to memory of 1396 3016 phoneactivate.exe PID 3016 wrote to memory of 1740 3016 wextract.exe PID 3016 wrote to memory of 1740 3016 wextract.exe PID 3016 wrote to memory of 1852 3016 wextract.exe PID 3016 wrote to memory of 1852 3016 wextract.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\727480f59a875531de664c9b0b28be52e89fefd526f0f48cf58a60b5cbd72e78.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\mfpmp.exeC:\Windows\system32\mfpmp.exe1⤵
-
C:\Users\Admin\AppData\Local\PLQCQ\mfpmp.exeC:\Users\Admin\AppData\Local\PLQCQ\mfpmp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\phoneactivate.exeC:\Windows\system32\phoneactivate.exe1⤵
-
C:\Users\Admin\AppData\Local\bZKVXi8j\phoneactivate.exeC:\Users\Admin\AppData\Local\bZKVXi8j\phoneactivate.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\wextract.exeC:\Windows\system32\wextract.exe1⤵
-
C:\Users\Admin\AppData\Local\1KpSioS\wextract.exeC:\Users\Admin\AppData\Local\1KpSioS\wextract.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\1KpSioS\VERSION.dllMD5
7a4082f8a925cf44b0bb1beb0e1f78ab
SHA1b4c68f1280ee9778d99e4f7166523c619bc12505
SHA25674ba18856a7fecd3387bc8d9d6aec192e2de6c54c95d6416b30cc2dbd4d51ecf
SHA5120030930109ae50ab260e854fee0a4f1383b5863b3b2d0bacbd7e5eff7cb6557d39f506ca94bc2b88f9b0216634a273c07831878887bc597f5e3ec6bb107b0a0a
-
C:\Users\Admin\AppData\Local\1KpSioS\wextract.exeMD5
e78764b49f5806ce029cd547004493c9
SHA18c1f3f989913bebf827a707c04754047507a8cf3
SHA256ab519b1c2711219a9f262b23bf72343eec3c0df4c7ddd135d30d05e700ec302e
SHA51271040e5f0d2d409efaba70a7daaebe7a4675cb19009436a826a679671cc0d7c960498364ec7a29fb163ce8dada65218b75bebb973e6c8b194734e01970fd3a6b
-
C:\Users\Admin\AppData\Local\PLQCQ\MFPlat.DLLMD5
4c0fa5d2823ea212fb46742fd83b9493
SHA18c860e874bbb0a90ab8c4e750a87d6121e5e8bf2
SHA2568ac4f3aa7181cfb0490129ffa319801d1cdf7f2c1c01f08797d8e42b70b6d606
SHA51268a5793c949ad4cd1924fb1f4bc8a6fb93b38287b190d2026e1d2dae5a076d3425929434df1b9d05f0c911901fb8d28af42661d8dc430a47393e24ec3afdf470
-
C:\Users\Admin\AppData\Local\PLQCQ\mfpmp.exeMD5
0a51780965f4a75557ac6b1a710a7c7b
SHA130e7be939ada607cbafd07261da463396878f4f5
SHA25645b8b316c617f703af064aafab9a35c465d5f7835b758995e82ac0dedbaad037
SHA512e62c2252b66809cca9e7f625392ef09891eba1eec3c210798684a9c71a9c5315598ca259c8ebd09af5d8aaf94261fca91f30bd0dd22a917d5287e9443ae18326
-
C:\Users\Admin\AppData\Local\bZKVXi8j\SLC.dllMD5
5593a1008826e81787f1648034969452
SHA16b7fc6df387bacdf8f3b121300135f232b06bbb7
SHA256c2ee1377cee93c132a9003ec5c72f9136f9095d22ec24ce559510be11cd0a884
SHA512dc0f7eb66f882ba615f324f57fbe07b7bed33f2a685f8d74fd82b33af5a4a159ef5e0782107fd4145f5603daac8ea63e4a71a56fa47a9d889cf7ac03a243bebc
-
C:\Users\Admin\AppData\Local\bZKVXi8j\phoneactivate.exeMD5
c2bc59e307f825237dce846049fda140
SHA130bf767297d2f3a833f57443fbf5dc02c80030bd
SHA2563a373641d048ef5964efa2d80248e8d441cfcd93b47961e0ed586c1609069c41
SHA512f4d9aec2b1c24cc8e8094abf561a181659afd86054422d32a67b7dd0b95e0ec710ea5a43a44e610bf94df3c817fca9fc620032e0dbd88e824766ef0e3e1c3b42
-
\Users\Admin\AppData\Local\1KpSioS\VERSION.dllMD5
7a4082f8a925cf44b0bb1beb0e1f78ab
SHA1b4c68f1280ee9778d99e4f7166523c619bc12505
SHA25674ba18856a7fecd3387bc8d9d6aec192e2de6c54c95d6416b30cc2dbd4d51ecf
SHA5120030930109ae50ab260e854fee0a4f1383b5863b3b2d0bacbd7e5eff7cb6557d39f506ca94bc2b88f9b0216634a273c07831878887bc597f5e3ec6bb107b0a0a
-
\Users\Admin\AppData\Local\PLQCQ\MFPlat.DLLMD5
4c0fa5d2823ea212fb46742fd83b9493
SHA18c860e874bbb0a90ab8c4e750a87d6121e5e8bf2
SHA2568ac4f3aa7181cfb0490129ffa319801d1cdf7f2c1c01f08797d8e42b70b6d606
SHA51268a5793c949ad4cd1924fb1f4bc8a6fb93b38287b190d2026e1d2dae5a076d3425929434df1b9d05f0c911901fb8d28af42661d8dc430a47393e24ec3afdf470
-
\Users\Admin\AppData\Local\bZKVXi8j\SLC.dllMD5
5593a1008826e81787f1648034969452
SHA16b7fc6df387bacdf8f3b121300135f232b06bbb7
SHA256c2ee1377cee93c132a9003ec5c72f9136f9095d22ec24ce559510be11cd0a884
SHA512dc0f7eb66f882ba615f324f57fbe07b7bed33f2a685f8d74fd82b33af5a4a159ef5e0782107fd4145f5603daac8ea63e4a71a56fa47a9d889cf7ac03a243bebc
-
memory/836-164-0x0000000140000000-0x00000001400D3000-memory.dmpFilesize
844KB
-
memory/836-158-0x0000000000000000-mapping.dmp
-
memory/1396-168-0x0000000000000000-mapping.dmp
-
memory/1396-172-0x0000000140000000-0x00000001400D2000-memory.dmpFilesize
840KB
-
memory/1852-180-0x0000000000000000-mapping.dmp
-
memory/3016-130-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3016-147-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3016-133-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3016-135-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3016-136-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3016-137-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3016-138-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3016-139-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3016-140-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3016-141-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3016-142-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3016-143-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3016-144-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3016-146-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3016-145-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3016-134-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3016-148-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3016-157-0x00007FFAB0D24320-0x00007FFAB0D25320-memory.dmpFilesize
4KB
-
memory/3016-124-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3016-132-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3016-131-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3016-120-0x0000000000FC0000-0x0000000000FC1000-memory.dmpFilesize
4KB
-
memory/3016-129-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3016-128-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3016-127-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3016-126-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3016-125-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3016-123-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3016-121-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/3016-122-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/4060-114-0x0000000140000000-0x00000001400D1000-memory.dmpFilesize
836KB
-
memory/4060-119-0x0000029744520000-0x0000029744527000-memory.dmpFilesize
28KB