d6b765e0c278fe4383427e864d9baf366cd2ce7895cf9d038aa29c15174e2caa
d6b765e0c278fe4383427e864d9baf366cd2ce7895cf9d038aa29c15174e2caa.dll
1MB
26-11-2021 09:30
596b0cac5ca82de0f301f5ae4f72ec31
ef280c3f84f2aa68dac81b7c511a55d18035c644
d6b765e0c278fe4383427e864d9baf366cd2ce7895cf9d038aa29c15174e2caa
Filter: none
-
Dridex
Description
Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.
Tags
-
Dridex Shellcode
Description
Detects Dridex Payload shellcode injected in Explorer process.
Tags
Reported IOCs
resource yara_rule behavioral2/memory/2056-124-0x0000000001350000-0x0000000001351000-memory.dmp dridex_stager_shellcode -
Executes dropped EXEwermgr.exeRdpSa.exewextract.exe
Reported IOCs
pid process 2472 wermgr.exe 3820 RdpSa.exe 4024 wextract.exe -
Loads dropped DLLwermgr.exeRdpSa.exewextract.exe
Reported IOCs
pid process 2472 wermgr.exe 3820 RdpSa.exe 4024 wextract.exe -
Adds Run key to start application
Tags
TTPs
Reported IOCs
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ziekmjidk = "C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Extensions\\9A7XKA3eix\\RdpSa.exe" -
Checks whether UAC is enabledrundll32.exewermgr.exeRdpSa.exewextract.exe
Tags
TTPs
Reported IOCs
description ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wermgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RdpSa.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wextract.exe -
Suspicious behavior: EnumeratesProcessesrundll32.exe
Reported IOCs
pid process 3592 rundll32.exe 3592 rundll32.exe 3592 rundll32.exe 3592 rundll32.exe 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 2056 -
Suspicious behavior: GetForegroundWindowSpamrundll32.exewermgr.exeRdpSa.exewextract.exe
Reported IOCs
pid process 3592 rundll32.exe 2056 2472 wermgr.exe 3820 RdpSa.exe 4024 wextract.exe -
Suspicious use of WriteProcessMemory
Reported IOCs
description pid process target process PID 2056 wrote to memory of 2276 2056 wermgr.exe PID 2056 wrote to memory of 2276 2056 wermgr.exe PID 2056 wrote to memory of 2472 2056 wermgr.exe PID 2056 wrote to memory of 2472 2056 wermgr.exe PID 2056 wrote to memory of 424 2056 RdpSa.exe PID 2056 wrote to memory of 424 2056 RdpSa.exe PID 2056 wrote to memory of 3820 2056 RdpSa.exe PID 2056 wrote to memory of 3820 2056 RdpSa.exe PID 2056 wrote to memory of 2204 2056 wextract.exe PID 2056 wrote to memory of 2204 2056 wextract.exe PID 2056 wrote to memory of 4024 2056 wextract.exe PID 2056 wrote to memory of 4024 2056 wextract.exe
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d6b765e0c278fe4383427e864d9baf366cd2ce7895cf9d038aa29c15174e2caa.dll,#1Checks whether UAC is enabledSuspicious behavior: EnumeratesProcessesSuspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe
-
C:\Users\Admin\AppData\Local\rBs9p8Ae\wermgr.exeC:\Users\Admin\AppData\Local\rBs9p8Ae\wermgr.exeExecutes dropped EXELoads dropped DLLChecks whether UAC is enabledSuspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\RdpSa.exeC:\Windows\system32\RdpSa.exe
-
C:\Users\Admin\AppData\Local\Lw0\RdpSa.exeC:\Users\Admin\AppData\Local\Lw0\RdpSa.exeExecutes dropped EXELoads dropped DLLChecks whether UAC is enabledSuspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\wextract.exeC:\Windows\system32\wextract.exe
-
C:\Users\Admin\AppData\Local\uRyvqYs\wextract.exeC:\Users\Admin\AppData\Local\uRyvqYs\wextract.exeExecutes dropped EXELoads dropped DLLChecks whether UAC is enabledSuspicious behavior: GetForegroundWindowSpam
-
C:\Users\Admin\AppData\Local\Lw0\RdpSa.exe
MD5f1c2442f3ec5188998bf290c4cbd562a
SHA173fa6d853a92bfcc7671f82d3ab87ea3133bd9ad
SHA256f6ff99a61cf82ef5889b3dd359a3bb55772439b66c710a9899eb8768c73a0a72
SHA512310315718d7c684916f16754a1bceb9eb334c2dc8cb70634bf253b7b3d2fc8702e6ce7db52da0122a55fe53cadef1a6ec158d0056ebdbc2bcdc4832033e5d3f4
-
C:\Users\Admin\AppData\Local\Lw0\WINSTA.dll
MD5fe826d758f4935250fda52b502759d88
SHA1bf03ae4825c392286892ab323e3c62f259ff98ef
SHA25698e1563768fabee13b409ad2bf045417436c01830ce25428260f035a0ad356eb
SHA5125db5aae4b328f318b885b734466de778c65dd6a07a079a0f969e3bd2686a74500162db5f1f7cb29c423894fe3219c9dca3fe2acfcb3e828bd314590d8e9d0c27
-
C:\Users\Admin\AppData\Local\rBs9p8Ae\wer.dll
MD578be8742b2d9b5701e752e4dd840920f
SHA173868d630bab3438e876db5e4f2fcbe41103febc
SHA256ba73ff3db6a9252b45d0ee6ea0cd7e18589397e1aa7ae5b730b3a68d190fe9fb
SHA5121cdde53f8976554eff3b28239604e659d0e0bd210a37d3bbd5596f954e76a98cbadf843a764b3567eaf4c622a9cfa1509b00814ac2af279b7ba249b2abe53ebb
-
C:\Users\Admin\AppData\Local\rBs9p8Ae\wermgr.exe
MD5b6b07bd48ece5e19f8fbbe3b9d4dee8b
SHA1a9d344ae382ffaf64d7977f632d98a422b4e09fd
SHA256ab6443218f56d9743fa4605a7696c82b016f621ddefcb3207a9aa77666a7bca1
SHA512a0092bb7fca2160e1a9bf6db4399bfde9a15d6a885932e58152b80bfb3fb5f4d67836b1c31c261550bb5cea71f74bd985911daf624ad02f4938db2d23b76fdd4
-
C:\Users\Admin\AppData\Local\uRyvqYs\VERSION.dll
MD549f47433a7bb55cc616e4d8ada296b86
SHA127e5de766876b59b8d715ebc3370062789f4a449
SHA2560b1dd64fbc783ab0d2c9001fcddf8d6411ee37634cdebb9dc9b0a756549f167d
SHA512e18062d25596451a0e5c77b36118ac2fe3676c440f44e75d77c6dd4eb84043b7f2a1ace09267cf119a10aee713639b0488de5bc9a43a2aa8121e44cdb6d792fa
-
C:\Users\Admin\AppData\Local\uRyvqYs\wextract.exe
MD5e78764b49f5806ce029cd547004493c9
SHA18c1f3f989913bebf827a707c04754047507a8cf3
SHA256ab519b1c2711219a9f262b23bf72343eec3c0df4c7ddd135d30d05e700ec302e
SHA51271040e5f0d2d409efaba70a7daaebe7a4675cb19009436a826a679671cc0d7c960498364ec7a29fb163ce8dada65218b75bebb973e6c8b194734e01970fd3a6b
-
\Users\Admin\AppData\Local\Lw0\WINSTA.dll
MD5fe826d758f4935250fda52b502759d88
SHA1bf03ae4825c392286892ab323e3c62f259ff98ef
SHA25698e1563768fabee13b409ad2bf045417436c01830ce25428260f035a0ad356eb
SHA5125db5aae4b328f318b885b734466de778c65dd6a07a079a0f969e3bd2686a74500162db5f1f7cb29c423894fe3219c9dca3fe2acfcb3e828bd314590d8e9d0c27
-
\Users\Admin\AppData\Local\rBs9p8Ae\wer.dll
MD578be8742b2d9b5701e752e4dd840920f
SHA173868d630bab3438e876db5e4f2fcbe41103febc
SHA256ba73ff3db6a9252b45d0ee6ea0cd7e18589397e1aa7ae5b730b3a68d190fe9fb
SHA5121cdde53f8976554eff3b28239604e659d0e0bd210a37d3bbd5596f954e76a98cbadf843a764b3567eaf4c622a9cfa1509b00814ac2af279b7ba249b2abe53ebb
-
\Users\Admin\AppData\Local\uRyvqYs\VERSION.dll
MD549f47433a7bb55cc616e4d8ada296b86
SHA127e5de766876b59b8d715ebc3370062789f4a449
SHA2560b1dd64fbc783ab0d2c9001fcddf8d6411ee37634cdebb9dc9b0a756549f167d
SHA512e18062d25596451a0e5c77b36118ac2fe3676c440f44e75d77c6dd4eb84043b7f2a1ace09267cf119a10aee713639b0488de5bc9a43a2aa8121e44cdb6d792fa
-
memory/2056-132-0x0000000140000000-0x000000014015B000-memory.dmp
-
memory/2056-130-0x0000000140000000-0x000000014015B000-memory.dmp
-
memory/2056-131-0x0000000140000000-0x000000014015B000-memory.dmp
-
memory/2056-128-0x0000000140000000-0x000000014015B000-memory.dmp
-
memory/2056-134-0x0000000140000000-0x000000014015B000-memory.dmp
-
memory/2056-135-0x0000000140000000-0x000000014015B000-memory.dmp
-
memory/2056-136-0x0000000140000000-0x000000014015B000-memory.dmp
-
memory/2056-129-0x0000000140000000-0x000000014015B000-memory.dmp
-
memory/2056-137-0x0000000140000000-0x000000014015B000-memory.dmp
-
memory/2056-138-0x0000000140000000-0x000000014015B000-memory.dmp
-
memory/2056-139-0x0000000140000000-0x000000014015B000-memory.dmp
-
memory/2056-125-0x0000000140000000-0x000000014015B000-memory.dmp
-
memory/2056-141-0x0000000140000000-0x000000014015B000-memory.dmp
-
memory/2056-143-0x0000000140000000-0x000000014015B000-memory.dmp
-
memory/2056-142-0x0000000140000000-0x000000014015B000-memory.dmp
-
memory/2056-149-0x0000000001400000-0x0000000001402000-memory.dmp
-
memory/2056-150-0x0000000001400000-0x0000000001402000-memory.dmp
-
memory/2056-127-0x0000000140000000-0x000000014015B000-memory.dmp
-
memory/2056-152-0x0000000001400000-0x0000000001402000-memory.dmp
-
memory/2056-153-0x00007FFA00F70000-0x00007FFA00F72000-memory.dmp
-
memory/2056-126-0x0000000140000000-0x000000014015B000-memory.dmp
-
memory/2056-124-0x0000000001350000-0x0000000001351000-memory.dmp
-
memory/2056-151-0x00007FFA00E35000-0x00007FFA00E36000-memory.dmp
-
memory/2056-140-0x0000000140000000-0x000000014015B000-memory.dmp
-
memory/2056-133-0x0000000140000000-0x000000014015B000-memory.dmp
-
memory/2472-154-0x0000000000000000-mapping.dmp
-
memory/2472-162-0x000001DDB89C0000-0x000001DDB89C2000-memory.dmp
-
memory/2472-161-0x000001DDB89C0000-0x000001DDB89C2000-memory.dmp
-
memory/2472-163-0x000001DDB89C0000-0x000001DDB89C2000-memory.dmp
-
memory/2472-158-0x0000000140000000-0x000000014015D000-memory.dmp
-
memory/3592-122-0x0000019756D80000-0x0000019756D82000-memory.dmp
-
memory/3592-118-0x0000000140000000-0x000000014015B000-memory.dmp
-
memory/3592-121-0x0000019756D80000-0x0000019756D82000-memory.dmp
-
memory/3592-123-0x0000019756D70000-0x0000019756D77000-memory.dmp
-
memory/3820-171-0x000001C2BD290000-0x000001C2BD292000-memory.dmp
-
memory/3820-164-0x0000000000000000-mapping.dmp
-
memory/3820-173-0x000001C2BD290000-0x000001C2BD292000-memory.dmp
-
memory/3820-172-0x000001C2BD290000-0x000001C2BD292000-memory.dmp
-
memory/4024-174-0x0000000000000000-mapping.dmp
-
memory/4024-178-0x0000000140000000-0x000000014015C000-memory.dmp
-
memory/4024-181-0x000001E961170000-0x000001E961172000-memory.dmp
-
memory/4024-182-0x000001E961170000-0x000001E961172000-memory.dmp
-
memory/4024-183-0x000001E961170000-0x000001E961172000-memory.dmp