Analysis
-
max time kernel
152s -
max time network
124s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
26-11-2021 09:27
Static task
static1
Behavioral task
behavioral1
Sample
28cdb76bf1b90ef6b5e8ef101b419f5cb02b74bd3bfd2a4ca348b8402b0d2425.dll
Resource
win7-en-20211014
General
-
Target
28cdb76bf1b90ef6b5e8ef101b419f5cb02b74bd3bfd2a4ca348b8402b0d2425.dll
-
Size
1.4MB
-
MD5
94ea5ec1d6e2773e4b1ac030ea8fb7f7
-
SHA1
e5b45a82aaba3716c3d62997052a874b586c0fe5
-
SHA256
28cdb76bf1b90ef6b5e8ef101b419f5cb02b74bd3bfd2a4ca348b8402b0d2425
-
SHA512
1bc71c9f32855356a94a9f85defd08814b26db562227e3286e39863d2f55856087777408a56de7ce98946edd4f8454ef954231aac12225ae6fb58da75d392352
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1400-59-0x0000000002570000-0x0000000002571000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
OptionalFeatures.exewextract.exedvdupgrd.exepid process 1476 OptionalFeatures.exe 916 wextract.exe 1720 dvdupgrd.exe -
Loads dropped DLL 7 IoCs
Processes:
OptionalFeatures.exewextract.exedvdupgrd.exepid process 1400 1476 OptionalFeatures.exe 1400 916 wextract.exe 1400 1720 dvdupgrd.exe 1400 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gpavvclvseucyal = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\UserData\\Low\\WZn6j\\wextract.exe" -
Processes:
rundll32.exeOptionalFeatures.exewextract.exedvdupgrd.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA OptionalFeatures.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wextract.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dvdupgrd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1772 rundll32.exe 1772 rundll32.exe 1772 rundll32.exe 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 1400 -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
Processes:
rundll32.exeOptionalFeatures.exewextract.exedvdupgrd.exepid process 1772 rundll32.exe 1400 1476 OptionalFeatures.exe 916 wextract.exe 1720 dvdupgrd.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1400 wrote to memory of 1060 1400 OptionalFeatures.exe PID 1400 wrote to memory of 1060 1400 OptionalFeatures.exe PID 1400 wrote to memory of 1060 1400 OptionalFeatures.exe PID 1400 wrote to memory of 1476 1400 OptionalFeatures.exe PID 1400 wrote to memory of 1476 1400 OptionalFeatures.exe PID 1400 wrote to memory of 1476 1400 OptionalFeatures.exe PID 1400 wrote to memory of 1524 1400 wextract.exe PID 1400 wrote to memory of 1524 1400 wextract.exe PID 1400 wrote to memory of 1524 1400 wextract.exe PID 1400 wrote to memory of 916 1400 wextract.exe PID 1400 wrote to memory of 916 1400 wextract.exe PID 1400 wrote to memory of 916 1400 wextract.exe PID 1400 wrote to memory of 1852 1400 dvdupgrd.exe PID 1400 wrote to memory of 1852 1400 dvdupgrd.exe PID 1400 wrote to memory of 1852 1400 dvdupgrd.exe PID 1400 wrote to memory of 1720 1400 dvdupgrd.exe PID 1400 wrote to memory of 1720 1400 dvdupgrd.exe PID 1400 wrote to memory of 1720 1400 dvdupgrd.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\28cdb76bf1b90ef6b5e8ef101b419f5cb02b74bd3bfd2a4ca348b8402b0d2425.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\OptionalFeatures.exeC:\Windows\system32\OptionalFeatures.exe1⤵
-
C:\Users\Admin\AppData\Local\tWXLj\OptionalFeatures.exeC:\Users\Admin\AppData\Local\tWXLj\OptionalFeatures.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\wextract.exeC:\Windows\system32\wextract.exe1⤵
-
C:\Users\Admin\AppData\Local\5E8a6R4Ro\wextract.exeC:\Users\Admin\AppData\Local\5E8a6R4Ro\wextract.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\dvdupgrd.exeC:\Windows\system32\dvdupgrd.exe1⤵
-
C:\Users\Admin\AppData\Local\Gh4\dvdupgrd.exeC:\Users\Admin\AppData\Local\Gh4\dvdupgrd.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\5E8a6R4Ro\VERSION.dllMD5
5005b57b17b425eba9363e08d49fa6c7
SHA109a2d12f2ecfb7be2ec50db2518a15a5b4d166a3
SHA256fb6d3c7df67da482807ddf40ce4a7c3e2a94eff5a2cabe154a007719f42f01c1
SHA512d37456b38b5c2f0b09432294945d46edbae56b1a495cfdd2543af86fc8bf3302404e91cbd9c30c3164a5f4a67d2c35fcee6ff2e060d4a4a8d9874c567ce3b79c
-
C:\Users\Admin\AppData\Local\5E8a6R4Ro\wextract.exeMD5
1ea6500c25a80e8bdb65099c509af993
SHA16a090ef561feb4ae1c6794de5b19c5e893c4aafc
SHA25699123d4e7bf93aa7f3315a432307c8b0cbaf24ad2cfb46edc149edbe24de4ca2
SHA512b8f9f1ab48671e382d1385c34f0f19fc52fc0061e00db53bbbc2cdaee6d8a3f245707329f98e9167c53721aeaddcebfe66632729b6bcc98892031fd9914fb1fb
-
C:\Users\Admin\AppData\Local\Gh4\VERSION.dllMD5
01256c95df98e2f0110ef7c0348e4ccf
SHA10ecfce7b972291f9a995b9af374ef29500d88c15
SHA2569e9b2761154d2d9a7f9b83f2f8a4ea55fdb26600ef299ff5fdd32b9be204764b
SHA512b71e18249494ea9daaf3071562c8bc28f94698c763d3fd7e39696583edcb872204b5b47220eb1c07f1fd0de68b878ad7058de248b792900c95550ae04b5030c0
-
C:\Users\Admin\AppData\Local\Gh4\dvdupgrd.exeMD5
75a9b4172eac01d9648c6d2133af952f
SHA163c7e1af762d2b584e9cc841e8b0100f2a482b81
SHA25618f9f520c7157023b0e7dfe7433a63c4dedd47b04d24aac4038b795893050736
SHA5125a7a2c7f184efd9c84256a1a0a5e7aeb95432d63a567196be54e7a9437a5ada9b922983c5fc0cafb16eab4493665d8e56e2f646f9f6a2d6179986925ffcdf769
-
C:\Users\Admin\AppData\Local\tWXLj\OptionalFeatures.exeMD5
eae7af6084667c8f05412ddf096167fc
SHA10dbe8aba001447030e48e8ad5466fd23481e6140
SHA25601feebd3aca961f31ba4eac45347b105d1c5772627b08f5538047721b61ff9bc
SHA512172a8accaa35a6c9f86713a330c5899dfeeffe3b43413a3d276fc16d45cd62ed9237aa6bff29cc60a2022fba8dcc156959723c041df4b7463436a3bdabef2a9d
-
C:\Users\Admin\AppData\Local\tWXLj\appwiz.cplMD5
350b1e51fc7b009fbf90d80b514730af
SHA1466ac506c1e4415c66b40720d09cd119836df90f
SHA25649139b7bcbb804d0357c804254fe3f191babe70bc57e3d72673f20faf0e7d1b1
SHA5123ba47f72885c218d0e23a476a4ac8946c2b4fa6ca75d38fbb6800840bcb000b4ed15961d55d362b3f47f2ab567b39ef8db1e12a423d5973909baa7911ed70b33
-
\Users\Admin\AppData\Local\5E8a6R4Ro\VERSION.dllMD5
5005b57b17b425eba9363e08d49fa6c7
SHA109a2d12f2ecfb7be2ec50db2518a15a5b4d166a3
SHA256fb6d3c7df67da482807ddf40ce4a7c3e2a94eff5a2cabe154a007719f42f01c1
SHA512d37456b38b5c2f0b09432294945d46edbae56b1a495cfdd2543af86fc8bf3302404e91cbd9c30c3164a5f4a67d2c35fcee6ff2e060d4a4a8d9874c567ce3b79c
-
\Users\Admin\AppData\Local\5E8a6R4Ro\wextract.exeMD5
1ea6500c25a80e8bdb65099c509af993
SHA16a090ef561feb4ae1c6794de5b19c5e893c4aafc
SHA25699123d4e7bf93aa7f3315a432307c8b0cbaf24ad2cfb46edc149edbe24de4ca2
SHA512b8f9f1ab48671e382d1385c34f0f19fc52fc0061e00db53bbbc2cdaee6d8a3f245707329f98e9167c53721aeaddcebfe66632729b6bcc98892031fd9914fb1fb
-
\Users\Admin\AppData\Local\Gh4\VERSION.dllMD5
01256c95df98e2f0110ef7c0348e4ccf
SHA10ecfce7b972291f9a995b9af374ef29500d88c15
SHA2569e9b2761154d2d9a7f9b83f2f8a4ea55fdb26600ef299ff5fdd32b9be204764b
SHA512b71e18249494ea9daaf3071562c8bc28f94698c763d3fd7e39696583edcb872204b5b47220eb1c07f1fd0de68b878ad7058de248b792900c95550ae04b5030c0
-
\Users\Admin\AppData\Local\Gh4\dvdupgrd.exeMD5
75a9b4172eac01d9648c6d2133af952f
SHA163c7e1af762d2b584e9cc841e8b0100f2a482b81
SHA25618f9f520c7157023b0e7dfe7433a63c4dedd47b04d24aac4038b795893050736
SHA5125a7a2c7f184efd9c84256a1a0a5e7aeb95432d63a567196be54e7a9437a5ada9b922983c5fc0cafb16eab4493665d8e56e2f646f9f6a2d6179986925ffcdf769
-
\Users\Admin\AppData\Local\tWXLj\OptionalFeatures.exeMD5
eae7af6084667c8f05412ddf096167fc
SHA10dbe8aba001447030e48e8ad5466fd23481e6140
SHA25601feebd3aca961f31ba4eac45347b105d1c5772627b08f5538047721b61ff9bc
SHA512172a8accaa35a6c9f86713a330c5899dfeeffe3b43413a3d276fc16d45cd62ed9237aa6bff29cc60a2022fba8dcc156959723c041df4b7463436a3bdabef2a9d
-
\Users\Admin\AppData\Local\tWXLj\appwiz.cplMD5
350b1e51fc7b009fbf90d80b514730af
SHA1466ac506c1e4415c66b40720d09cd119836df90f
SHA25649139b7bcbb804d0357c804254fe3f191babe70bc57e3d72673f20faf0e7d1b1
SHA5123ba47f72885c218d0e23a476a4ac8946c2b4fa6ca75d38fbb6800840bcb000b4ed15961d55d362b3f47f2ab567b39ef8db1e12a423d5973909baa7911ed70b33
-
\Users\Admin\AppData\Roaming\Adobe\Acrobat\YGrckTV\dvdupgrd.exeMD5
75a9b4172eac01d9648c6d2133af952f
SHA163c7e1af762d2b584e9cc841e8b0100f2a482b81
SHA25618f9f520c7157023b0e7dfe7433a63c4dedd47b04d24aac4038b795893050736
SHA5125a7a2c7f184efd9c84256a1a0a5e7aeb95432d63a567196be54e7a9437a5ada9b922983c5fc0cafb16eab4493665d8e56e2f646f9f6a2d6179986925ffcdf769
-
memory/916-100-0x000007FEFBF81000-0x000007FEFBF83000-memory.dmpFilesize
8KB
-
memory/916-98-0x0000000000000000-mapping.dmp
-
memory/1400-68-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1400-70-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1400-74-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1400-75-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1400-76-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1400-77-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1400-78-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1400-79-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1400-80-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1400-81-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1400-82-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1400-88-0x0000000077710000-0x0000000077712000-memory.dmpFilesize
8KB
-
memory/1400-72-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1400-59-0x0000000002570000-0x0000000002571000-memory.dmpFilesize
4KB
-
memory/1400-71-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1400-73-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1400-69-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1400-60-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1400-61-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1400-67-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1400-66-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1400-65-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1400-64-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1400-63-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1400-62-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1476-94-0x0000000140000000-0x0000000140162000-memory.dmpFilesize
1.4MB
-
memory/1476-90-0x0000000000000000-mapping.dmp
-
memory/1720-107-0x0000000000000000-mapping.dmp
-
memory/1772-55-0x0000000140000000-0x0000000140161000-memory.dmpFilesize
1.4MB
-
memory/1772-58-0x0000000000190000-0x0000000000197000-memory.dmpFilesize
28KB