Analysis
-
max time kernel
158s -
max time network
127s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
26-11-2021 09:26
Static task
static1
Behavioral task
behavioral1
Sample
c876113220b534ba1da612f3ca0eb30a735548a20e6b70b5bf547bc7ce3e1794.dll
Resource
win7-en-20211014
General
-
Target
c876113220b534ba1da612f3ca0eb30a735548a20e6b70b5bf547bc7ce3e1794.dll
-
Size
1.5MB
-
MD5
9b7b23ecfe0f8461fd0d9a7e5e590e31
-
SHA1
616a00949db4ce3fb3e13ddfda0f288ad39d2877
-
SHA256
c876113220b534ba1da612f3ca0eb30a735548a20e6b70b5bf547bc7ce3e1794
-
SHA512
1f715cf068481951a697caa17ed94ddf3afec21186de5674d4d138a2ae8635e8f5879053fca0ec99bf33169737d8298146f000702a900487a8c5f45d5bc53875
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1368-59-0x00000000029B0000-0x00000000029B1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
psr.exeMpSigStub.exeBitLockerWizard.exepid process 276 psr.exe 1068 MpSigStub.exe 1920 BitLockerWizard.exe -
Loads dropped DLL 7 IoCs
Processes:
psr.exeMpSigStub.exeBitLockerWizard.exepid process 1368 276 psr.exe 1368 1068 MpSigStub.exe 1368 1920 BitLockerWizard.exe 1368 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gpavvclvseucyal = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Themes\\8Sfau\\MpSigStub.exe" -
Processes:
rundll32.exepsr.exeMpSigStub.exeBitLockerWizard.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA psr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MpSigStub.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizard.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 608 rundll32.exe 608 rundll32.exe 608 rundll32.exe 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
Processes:
rundll32.exepsr.exeMpSigStub.exeBitLockerWizard.exepid process 608 rundll32.exe 1368 276 psr.exe 1068 MpSigStub.exe 1920 BitLockerWizard.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1368 wrote to memory of 1972 1368 psr.exe PID 1368 wrote to memory of 1972 1368 psr.exe PID 1368 wrote to memory of 1972 1368 psr.exe PID 1368 wrote to memory of 276 1368 psr.exe PID 1368 wrote to memory of 276 1368 psr.exe PID 1368 wrote to memory of 276 1368 psr.exe PID 1368 wrote to memory of 1528 1368 MpSigStub.exe PID 1368 wrote to memory of 1528 1368 MpSigStub.exe PID 1368 wrote to memory of 1528 1368 MpSigStub.exe PID 1368 wrote to memory of 1068 1368 MpSigStub.exe PID 1368 wrote to memory of 1068 1368 MpSigStub.exe PID 1368 wrote to memory of 1068 1368 MpSigStub.exe PID 1368 wrote to memory of 296 1368 BitLockerWizard.exe PID 1368 wrote to memory of 296 1368 BitLockerWizard.exe PID 1368 wrote to memory of 296 1368 BitLockerWizard.exe PID 1368 wrote to memory of 1920 1368 BitLockerWizard.exe PID 1368 wrote to memory of 1920 1368 BitLockerWizard.exe PID 1368 wrote to memory of 1920 1368 BitLockerWizard.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c876113220b534ba1da612f3ca0eb30a735548a20e6b70b5bf547bc7ce3e1794.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:608
-
C:\Windows\system32\psr.exeC:\Windows\system32\psr.exe1⤵PID:1972
-
C:\Users\Admin\AppData\Local\0tayHRLNz\psr.exeC:\Users\Admin\AppData\Local\0tayHRLNz\psr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
PID:276
-
C:\Windows\system32\MpSigStub.exeC:\Windows\system32\MpSigStub.exe1⤵PID:1528
-
C:\Users\Admin\AppData\Local\LRe5e\MpSigStub.exeC:\Users\Admin\AppData\Local\LRe5e\MpSigStub.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
PID:1068
-
C:\Windows\system32\BitLockerWizard.exeC:\Windows\system32\BitLockerWizard.exe1⤵PID:296
-
C:\Users\Admin\AppData\Local\dyIuG\BitLockerWizard.exeC:\Users\Admin\AppData\Local\dyIuG\BitLockerWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
PID:1920
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d90670502a3acb3e443a66815ed12d51
SHA1558d26b3df593fb4349b7e080b54d41991d9a4ab
SHA256d7f7ca3bc349ecb5fc4a25ea8cf73a15144113d0fbe53ab214d040a802be2341
SHA512a5d6c307eb6e00237d754f1c3e11760029965d521c0ee193e5d7753c7dfd8b8e856d8659f6dbab5b093b4008a9e100a56bb3edaacb397ec2791e954b48bb0cd5
-
MD5
a80527109d75cba125d940b007eea151
SHA1facf32a9ede6abfaa09368bfdfcfec8554107272
SHA25668910f8aae867e938b6a3b76cdf176898ba275d9ade85b4ce00b03232de4c495
SHA51277b86a597c33af8d3fbd9711f4abe6e0ca33b86279b1d28a25dcf3545a34b221be1ad7d11004d016203809cead1ebfd4b7e889ee9df2efc100eabf77963c1774
-
MD5
2e6bd16aa62e5e95c7b256b10d637f8f
SHA1350be084477b1fe581af83ca79eb58d4defe260f
SHA256d795968b8067bb610033fa4a5b21eb2f96cef61513aba62912b8eb5c6a5ff7b3
SHA5121f37150f6bcbe0df54bb85a5ad585824cea9332baa9be1649a95c1dfb41723de85c09d98fb2ca8261a49c2184d3bda638b84b2b7b60b97fe42a15ab1620a2542
-
MD5
2129503c0514a0ffa0820885851de2dd
SHA16e202d58579f4f79941aa93a3e30aab05c298b7f
SHA256eddce2e401484a82cba45b4bb145bea169c46cba3e731e68ba36b87a309c60bf
SHA512e7866d72e3c93b54cb6c4e5379bf36c02633ccf65d466e083d15f6ffea463e593a5fb9cc92bda47e54f38c6c88c2845837e646792bb3c5e76c13b3079085f4df
-
MD5
08a761595ad21d152db2417d6fdb239a
SHA1d84c1bc2e8c9afce9fb79916df9bca169f93a936
SHA256ec0b9e5f29a43f9db44fa76b85701058f26776ab974044c1d4741591b74d0620
SHA5128b07828e9c0edf09277f89294b8e1a54816f6f3d1fe132b3eb70370b81feb82d056ec31566793bd6f451725f79c3b4aeedb15a83216115e00943e0c19cab37c9
-
MD5
ab02968a50c4c1dc2d9b3028fae95f70
SHA143fe7fcdc7f43bd281ada87faba4c866aceaa953
SHA25676cdec78a482f7dd0d44e7e92c0e0398ad75001fc3d044d06e90502242b3177c
SHA51217d7d0015113fe84eb127a1434309cbd6745a51ae64b631ed6088434c931669c872dd05a778aaf58d6104adfc8604c1ee4e1dfedda82c5b3c05ee16e0d075c06
-
MD5
d90670502a3acb3e443a66815ed12d51
SHA1558d26b3df593fb4349b7e080b54d41991d9a4ab
SHA256d7f7ca3bc349ecb5fc4a25ea8cf73a15144113d0fbe53ab214d040a802be2341
SHA512a5d6c307eb6e00237d754f1c3e11760029965d521c0ee193e5d7753c7dfd8b8e856d8659f6dbab5b093b4008a9e100a56bb3edaacb397ec2791e954b48bb0cd5
-
MD5
a80527109d75cba125d940b007eea151
SHA1facf32a9ede6abfaa09368bfdfcfec8554107272
SHA25668910f8aae867e938b6a3b76cdf176898ba275d9ade85b4ce00b03232de4c495
SHA51277b86a597c33af8d3fbd9711f4abe6e0ca33b86279b1d28a25dcf3545a34b221be1ad7d11004d016203809cead1ebfd4b7e889ee9df2efc100eabf77963c1774
-
MD5
2e6bd16aa62e5e95c7b256b10d637f8f
SHA1350be084477b1fe581af83ca79eb58d4defe260f
SHA256d795968b8067bb610033fa4a5b21eb2f96cef61513aba62912b8eb5c6a5ff7b3
SHA5121f37150f6bcbe0df54bb85a5ad585824cea9332baa9be1649a95c1dfb41723de85c09d98fb2ca8261a49c2184d3bda638b84b2b7b60b97fe42a15ab1620a2542
-
MD5
2129503c0514a0ffa0820885851de2dd
SHA16e202d58579f4f79941aa93a3e30aab05c298b7f
SHA256eddce2e401484a82cba45b4bb145bea169c46cba3e731e68ba36b87a309c60bf
SHA512e7866d72e3c93b54cb6c4e5379bf36c02633ccf65d466e083d15f6ffea463e593a5fb9cc92bda47e54f38c6c88c2845837e646792bb3c5e76c13b3079085f4df
-
MD5
08a761595ad21d152db2417d6fdb239a
SHA1d84c1bc2e8c9afce9fb79916df9bca169f93a936
SHA256ec0b9e5f29a43f9db44fa76b85701058f26776ab974044c1d4741591b74d0620
SHA5128b07828e9c0edf09277f89294b8e1a54816f6f3d1fe132b3eb70370b81feb82d056ec31566793bd6f451725f79c3b4aeedb15a83216115e00943e0c19cab37c9
-
MD5
ab02968a50c4c1dc2d9b3028fae95f70
SHA143fe7fcdc7f43bd281ada87faba4c866aceaa953
SHA25676cdec78a482f7dd0d44e7e92c0e0398ad75001fc3d044d06e90502242b3177c
SHA51217d7d0015113fe84eb127a1434309cbd6745a51ae64b631ed6088434c931669c872dd05a778aaf58d6104adfc8604c1ee4e1dfedda82c5b3c05ee16e0d075c06
-
MD5
08a761595ad21d152db2417d6fdb239a
SHA1d84c1bc2e8c9afce9fb79916df9bca169f93a936
SHA256ec0b9e5f29a43f9db44fa76b85701058f26776ab974044c1d4741591b74d0620
SHA5128b07828e9c0edf09277f89294b8e1a54816f6f3d1fe132b3eb70370b81feb82d056ec31566793bd6f451725f79c3b4aeedb15a83216115e00943e0c19cab37c9