Analysis
-
max time kernel
153s -
max time network
91s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
30-09-2021 11:33
Static task
static1
Behavioral task
behavioral1
Sample
075742803b0beb6494f4f67850a13e79d0e4b30d6e3c46d3910062a798d99eca.dll
Resource
win7-en-20210920
General
-
Target
075742803b0beb6494f4f67850a13e79d0e4b30d6e3c46d3910062a798d99eca.dll
-
Size
812KB
-
MD5
5c4c982abfebbc1780ad0b08e5addb47
-
SHA1
e38543d77ba0d529febe02806862f51e816ecf99
-
SHA256
075742803b0beb6494f4f67850a13e79d0e4b30d6e3c46d3910062a798d99eca
-
SHA512
f685774bc5643b5c349c982c1ce2c2e78e01715da9b9173ed15b1b985ee86cd9430fd1701fac5d9a50ed8da4dd1b2f563edfa5adfcbf64521d07968357f0a37a
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4016-114-0x0000000140000000-0x00000001400CB000-memory.dmp dridex_payload behavioral2/memory/1360-163-0x0000000140000000-0x00000001400CC000-memory.dmp dridex_payload -
Processes:
resource yara_rule behavioral2/memory/3028-120-0x0000000000DF0000-0x0000000000DF1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
EhStorAuthn.exetabcal.exeomadmclient.exepid process 1360 EhStorAuthn.exe 1720 tabcal.exe 2176 omadmclient.exe -
Loads dropped DLL 3 IoCs
Processes:
EhStorAuthn.exetabcal.exeomadmclient.exepid process 1360 EhStorAuthn.exe 1720 tabcal.exe 2176 omadmclient.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rvhohwdqaanc = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Libraries\\ZKSPEe9\\tabcal.exe" -
Processes:
rundll32.exeEhStorAuthn.exetabcal.exeomadmclient.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tabcal.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA omadmclient.exe -
Modifies registry class 2 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Key created \REGISTRY\USER\S-1-5-21-1594587808-2047097707-2163810515-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 4016 rundll32.exe 4016 rundll32.exe 4016 rundll32.exe 4016 rundll32.exe 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 3028 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3028 -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 Token: SeShutdownPrivilege 3028 Token: SeCreatePagefilePrivilege 3028 -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
pid process 3028 3028 3028 3028 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3028 wrote to memory of 1248 3028 EhStorAuthn.exe PID 3028 wrote to memory of 1248 3028 EhStorAuthn.exe PID 3028 wrote to memory of 1360 3028 EhStorAuthn.exe PID 3028 wrote to memory of 1360 3028 EhStorAuthn.exe PID 3028 wrote to memory of 1712 3028 tabcal.exe PID 3028 wrote to memory of 1712 3028 tabcal.exe PID 3028 wrote to memory of 1720 3028 tabcal.exe PID 3028 wrote to memory of 1720 3028 tabcal.exe PID 3028 wrote to memory of 2088 3028 omadmclient.exe PID 3028 wrote to memory of 2088 3028 omadmclient.exe PID 3028 wrote to memory of 2176 3028 omadmclient.exe PID 3028 wrote to memory of 2176 3028 omadmclient.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\075742803b0beb6494f4f67850a13e79d0e4b30d6e3c46d3910062a798d99eca.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\EhStorAuthn.exeC:\Windows\system32\EhStorAuthn.exe1⤵
-
C:\Users\Admin\AppData\Local\Cow7zEQ\EhStorAuthn.exeC:\Users\Admin\AppData\Local\Cow7zEQ\EhStorAuthn.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\tabcal.exeC:\Windows\system32\tabcal.exe1⤵
-
C:\Users\Admin\AppData\Local\wTj67n\tabcal.exeC:\Users\Admin\AppData\Local\wTj67n\tabcal.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\omadmclient.exeC:\Windows\system32\omadmclient.exe1⤵
-
C:\Users\Admin\AppData\Local\IR0LWsNI\omadmclient.exeC:\Users\Admin\AppData\Local\IR0LWsNI\omadmclient.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Cow7zEQ\EhStorAuthn.exeMD5
118b5c1b372cb01ce63d5eaa2358633b
SHA13c51c58c5e17c435e004dc08b16cf9609229281c
SHA2560c92e6ef942d548686bcfc277fef5b830d79e04a42efc358045f8a170a218d30
SHA51233ac3b760ac48544885a3edc4bc04d4dd37786109cb2016f4aabfc3ab02b1140dc43963474a54c5cd808a41b3755f0e6cb9cc1e2ebd4e86fd2d2c5973ff8401e
-
C:\Users\Admin\AppData\Local\Cow7zEQ\UxTheme.dllMD5
b44d4db53a519034da45d89b3c9d2093
SHA1726fcee99109f1643f0bf9b541791ce86fc3848c
SHA25606decabd582f4fe3504488bca693a83c216f5f6f8a460cc0059087b8e7c1afca
SHA512b5522a6b111767d7aeb22d8aa1aac79d8fbbcf3ef6c7380dc6a182ee6e3a72f97b9687f185b51dfd7365ed92858fa47f777ef2ad86901c5d1b8741998e2faeaa
-
C:\Users\Admin\AppData\Local\IR0LWsNI\XmlLite.dllMD5
a27ccc45f5403595723715b007b15d4c
SHA1fa0f5430b2f21ba91164c7cbd45486d04e9047ed
SHA256eb48f4847660e30c19b485ff4c22d6333ce6618ff83c7d6caa0fbea11d00f3ae
SHA5122a134e72dc0a97231be3ac1f9352b4a4d07085fb1c0e8ac9c1e36c5dab9ebf656ba0597754a3cb5c70d103990ab7d9b4de7b047c0d5eed761650f4f43390ff30
-
C:\Users\Admin\AppData\Local\IR0LWsNI\omadmclient.exeMD5
0f8c6315c9458cab5b3aae2df853edb6
SHA1ff59734b75896b422e8d7a642c4ea59bf6dab759
SHA25676eb6879858ab42089e369984f6e0e775b32b6756a605ed5f2fb1a06c1151498
SHA512966045c25685a0f01bcd49f6e9ec5bbdaa8a3e261129c03db85031fb1d8705bfba967894d2530c2691e16fdbed11a9df9122d9093db2b46c6ce1b641db36bb3c
-
C:\Users\Admin\AppData\Local\wTj67n\HID.DLLMD5
c2e2187505a5bfcbddb5a04de039cfc2
SHA1c496ca839d8ed379f61294a77cc92c12b811a2a4
SHA2564bf93c2a4d1c3771448e100634491f3b40f637ed04bad8922cd162be952aa97d
SHA512e65b4fe7a4bbd07544d6846f8cf684ed51fc6e4e5865dd0f491ca2ae1261bb77a4f3f86c9632564d59c67098bb5ae20ddbe7b777c16e6d9ff302230be03c9468
-
C:\Users\Admin\AppData\Local\wTj67n\tabcal.exeMD5
4e5b6b3059dc055232f4fbd6c4796540
SHA19929b2c336e9bf4aacfaa15083224bcd5eff6aae
SHA256bc0beeda967eecf14940d2105cd179cd0da3843651d183c3ead6df7615c866f1
SHA5127bdb1eb8c3b84203ae9ef8d58045a5fa32bd2c206f71a3bae14c458b37d265452e183f3fbe0784a8a37fdea661dd5c34d50decbc6a296b9c7a6c353c61152374
-
\Users\Admin\AppData\Local\Cow7zEQ\UxTheme.dllMD5
b44d4db53a519034da45d89b3c9d2093
SHA1726fcee99109f1643f0bf9b541791ce86fc3848c
SHA25606decabd582f4fe3504488bca693a83c216f5f6f8a460cc0059087b8e7c1afca
SHA512b5522a6b111767d7aeb22d8aa1aac79d8fbbcf3ef6c7380dc6a182ee6e3a72f97b9687f185b51dfd7365ed92858fa47f777ef2ad86901c5d1b8741998e2faeaa
-
\Users\Admin\AppData\Local\IR0LWsNI\XmlLite.dllMD5
a27ccc45f5403595723715b007b15d4c
SHA1fa0f5430b2f21ba91164c7cbd45486d04e9047ed
SHA256eb48f4847660e30c19b485ff4c22d6333ce6618ff83c7d6caa0fbea11d00f3ae
SHA5122a134e72dc0a97231be3ac1f9352b4a4d07085fb1c0e8ac9c1e36c5dab9ebf656ba0597754a3cb5c70d103990ab7d9b4de7b047c0d5eed761650f4f43390ff30
-
\Users\Admin\AppData\Local\wTj67n\HID.DLLMD5
c2e2187505a5bfcbddb5a04de039cfc2
SHA1c496ca839d8ed379f61294a77cc92c12b811a2a4
SHA2564bf93c2a4d1c3771448e100634491f3b40f637ed04bad8922cd162be952aa97d
SHA512e65b4fe7a4bbd07544d6846f8cf684ed51fc6e4e5865dd0f491ca2ae1261bb77a4f3f86c9632564d59c67098bb5ae20ddbe7b777c16e6d9ff302230be03c9468
-
memory/1360-159-0x0000000000000000-mapping.dmp
-
memory/1360-163-0x0000000140000000-0x00000001400CC000-memory.dmpFilesize
816KB
-
memory/1720-168-0x0000000000000000-mapping.dmp
-
memory/2176-177-0x0000000000000000-mapping.dmp
-
memory/3028-129-0x0000000140000000-0x00000001400CB000-memory.dmpFilesize
812KB
-
memory/3028-148-0x0000000140000000-0x00000001400CB000-memory.dmpFilesize
812KB
-
memory/3028-133-0x0000000140000000-0x00000001400CB000-memory.dmpFilesize
812KB
-
memory/3028-134-0x0000000140000000-0x00000001400CB000-memory.dmpFilesize
812KB
-
memory/3028-135-0x0000000140000000-0x00000001400CB000-memory.dmpFilesize
812KB
-
memory/3028-136-0x0000000140000000-0x00000001400CB000-memory.dmpFilesize
812KB
-
memory/3028-137-0x0000000140000000-0x00000001400CB000-memory.dmpFilesize
812KB
-
memory/3028-138-0x0000000140000000-0x00000001400CB000-memory.dmpFilesize
812KB
-
memory/3028-139-0x0000000140000000-0x00000001400CB000-memory.dmpFilesize
812KB
-
memory/3028-140-0x0000000140000000-0x00000001400CB000-memory.dmpFilesize
812KB
-
memory/3028-141-0x0000000140000000-0x00000001400CB000-memory.dmpFilesize
812KB
-
memory/3028-142-0x0000000140000000-0x00000001400CB000-memory.dmpFilesize
812KB
-
memory/3028-143-0x0000000140000000-0x00000001400CB000-memory.dmpFilesize
812KB
-
memory/3028-144-0x0000000140000000-0x00000001400CB000-memory.dmpFilesize
812KB
-
memory/3028-145-0x0000000140000000-0x00000001400CB000-memory.dmpFilesize
812KB
-
memory/3028-146-0x0000000140000000-0x00000001400CB000-memory.dmpFilesize
812KB
-
memory/3028-147-0x0000000140000000-0x00000001400CB000-memory.dmpFilesize
812KB
-
memory/3028-132-0x0000000140000000-0x00000001400CB000-memory.dmpFilesize
812KB
-
memory/3028-149-0x0000000140000000-0x00000001400CB000-memory.dmpFilesize
812KB
-
memory/3028-158-0x00007FFB9C5C4320-0x00007FFB9C5C5320-memory.dmpFilesize
4KB
-
memory/3028-131-0x0000000140000000-0x00000001400CB000-memory.dmpFilesize
812KB
-
memory/3028-130-0x0000000140000000-0x00000001400CB000-memory.dmpFilesize
812KB
-
memory/3028-120-0x0000000000DF0000-0x0000000000DF1000-memory.dmpFilesize
4KB
-
memory/3028-128-0x0000000140000000-0x00000001400CB000-memory.dmpFilesize
812KB
-
memory/3028-127-0x0000000140000000-0x00000001400CB000-memory.dmpFilesize
812KB
-
memory/3028-126-0x0000000140000000-0x00000001400CB000-memory.dmpFilesize
812KB
-
memory/3028-125-0x0000000140000000-0x00000001400CB000-memory.dmpFilesize
812KB
-
memory/3028-124-0x0000000140000000-0x00000001400CB000-memory.dmpFilesize
812KB
-
memory/3028-123-0x0000000140000000-0x00000001400CB000-memory.dmpFilesize
812KB
-
memory/3028-122-0x0000000140000000-0x00000001400CB000-memory.dmpFilesize
812KB
-
memory/3028-121-0x0000000140000000-0x00000001400CB000-memory.dmpFilesize
812KB
-
memory/4016-114-0x0000000140000000-0x00000001400CB000-memory.dmpFilesize
812KB
-
memory/4016-119-0x000002058AB50000-0x000002058AB57000-memory.dmpFilesize
28KB