Analysis
-
max time kernel
150s -
max time network
26s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
30-09-2021 11:34
Static task
static1
Behavioral task
behavioral1
Sample
336e73eb69d5ae01d129710c15d6aaf8165fdf588080b7ae9044a610765a359b.dll
Resource
win7-en-20210920
General
-
Target
336e73eb69d5ae01d129710c15d6aaf8165fdf588080b7ae9044a610765a359b.dll
-
Size
804KB
-
MD5
9c43c369c752cd67072cf89eccbe29cd
-
SHA1
47505b5142506ac934d3960d4d9c638565bf885f
-
SHA256
336e73eb69d5ae01d129710c15d6aaf8165fdf588080b7ae9044a610765a359b
-
SHA512
20694328a13e0debfaebda9c21393458c6a37b4d475aea0183a2099b752050209c3ddd5081f521a09b8c06aa8b39a453a1771dac2d84b0d0d3919d4a278e733e
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1432-53-0x0000000140000000-0x00000001400C9000-memory.dmp dridex_payload behavioral1/memory/1612-97-0x0000000140000000-0x00000001400CA000-memory.dmp dridex_payload -
Processes:
resource yara_rule behavioral1/memory/1204-56-0x0000000002930000-0x0000000002931000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
shrpubw.exeSndVol.exelpksetup.exepid process 1612 shrpubw.exe 908 SndVol.exe 1808 lpksetup.exe -
Loads dropped DLL 7 IoCs
Processes:
shrpubw.exeSndVol.exelpksetup.exepid process 1204 1612 shrpubw.exe 1204 908 SndVol.exe 1204 1808 lpksetup.exe 1204 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3456797065-1076791440-4146276586-1000\Software\Microsoft\Windows\CurrentVersion\Run\Wbbdywj = "C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Extensions\\vT9DYQY\\SndVol.exe" -
Processes:
shrpubw.exeSndVol.exelpksetup.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA shrpubw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SndVol.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA lpksetup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1432 rundll32.exe 1432 rundll32.exe 1432 rundll32.exe 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1204 -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
pid process 1204 1204 1204 1204 -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
pid process 1204 1204 1204 1204 1204 1204 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1204 wrote to memory of 1604 1204 shrpubw.exe PID 1204 wrote to memory of 1604 1204 shrpubw.exe PID 1204 wrote to memory of 1604 1204 shrpubw.exe PID 1204 wrote to memory of 1612 1204 shrpubw.exe PID 1204 wrote to memory of 1612 1204 shrpubw.exe PID 1204 wrote to memory of 1612 1204 shrpubw.exe PID 1204 wrote to memory of 700 1204 SndVol.exe PID 1204 wrote to memory of 700 1204 SndVol.exe PID 1204 wrote to memory of 700 1204 SndVol.exe PID 1204 wrote to memory of 908 1204 SndVol.exe PID 1204 wrote to memory of 908 1204 SndVol.exe PID 1204 wrote to memory of 908 1204 SndVol.exe PID 1204 wrote to memory of 1936 1204 lpksetup.exe PID 1204 wrote to memory of 1936 1204 lpksetup.exe PID 1204 wrote to memory of 1936 1204 lpksetup.exe PID 1204 wrote to memory of 1808 1204 lpksetup.exe PID 1204 wrote to memory of 1808 1204 lpksetup.exe PID 1204 wrote to memory of 1808 1204 lpksetup.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\336e73eb69d5ae01d129710c15d6aaf8165fdf588080b7ae9044a610765a359b.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\shrpubw.exeC:\Windows\system32\shrpubw.exe1⤵
-
C:\Users\Admin\AppData\Local\u0uNGykmi\shrpubw.exeC:\Users\Admin\AppData\Local\u0uNGykmi\shrpubw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\SndVol.exeC:\Windows\system32\SndVol.exe1⤵
-
C:\Users\Admin\AppData\Local\V9U\SndVol.exeC:\Users\Admin\AppData\Local\V9U\SndVol.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\lpksetup.exeC:\Windows\system32\lpksetup.exe1⤵
-
C:\Users\Admin\AppData\Local\acLIpl4\lpksetup.exeC:\Users\Admin\AppData\Local\acLIpl4\lpksetup.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\V9U\SndVol.exeMD5
c3489639ec8e181044f6c6bfd3d01ac9
SHA1e057c90b675a6da19596b0ac458c25d7440b7869
SHA256a632ef1a1490d31d76f13997ee56f4f75796bf9e366c76446857e9ae855f4103
SHA51263b96c8afb8c3f5f969459531d3a543f6e8714d5ca1664c6bbb01edd9f5e850856931d7923f363c9dc7d8843deeaad69722d15993641d04e786e02184446c0c9
-
C:\Users\Admin\AppData\Local\V9U\dwmapi.dllMD5
8c15bb798db9217be6606202c28bc077
SHA1a874510fe178f0cb7030cc57166b011661b9591b
SHA2565639a0000806d200653a6644af3748da256b5d4137edd85d2b4e193874a395c7
SHA512f0a3287838c8c055610fe0f78a3f221debd9d385a4c0b00ec456432c59554c0d41d595a0b85b4ca6365a2a3f3b2fc4d21ad9cc77048a9ff91cd97fa6fc74e45d
-
C:\Users\Admin\AppData\Local\acLIpl4\dpx.dllMD5
f1dbfc9865c6c453caafc2dfc90341bd
SHA1c5109caeebd861588197173396b7fba9b4027d9a
SHA2564a4fb03743f23fd993229223621bfd47502da1cee0354dc6acec5e1918af377f
SHA512cce65efe4cbffd918a74f26e10238b258df4bcc06e1708e308e625b5ab2aa444eaf689c92576a548d896085acc14a7845a35ee886aa6e53f38941ea320fef306
-
C:\Users\Admin\AppData\Local\acLIpl4\lpksetup.exeMD5
50d28f3f8b7c17056520c80a29efe17c
SHA11b1e62be0a0bdc9aec2e91842c35381297d8f01e
SHA25671613ea48467d1a0b00f8bcaed270b7527fc5771f540a8eb0515b3a5fdc8604f
SHA51292bc60402aacf1a62e47335adf8696a5c0d31637e624628d82b6ec1f17e1ee65ae8edf7e8dcd10933f59c892a4a74d8e461945df0991b706a4a53927c5fd3861
-
C:\Users\Admin\AppData\Local\u0uNGykmi\ACLUI.dllMD5
6985b2297304dca747055fa73caface1
SHA106b5d26d877a021d67ca7a489e27b6b63f3c17b8
SHA256fcd0c3323a7a3ec33dfbddc6f57181318bdfccbb3cdbca55f100d7e29df4310f
SHA512a2278549a2e1dbd794b0ab328cdd932a9cbe38eeb0dead6da3a242c016d05f3cb94e5cc2774fbf67ca8c979590b6ddaaeaac904c510d2ac84572ffe7031114fb
-
C:\Users\Admin\AppData\Local\u0uNGykmi\shrpubw.exeMD5
29e6d0016611c8f948db5ea71372f76c
SHA101d007a01020370709cd6580717f9ace049647e8
SHA25653c868882ebc9e0d4f703afeccb172043069ccc0b5b6f7cac1d2aad9c4640930
SHA512300216ab47ee44b8f68d4835bf26641f949039522b680af00fb602f57d31c38812428dc624461bc2cc7d6384cad396bc033718e41e11a65f7dd0eeb36ed924e4
-
\Users\Admin\AppData\Local\V9U\SndVol.exeMD5
c3489639ec8e181044f6c6bfd3d01ac9
SHA1e057c90b675a6da19596b0ac458c25d7440b7869
SHA256a632ef1a1490d31d76f13997ee56f4f75796bf9e366c76446857e9ae855f4103
SHA51263b96c8afb8c3f5f969459531d3a543f6e8714d5ca1664c6bbb01edd9f5e850856931d7923f363c9dc7d8843deeaad69722d15993641d04e786e02184446c0c9
-
\Users\Admin\AppData\Local\V9U\dwmapi.dllMD5
8c15bb798db9217be6606202c28bc077
SHA1a874510fe178f0cb7030cc57166b011661b9591b
SHA2565639a0000806d200653a6644af3748da256b5d4137edd85d2b4e193874a395c7
SHA512f0a3287838c8c055610fe0f78a3f221debd9d385a4c0b00ec456432c59554c0d41d595a0b85b4ca6365a2a3f3b2fc4d21ad9cc77048a9ff91cd97fa6fc74e45d
-
\Users\Admin\AppData\Local\acLIpl4\dpx.dllMD5
f1dbfc9865c6c453caafc2dfc90341bd
SHA1c5109caeebd861588197173396b7fba9b4027d9a
SHA2564a4fb03743f23fd993229223621bfd47502da1cee0354dc6acec5e1918af377f
SHA512cce65efe4cbffd918a74f26e10238b258df4bcc06e1708e308e625b5ab2aa444eaf689c92576a548d896085acc14a7845a35ee886aa6e53f38941ea320fef306
-
\Users\Admin\AppData\Local\acLIpl4\lpksetup.exeMD5
50d28f3f8b7c17056520c80a29efe17c
SHA11b1e62be0a0bdc9aec2e91842c35381297d8f01e
SHA25671613ea48467d1a0b00f8bcaed270b7527fc5771f540a8eb0515b3a5fdc8604f
SHA51292bc60402aacf1a62e47335adf8696a5c0d31637e624628d82b6ec1f17e1ee65ae8edf7e8dcd10933f59c892a4a74d8e461945df0991b706a4a53927c5fd3861
-
\Users\Admin\AppData\Local\u0uNGykmi\ACLUI.dllMD5
6985b2297304dca747055fa73caface1
SHA106b5d26d877a021d67ca7a489e27b6b63f3c17b8
SHA256fcd0c3323a7a3ec33dfbddc6f57181318bdfccbb3cdbca55f100d7e29df4310f
SHA512a2278549a2e1dbd794b0ab328cdd932a9cbe38eeb0dead6da3a242c016d05f3cb94e5cc2774fbf67ca8c979590b6ddaaeaac904c510d2ac84572ffe7031114fb
-
\Users\Admin\AppData\Local\u0uNGykmi\shrpubw.exeMD5
29e6d0016611c8f948db5ea71372f76c
SHA101d007a01020370709cd6580717f9ace049647e8
SHA25653c868882ebc9e0d4f703afeccb172043069ccc0b5b6f7cac1d2aad9c4640930
SHA512300216ab47ee44b8f68d4835bf26641f949039522b680af00fb602f57d31c38812428dc624461bc2cc7d6384cad396bc033718e41e11a65f7dd0eeb36ed924e4
-
\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\Oodhnm\lpksetup.exeMD5
50d28f3f8b7c17056520c80a29efe17c
SHA11b1e62be0a0bdc9aec2e91842c35381297d8f01e
SHA25671613ea48467d1a0b00f8bcaed270b7527fc5771f540a8eb0515b3a5fdc8604f
SHA51292bc60402aacf1a62e47335adf8696a5c0d31637e624628d82b6ec1f17e1ee65ae8edf7e8dcd10933f59c892a4a74d8e461945df0991b706a4a53927c5fd3861
-
memory/908-100-0x0000000000000000-mapping.dmp
-
memory/1204-66-0x0000000140000000-0x00000001400C9000-memory.dmpFilesize
804KB
-
memory/1204-82-0x0000000140000000-0x00000001400C9000-memory.dmpFilesize
804KB
-
memory/1204-70-0x0000000140000000-0x00000001400C9000-memory.dmpFilesize
804KB
-
memory/1204-71-0x0000000140000000-0x00000001400C9000-memory.dmpFilesize
804KB
-
memory/1204-72-0x0000000140000000-0x00000001400C9000-memory.dmpFilesize
804KB
-
memory/1204-73-0x0000000140000000-0x00000001400C9000-memory.dmpFilesize
804KB
-
memory/1204-80-0x0000000140000000-0x00000001400C9000-memory.dmpFilesize
804KB
-
memory/1204-81-0x0000000140000000-0x00000001400C9000-memory.dmpFilesize
804KB
-
memory/1204-79-0x0000000140000000-0x00000001400C9000-memory.dmpFilesize
804KB
-
memory/1204-78-0x0000000140000000-0x00000001400C9000-memory.dmpFilesize
804KB
-
memory/1204-77-0x0000000140000000-0x00000001400C9000-memory.dmpFilesize
804KB
-
memory/1204-76-0x0000000140000000-0x00000001400C9000-memory.dmpFilesize
804KB
-
memory/1204-75-0x0000000140000000-0x00000001400C9000-memory.dmpFilesize
804KB
-
memory/1204-74-0x0000000140000000-0x00000001400C9000-memory.dmpFilesize
804KB
-
memory/1204-85-0x0000000140000000-0x00000001400C9000-memory.dmpFilesize
804KB
-
memory/1204-84-0x0000000140000000-0x00000001400C9000-memory.dmpFilesize
804KB
-
memory/1204-83-0x0000000140000000-0x00000001400C9000-memory.dmpFilesize
804KB
-
memory/1204-69-0x0000000140000000-0x00000001400C9000-memory.dmpFilesize
804KB
-
memory/1204-68-0x0000000140000000-0x00000001400C9000-memory.dmpFilesize
804KB
-
memory/1204-56-0x0000000002930000-0x0000000002931000-memory.dmpFilesize
4KB
-
memory/1204-67-0x0000000140000000-0x00000001400C9000-memory.dmpFilesize
804KB
-
memory/1204-57-0x0000000140000000-0x00000001400C9000-memory.dmpFilesize
804KB
-
memory/1204-58-0x0000000140000000-0x00000001400C9000-memory.dmpFilesize
804KB
-
memory/1204-65-0x0000000140000000-0x00000001400C9000-memory.dmpFilesize
804KB
-
memory/1204-59-0x0000000140000000-0x00000001400C9000-memory.dmpFilesize
804KB
-
memory/1204-64-0x0000000140000000-0x00000001400C9000-memory.dmpFilesize
804KB
-
memory/1204-63-0x0000000140000000-0x00000001400C9000-memory.dmpFilesize
804KB
-
memory/1204-62-0x0000000140000000-0x00000001400C9000-memory.dmpFilesize
804KB
-
memory/1204-60-0x0000000140000000-0x00000001400C9000-memory.dmpFilesize
804KB
-
memory/1204-61-0x0000000140000000-0x00000001400C9000-memory.dmpFilesize
804KB
-
memory/1432-53-0x0000000140000000-0x00000001400C9000-memory.dmpFilesize
804KB
-
memory/1432-55-0x0000000000100000-0x0000000000107000-memory.dmpFilesize
28KB
-
memory/1612-97-0x0000000140000000-0x00000001400CA000-memory.dmpFilesize
808KB
-
memory/1612-94-0x000007FEFBFD1000-0x000007FEFBFD3000-memory.dmpFilesize
8KB
-
memory/1612-92-0x0000000000000000-mapping.dmp
-
memory/1808-108-0x0000000000000000-mapping.dmp