Analysis
-
max time kernel
155s -
max time network
126s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
26-11-2021 09:27
Static task
static1
Behavioral task
behavioral1
Sample
d6b765e0c278fe4383427e864d9baf366cd2ce7895cf9d038aa29c15174e2caa.dll
Resource
win7-en-20211104
General
-
Target
d6b765e0c278fe4383427e864d9baf366cd2ce7895cf9d038aa29c15174e2caa.dll
-
Size
1.4MB
-
MD5
596b0cac5ca82de0f301f5ae4f72ec31
-
SHA1
ef280c3f84f2aa68dac81b7c511a55d18035c644
-
SHA256
d6b765e0c278fe4383427e864d9baf366cd2ce7895cf9d038aa29c15174e2caa
-
SHA512
344a058bd165805bb442eb0ccd07a61349c0283a32ec502447c32a408dc17cf0a303422ffe3fb535fa80716584a8735eaca57adb67faf44ba52b966a007f6bcb
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2056-124-0x0000000001350000-0x0000000001351000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
wermgr.exeRdpSa.exewextract.exepid process 2472 wermgr.exe 3820 RdpSa.exe 4024 wextract.exe -
Loads dropped DLL 3 IoCs
Processes:
wermgr.exeRdpSa.exewextract.exepid process 2472 wermgr.exe 3820 RdpSa.exe 4024 wextract.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ziekmjidk = "C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Extensions\\9A7XKA3eix\\RdpSa.exe" -
Processes:
rundll32.exewermgr.exeRdpSa.exewextract.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wermgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RdpSa.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wextract.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 3592 rundll32.exe 3592 rundll32.exe 3592 rundll32.exe 3592 rundll32.exe 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
Processes:
rundll32.exewermgr.exeRdpSa.exewextract.exepid process 3592 rundll32.exe 2056 2472 wermgr.exe 3820 RdpSa.exe 4024 wextract.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 2056 wrote to memory of 2276 2056 wermgr.exe PID 2056 wrote to memory of 2276 2056 wermgr.exe PID 2056 wrote to memory of 2472 2056 wermgr.exe PID 2056 wrote to memory of 2472 2056 wermgr.exe PID 2056 wrote to memory of 424 2056 RdpSa.exe PID 2056 wrote to memory of 424 2056 RdpSa.exe PID 2056 wrote to memory of 3820 2056 RdpSa.exe PID 2056 wrote to memory of 3820 2056 RdpSa.exe PID 2056 wrote to memory of 2204 2056 wextract.exe PID 2056 wrote to memory of 2204 2056 wextract.exe PID 2056 wrote to memory of 4024 2056 wextract.exe PID 2056 wrote to memory of 4024 2056 wextract.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d6b765e0c278fe4383427e864d9baf366cd2ce7895cf9d038aa29c15174e2caa.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe1⤵
-
C:\Users\Admin\AppData\Local\rBs9p8Ae\wermgr.exeC:\Users\Admin\AppData\Local\rBs9p8Ae\wermgr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\RdpSa.exeC:\Windows\system32\RdpSa.exe1⤵
-
C:\Users\Admin\AppData\Local\Lw0\RdpSa.exeC:\Users\Admin\AppData\Local\Lw0\RdpSa.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\wextract.exeC:\Windows\system32\wextract.exe1⤵
-
C:\Users\Admin\AppData\Local\uRyvqYs\wextract.exeC:\Users\Admin\AppData\Local\uRyvqYs\wextract.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Lw0\RdpSa.exeMD5
f1c2442f3ec5188998bf290c4cbd562a
SHA173fa6d853a92bfcc7671f82d3ab87ea3133bd9ad
SHA256f6ff99a61cf82ef5889b3dd359a3bb55772439b66c710a9899eb8768c73a0a72
SHA512310315718d7c684916f16754a1bceb9eb334c2dc8cb70634bf253b7b3d2fc8702e6ce7db52da0122a55fe53cadef1a6ec158d0056ebdbc2bcdc4832033e5d3f4
-
C:\Users\Admin\AppData\Local\Lw0\WINSTA.dllMD5
fe826d758f4935250fda52b502759d88
SHA1bf03ae4825c392286892ab323e3c62f259ff98ef
SHA25698e1563768fabee13b409ad2bf045417436c01830ce25428260f035a0ad356eb
SHA5125db5aae4b328f318b885b734466de778c65dd6a07a079a0f969e3bd2686a74500162db5f1f7cb29c423894fe3219c9dca3fe2acfcb3e828bd314590d8e9d0c27
-
C:\Users\Admin\AppData\Local\rBs9p8Ae\wer.dllMD5
78be8742b2d9b5701e752e4dd840920f
SHA173868d630bab3438e876db5e4f2fcbe41103febc
SHA256ba73ff3db6a9252b45d0ee6ea0cd7e18589397e1aa7ae5b730b3a68d190fe9fb
SHA5121cdde53f8976554eff3b28239604e659d0e0bd210a37d3bbd5596f954e76a98cbadf843a764b3567eaf4c622a9cfa1509b00814ac2af279b7ba249b2abe53ebb
-
C:\Users\Admin\AppData\Local\rBs9p8Ae\wermgr.exeMD5
b6b07bd48ece5e19f8fbbe3b9d4dee8b
SHA1a9d344ae382ffaf64d7977f632d98a422b4e09fd
SHA256ab6443218f56d9743fa4605a7696c82b016f621ddefcb3207a9aa77666a7bca1
SHA512a0092bb7fca2160e1a9bf6db4399bfde9a15d6a885932e58152b80bfb3fb5f4d67836b1c31c261550bb5cea71f74bd985911daf624ad02f4938db2d23b76fdd4
-
C:\Users\Admin\AppData\Local\uRyvqYs\VERSION.dllMD5
49f47433a7bb55cc616e4d8ada296b86
SHA127e5de766876b59b8d715ebc3370062789f4a449
SHA2560b1dd64fbc783ab0d2c9001fcddf8d6411ee37634cdebb9dc9b0a756549f167d
SHA512e18062d25596451a0e5c77b36118ac2fe3676c440f44e75d77c6dd4eb84043b7f2a1ace09267cf119a10aee713639b0488de5bc9a43a2aa8121e44cdb6d792fa
-
C:\Users\Admin\AppData\Local\uRyvqYs\wextract.exeMD5
e78764b49f5806ce029cd547004493c9
SHA18c1f3f989913bebf827a707c04754047507a8cf3
SHA256ab519b1c2711219a9f262b23bf72343eec3c0df4c7ddd135d30d05e700ec302e
SHA51271040e5f0d2d409efaba70a7daaebe7a4675cb19009436a826a679671cc0d7c960498364ec7a29fb163ce8dada65218b75bebb973e6c8b194734e01970fd3a6b
-
\Users\Admin\AppData\Local\Lw0\WINSTA.dllMD5
fe826d758f4935250fda52b502759d88
SHA1bf03ae4825c392286892ab323e3c62f259ff98ef
SHA25698e1563768fabee13b409ad2bf045417436c01830ce25428260f035a0ad356eb
SHA5125db5aae4b328f318b885b734466de778c65dd6a07a079a0f969e3bd2686a74500162db5f1f7cb29c423894fe3219c9dca3fe2acfcb3e828bd314590d8e9d0c27
-
\Users\Admin\AppData\Local\rBs9p8Ae\wer.dllMD5
78be8742b2d9b5701e752e4dd840920f
SHA173868d630bab3438e876db5e4f2fcbe41103febc
SHA256ba73ff3db6a9252b45d0ee6ea0cd7e18589397e1aa7ae5b730b3a68d190fe9fb
SHA5121cdde53f8976554eff3b28239604e659d0e0bd210a37d3bbd5596f954e76a98cbadf843a764b3567eaf4c622a9cfa1509b00814ac2af279b7ba249b2abe53ebb
-
\Users\Admin\AppData\Local\uRyvqYs\VERSION.dllMD5
49f47433a7bb55cc616e4d8ada296b86
SHA127e5de766876b59b8d715ebc3370062789f4a449
SHA2560b1dd64fbc783ab0d2c9001fcddf8d6411ee37634cdebb9dc9b0a756549f167d
SHA512e18062d25596451a0e5c77b36118ac2fe3676c440f44e75d77c6dd4eb84043b7f2a1ace09267cf119a10aee713639b0488de5bc9a43a2aa8121e44cdb6d792fa
-
memory/2056-134-0x0000000140000000-0x000000014015B000-memory.dmpFilesize
1.4MB
-
memory/2056-128-0x0000000140000000-0x000000014015B000-memory.dmpFilesize
1.4MB
-
memory/2056-131-0x0000000140000000-0x000000014015B000-memory.dmpFilesize
1.4MB
-
memory/2056-133-0x0000000140000000-0x000000014015B000-memory.dmpFilesize
1.4MB
-
memory/2056-124-0x0000000001350000-0x0000000001351000-memory.dmpFilesize
4KB
-
memory/2056-135-0x0000000140000000-0x000000014015B000-memory.dmpFilesize
1.4MB
-
memory/2056-136-0x0000000140000000-0x000000014015B000-memory.dmpFilesize
1.4MB
-
memory/2056-132-0x0000000140000000-0x000000014015B000-memory.dmpFilesize
1.4MB
-
memory/2056-137-0x0000000140000000-0x000000014015B000-memory.dmpFilesize
1.4MB
-
memory/2056-138-0x0000000140000000-0x000000014015B000-memory.dmpFilesize
1.4MB
-
memory/2056-139-0x0000000140000000-0x000000014015B000-memory.dmpFilesize
1.4MB
-
memory/2056-140-0x0000000140000000-0x000000014015B000-memory.dmpFilesize
1.4MB
-
memory/2056-141-0x0000000140000000-0x000000014015B000-memory.dmpFilesize
1.4MB
-
memory/2056-143-0x0000000140000000-0x000000014015B000-memory.dmpFilesize
1.4MB
-
memory/2056-142-0x0000000140000000-0x000000014015B000-memory.dmpFilesize
1.4MB
-
memory/2056-149-0x0000000001400000-0x0000000001402000-memory.dmpFilesize
8KB
-
memory/2056-150-0x0000000001400000-0x0000000001402000-memory.dmpFilesize
8KB
-
memory/2056-151-0x00007FFA00E35000-0x00007FFA00E36000-memory.dmpFilesize
4KB
-
memory/2056-152-0x0000000001400000-0x0000000001402000-memory.dmpFilesize
8KB
-
memory/2056-153-0x00007FFA00F70000-0x00007FFA00F72000-memory.dmpFilesize
8KB
-
memory/2056-126-0x0000000140000000-0x000000014015B000-memory.dmpFilesize
1.4MB
-
memory/2056-130-0x0000000140000000-0x000000014015B000-memory.dmpFilesize
1.4MB
-
memory/2056-129-0x0000000140000000-0x000000014015B000-memory.dmpFilesize
1.4MB
-
memory/2056-125-0x0000000140000000-0x000000014015B000-memory.dmpFilesize
1.4MB
-
memory/2056-127-0x0000000140000000-0x000000014015B000-memory.dmpFilesize
1.4MB
-
memory/2472-154-0x0000000000000000-mapping.dmp
-
memory/2472-161-0x000001DDB89C0000-0x000001DDB89C2000-memory.dmpFilesize
8KB
-
memory/2472-163-0x000001DDB89C0000-0x000001DDB89C2000-memory.dmpFilesize
8KB
-
memory/2472-162-0x000001DDB89C0000-0x000001DDB89C2000-memory.dmpFilesize
8KB
-
memory/2472-158-0x0000000140000000-0x000000014015D000-memory.dmpFilesize
1.4MB
-
memory/3592-122-0x0000019756D80000-0x0000019756D82000-memory.dmpFilesize
8KB
-
memory/3592-118-0x0000000140000000-0x000000014015B000-memory.dmpFilesize
1.4MB
-
memory/3592-123-0x0000019756D70000-0x0000019756D77000-memory.dmpFilesize
28KB
-
memory/3592-121-0x0000019756D80000-0x0000019756D82000-memory.dmpFilesize
8KB
-
memory/3820-171-0x000001C2BD290000-0x000001C2BD292000-memory.dmpFilesize
8KB
-
memory/3820-172-0x000001C2BD290000-0x000001C2BD292000-memory.dmpFilesize
8KB
-
memory/3820-173-0x000001C2BD290000-0x000001C2BD292000-memory.dmpFilesize
8KB
-
memory/3820-164-0x0000000000000000-mapping.dmp
-
memory/4024-174-0x0000000000000000-mapping.dmp
-
memory/4024-178-0x0000000140000000-0x000000014015C000-memory.dmpFilesize
1.4MB
-
memory/4024-181-0x000001E961170000-0x000001E961172000-memory.dmpFilesize
8KB
-
memory/4024-182-0x000001E961170000-0x000001E961172000-memory.dmpFilesize
8KB
-
memory/4024-183-0x000001E961170000-0x000001E961172000-memory.dmpFilesize
8KB