Analysis
-
max time kernel
152s -
max time network
119s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
26-11-2021 09:27
Static task
static1
Behavioral task
behavioral1
Sample
1424567126d25f416f5368a61891158af6cd71fcf72a337affedbaa0360db816.dll
Resource
win7-en-20211104
General
-
Target
1424567126d25f416f5368a61891158af6cd71fcf72a337affedbaa0360db816.dll
-
Size
1.4MB
-
MD5
68e9d541c4cd375f03051c96191ba135
-
SHA1
8174c682609623084c550515d95dc25aca40db33
-
SHA256
1424567126d25f416f5368a61891158af6cd71fcf72a337affedbaa0360db816
-
SHA512
1b35f41092842370b49b46066c5e3325f51f24f00f96be2379c1107e1faf9620a3cfdf86d23511ddae9eb2d91e4171835cdc374d697ac4e32fa5d058bca03a86
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1380-59-0x0000000002660000-0x0000000002661000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
SystemPropertiesHardware.exerekeywiz.exewinlogon.exepid process 800 SystemPropertiesHardware.exe 1916 rekeywiz.exe 856 winlogon.exe -
Loads dropped DLL 7 IoCs
Processes:
SystemPropertiesHardware.exerekeywiz.exewinlogon.exepid process 1380 800 SystemPropertiesHardware.exe 1380 1916 rekeywiz.exe 1380 856 winlogon.exe 1380 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Windows\CurrentVersion\Run\Myzdcwow = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\IEDownloadHistory\\gNJYiRokT\\rekeywiz.exe" -
Processes:
SystemPropertiesHardware.exerekeywiz.exewinlogon.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesHardware.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rekeywiz.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlogon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1664 rundll32.exe 1664 rundll32.exe 1664 rundll32.exe 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 1380 -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
Processes:
rundll32.exeSystemPropertiesHardware.exerekeywiz.exewinlogon.exepid process 1664 rundll32.exe 1380 800 SystemPropertiesHardware.exe 1916 rekeywiz.exe 856 winlogon.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1380 wrote to memory of 960 1380 SystemPropertiesHardware.exe PID 1380 wrote to memory of 960 1380 SystemPropertiesHardware.exe PID 1380 wrote to memory of 960 1380 SystemPropertiesHardware.exe PID 1380 wrote to memory of 800 1380 SystemPropertiesHardware.exe PID 1380 wrote to memory of 800 1380 SystemPropertiesHardware.exe PID 1380 wrote to memory of 800 1380 SystemPropertiesHardware.exe PID 1380 wrote to memory of 1788 1380 rekeywiz.exe PID 1380 wrote to memory of 1788 1380 rekeywiz.exe PID 1380 wrote to memory of 1788 1380 rekeywiz.exe PID 1380 wrote to memory of 1916 1380 rekeywiz.exe PID 1380 wrote to memory of 1916 1380 rekeywiz.exe PID 1380 wrote to memory of 1916 1380 rekeywiz.exe PID 1380 wrote to memory of 1164 1380 winlogon.exe PID 1380 wrote to memory of 1164 1380 winlogon.exe PID 1380 wrote to memory of 1164 1380 winlogon.exe PID 1380 wrote to memory of 856 1380 winlogon.exe PID 1380 wrote to memory of 856 1380 winlogon.exe PID 1380 wrote to memory of 856 1380 winlogon.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1424567126d25f416f5368a61891158af6cd71fcf72a337affedbaa0360db816.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:1664
-
C:\Windows\system32\SystemPropertiesHardware.exeC:\Windows\system32\SystemPropertiesHardware.exe1⤵PID:960
-
C:\Users\Admin\AppData\Local\zQGK\SystemPropertiesHardware.exeC:\Users\Admin\AppData\Local\zQGK\SystemPropertiesHardware.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
PID:800
-
C:\Windows\system32\rekeywiz.exeC:\Windows\system32\rekeywiz.exe1⤵PID:1788
-
C:\Users\Admin\AppData\Local\UiRbrXa7\rekeywiz.exeC:\Users\Admin\AppData\Local\UiRbrXa7\rekeywiz.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
PID:1916
-
C:\Windows\system32\winlogon.exeC:\Windows\system32\winlogon.exe1⤵PID:1164
-
C:\Users\Admin\AppData\Local\NFe9tnl\winlogon.exeC:\Users\Admin\AppData\Local\NFe9tnl\winlogon.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
PID:856
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\NFe9tnl\WINSTA.dllMD5
caced8d26e8dfddaaab86be9cb912dbb
SHA1b6323b78d562654104cf21637809d62deeebe0c3
SHA256160af40f1c235a8a783194bf77cfd8152da9df68a913d7c64fe7aa08ed5debc8
SHA512c43868905b8dbbf94ac8d3464fdec0f7c4bb652a9be54e7c75a02f70059a04b20d3a53a62bcd9a712c69a97d3fd32d7817223377ae9992fc6e57d25582043054
-
C:\Users\Admin\AppData\Local\NFe9tnl\winlogon.exeMD5
1151b1baa6f350b1db6598e0fea7c457
SHA1434856b834baf163c5ea4d26434eeae775a507fb
SHA256b1506e0a7e826eff0f5252ef5026070c46e2235438403a9a24d73ee69c0b8a49
SHA512df728d06238da1dece96f8b8d67a2423ed4dcb344b42d5958768d23bd570a79e7189e7c5ba783c1628fe8ddd1deaebeacb1b471c59c8a7c9beb21b4f1eb9edab
-
C:\Users\Admin\AppData\Local\UiRbrXa7\rekeywiz.exeMD5
767c75767b00ccfd41a547bb7b2adfff
SHA191890853a5476def402910e6507417d400c0d3cb
SHA256bd70e504871a2ac1c883d19b87970c8d1b8b251c784bf777ba77ed764f5f2395
SHA512f096043452a1aa213a5e4d62638de3ee4b0b3ad3d12b7ee0372d8c79e00e2e13b4fd0ebc4206bbdb5124bed292dd5b30ef1641288046ef835f89c332985154f9
-
C:\Users\Admin\AppData\Local\UiRbrXa7\slc.dllMD5
d3b2c3a62fcdb3b5cffe945f09257d28
SHA10e86cd9fb8a28d193a027a65da1ef8d2c44d0446
SHA25667c1dc9ff0ff016408dce7a2bdf007af73b4ca1ebfc99cecfd9b93e5586ea86a
SHA512c0c82e1b3a47a0693770af4d2a5b31c916c36f96c38d69035f7c421f35a6cd027fbfaa9f5f0352242979e0152bb8e917d8c48f86d0411e3a86982a725a6decd4
-
C:\Users\Admin\AppData\Local\zQGK\SYSDM.CPLMD5
97f7156522c9682d41c0f7412b0871d8
SHA1ea0366b3837eb571204423e238c484ce0b7fd746
SHA2564e41d1bf2afde3c87e99b0de89b526917ba9256cabe7fe3de0a18f9d4275b4d6
SHA512a027a3784b1339fe7f29e5b7ab0f7d9eaf509d828cb005ff2ceebdcdfe259eb9b0c1e7a296894711360a54fff75a036fffc2170fe958c8b608d961d37f96b40b
-
C:\Users\Admin\AppData\Local\zQGK\SystemPropertiesHardware.exeMD5
c63d722641c417764247f683f9fb43be
SHA1948ec61ebf241c4d80efca3efdfc33fe746e3b98
SHA2564759296b421d60c80db0bb112a30425e04883900374602e13ed97f7c03a49df2
SHA5127223d1c81a4785ed790ec2303d5d9d7ebcae9404d7bf173b3145e51202564de9977e94ac10ab80c6fe49b5f697af3ec70dfd922a891915e8951b5a1b5841c8be
-
\Users\Admin\AppData\Local\NFe9tnl\WINSTA.dllMD5
caced8d26e8dfddaaab86be9cb912dbb
SHA1b6323b78d562654104cf21637809d62deeebe0c3
SHA256160af40f1c235a8a783194bf77cfd8152da9df68a913d7c64fe7aa08ed5debc8
SHA512c43868905b8dbbf94ac8d3464fdec0f7c4bb652a9be54e7c75a02f70059a04b20d3a53a62bcd9a712c69a97d3fd32d7817223377ae9992fc6e57d25582043054
-
\Users\Admin\AppData\Local\NFe9tnl\winlogon.exeMD5
1151b1baa6f350b1db6598e0fea7c457
SHA1434856b834baf163c5ea4d26434eeae775a507fb
SHA256b1506e0a7e826eff0f5252ef5026070c46e2235438403a9a24d73ee69c0b8a49
SHA512df728d06238da1dece96f8b8d67a2423ed4dcb344b42d5958768d23bd570a79e7189e7c5ba783c1628fe8ddd1deaebeacb1b471c59c8a7c9beb21b4f1eb9edab
-
\Users\Admin\AppData\Local\UiRbrXa7\rekeywiz.exeMD5
767c75767b00ccfd41a547bb7b2adfff
SHA191890853a5476def402910e6507417d400c0d3cb
SHA256bd70e504871a2ac1c883d19b87970c8d1b8b251c784bf777ba77ed764f5f2395
SHA512f096043452a1aa213a5e4d62638de3ee4b0b3ad3d12b7ee0372d8c79e00e2e13b4fd0ebc4206bbdb5124bed292dd5b30ef1641288046ef835f89c332985154f9
-
\Users\Admin\AppData\Local\UiRbrXa7\slc.dllMD5
d3b2c3a62fcdb3b5cffe945f09257d28
SHA10e86cd9fb8a28d193a027a65da1ef8d2c44d0446
SHA25667c1dc9ff0ff016408dce7a2bdf007af73b4ca1ebfc99cecfd9b93e5586ea86a
SHA512c0c82e1b3a47a0693770af4d2a5b31c916c36f96c38d69035f7c421f35a6cd027fbfaa9f5f0352242979e0152bb8e917d8c48f86d0411e3a86982a725a6decd4
-
\Users\Admin\AppData\Local\zQGK\SYSDM.CPLMD5
97f7156522c9682d41c0f7412b0871d8
SHA1ea0366b3837eb571204423e238c484ce0b7fd746
SHA2564e41d1bf2afde3c87e99b0de89b526917ba9256cabe7fe3de0a18f9d4275b4d6
SHA512a027a3784b1339fe7f29e5b7ab0f7d9eaf509d828cb005ff2ceebdcdfe259eb9b0c1e7a296894711360a54fff75a036fffc2170fe958c8b608d961d37f96b40b
-
\Users\Admin\AppData\Local\zQGK\SystemPropertiesHardware.exeMD5
c63d722641c417764247f683f9fb43be
SHA1948ec61ebf241c4d80efca3efdfc33fe746e3b98
SHA2564759296b421d60c80db0bb112a30425e04883900374602e13ed97f7c03a49df2
SHA5127223d1c81a4785ed790ec2303d5d9d7ebcae9404d7bf173b3145e51202564de9977e94ac10ab80c6fe49b5f697af3ec70dfd922a891915e8951b5a1b5841c8be
-
\Users\Admin\AppData\Roaming\Adobe\Flash Player\AssetCache\V2KDBBRB\pCpTbgEYZF\winlogon.exeMD5
1151b1baa6f350b1db6598e0fea7c457
SHA1434856b834baf163c5ea4d26434eeae775a507fb
SHA256b1506e0a7e826eff0f5252ef5026070c46e2235438403a9a24d73ee69c0b8a49
SHA512df728d06238da1dece96f8b8d67a2423ed4dcb344b42d5958768d23bd570a79e7189e7c5ba783c1628fe8ddd1deaebeacb1b471c59c8a7c9beb21b4f1eb9edab
-
memory/800-89-0x0000000140000000-0x0000000140162000-memory.dmpFilesize
1.4MB
-
memory/800-85-0x0000000000000000-mapping.dmp
-
memory/856-102-0x0000000000000000-mapping.dmp
-
memory/856-106-0x0000000140000000-0x0000000140163000-memory.dmpFilesize
1.4MB
-
memory/1380-73-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1380-70-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1380-61-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1380-60-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1380-83-0x0000000077A70000-0x0000000077A72000-memory.dmpFilesize
8KB
-
memory/1380-64-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1380-65-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1380-66-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1380-68-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1380-69-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1380-71-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1380-62-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1380-59-0x0000000002660000-0x0000000002661000-memory.dmpFilesize
4KB
-
memory/1380-63-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1380-67-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1380-74-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1380-75-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1380-76-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1380-77-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1380-72-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1664-55-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1664-58-0x0000000000100000-0x0000000000107000-memory.dmpFilesize
28KB
-
memory/1916-95-0x000007FEFC141000-0x000007FEFC143000-memory.dmpFilesize
8KB
-
memory/1916-93-0x0000000000000000-mapping.dmp