Analysis
-
max time kernel
153s -
max time network
125s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
26-11-2021 09:27
Static task
static1
Behavioral task
behavioral1
Sample
96de5810e971a8db608ef7932e4fe14a7fd9c48cf630df5b46f75ab9d60cedaf.dll
Resource
win7-en-20211014
General
-
Target
96de5810e971a8db608ef7932e4fe14a7fd9c48cf630df5b46f75ab9d60cedaf.dll
-
Size
1.4MB
-
MD5
310ff2d4c32854b9bdbcc78fbcb58bcc
-
SHA1
b85029ce9032492b65d29e10e8686b17b23eda8b
-
SHA256
96de5810e971a8db608ef7932e4fe14a7fd9c48cf630df5b46f75ab9d60cedaf
-
SHA512
8d755fd88063723b3dffbe35d997b9fffe8768e4d9e631da2175c36944704d11ccdda04211a14bb84f2b86a40a97d15272fcbef1c233d3e13cb9a55d3a199667
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1204-60-0x0000000002C00000-0x0000000002C01000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
FXSCOVER.exewbengine.exewscript.exepid process 1660 FXSCOVER.exe 1812 wbengine.exe 948 wscript.exe -
Loads dropped DLL 8 IoCs
Processes:
FXSCOVER.exewbengine.exewscript.exepid process 1204 1660 FXSCOVER.exe 1204 1812 wbengine.exe 1204 1204 948 wscript.exe 1204 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gpavvclvseucyal = "C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\SystemExtensionsDev\\XngMk\\wbengine.exe" -
Processes:
rundll32.exeFXSCOVER.exewbengine.exewscript.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FXSCOVER.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wbengine.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wscript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exeFXSCOVER.exepid process 672 rundll32.exe 672 rundll32.exe 672 rundll32.exe 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1660 FXSCOVER.exe 1660 FXSCOVER.exe 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 1204 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1204 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1204 wrote to memory of 1692 1204 FXSCOVER.exe PID 1204 wrote to memory of 1692 1204 FXSCOVER.exe PID 1204 wrote to memory of 1692 1204 FXSCOVER.exe PID 1204 wrote to memory of 1660 1204 FXSCOVER.exe PID 1204 wrote to memory of 1660 1204 FXSCOVER.exe PID 1204 wrote to memory of 1660 1204 FXSCOVER.exe PID 1204 wrote to memory of 1008 1204 wbengine.exe PID 1204 wrote to memory of 1008 1204 wbengine.exe PID 1204 wrote to memory of 1008 1204 wbengine.exe PID 1204 wrote to memory of 1812 1204 wbengine.exe PID 1204 wrote to memory of 1812 1204 wbengine.exe PID 1204 wrote to memory of 1812 1204 wbengine.exe PID 1204 wrote to memory of 572 1204 wscript.exe PID 1204 wrote to memory of 572 1204 wscript.exe PID 1204 wrote to memory of 572 1204 wscript.exe PID 1204 wrote to memory of 948 1204 wscript.exe PID 1204 wrote to memory of 948 1204 wscript.exe PID 1204 wrote to memory of 948 1204 wscript.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\96de5810e971a8db608ef7932e4fe14a7fd9c48cf630df5b46f75ab9d60cedaf.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\FXSCOVER.exeC:\Windows\system32\FXSCOVER.exe1⤵
-
C:\Users\Admin\AppData\Local\jKEzP\FXSCOVER.exeC:\Users\Admin\AppData\Local\jKEzP\FXSCOVER.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\wbengine.exeC:\Windows\system32\wbengine.exe1⤵
-
C:\Users\Admin\AppData\Local\TMgLdHn3B\wbengine.exeC:\Users\Admin\AppData\Local\TMgLdHn3B\wbengine.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\wscript.exeC:\Windows\system32\wscript.exe1⤵
-
C:\Users\Admin\AppData\Local\NcOezW\wscript.exeC:\Users\Admin\AppData\Local\NcOezW\wscript.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\NcOezW\VERSION.dllMD5
defa02727d8085d5adf1ed0f11b7491e
SHA134a99f5f9ef6db3e0ffcb4f2e7fa3d118f370776
SHA256d20978c183de8723e85df975ed4e18907e9ed2f1aca694f420303500ecc55b19
SHA512aa9c168cd5390da80876e5a299ee28455c444eda6b3df52b0911e29ca6150e50efbbda180074b0796e1d04a5f75f70e3644f2561d75b782593079a2f3176674f
-
C:\Users\Admin\AppData\Local\NcOezW\wscript.exeMD5
8886e0697b0a93c521f99099ef643450
SHA1851bd390bf559e702b8323062dbeb251d9f2f6f7
SHA256d73f7ee4e6e992a618d02580bdbf4fd6ba7c683d110928001092f4073341e95f
SHA512fc4a176f49a69c5600c427af72d3d274cfeacef48612b18cda966c3b4dda0b9d59c0fe8114d5ed8e0fec780744346e2cd503d1fd15c0c908908d067214b9d837
-
C:\Users\Admin\AppData\Local\TMgLdHn3B\XmlLite.dllMD5
c00cc273a4b010d2e16360acc593f1b9
SHA140ff5d644fd84124a81af3aa32f6380bc090db0e
SHA256d2c0527407f28898259ab66bba55aebba424d37395f7d0f97d7f0b5ad2b538b1
SHA512043f84c14aee7d82387383c87132052ec6e58db7b126787e363aa9da5878657d2ba62cf6d5e6479e5ee32562a7037669594af86ae37c31a61ca9692222a26496
-
C:\Users\Admin\AppData\Local\TMgLdHn3B\wbengine.exeMD5
78f4e7f5c56cb9716238eb57da4b6a75
SHA198b0b9db6ec5961dbb274eff433a8bc21f7e557b
SHA25646a4e78ce5f2a4b26f4e9c3ff04a99d9b727a82ac2e390a82a1611c3f6e0c9af
SHA5121a24ea71624dbbca188ee3b4812e09bc42e7d38ceac02b69940d7693475c792685a23141c8faa85a87ab6aace3f951c1a81facb610d757ac6df37cf2aa65ccd2
-
C:\Users\Admin\AppData\Local\jKEzP\FXSCOVER.exeMD5
5e2c61be8e093dbfe7fc37585be42869
SHA1ed46cda4ece3ef187b0cf29ca843a6c6735af6c0
SHA2563d1719c1caa5d6b0358830a30713c43a9710fbf7bcedca20815be54d24aa9121
SHA51290bf180c8f6e3d0286a19fcd4727f23925a39c90113db979e1b4bbf8f0491471ad26c877a6e2cf49638b14050d952a9ee02a3c1293129843ec6bba01bc325d0b
-
C:\Users\Admin\AppData\Local\jKEzP\MFC42u.dllMD5
831ac710e6ed38d1a1e73a718134e645
SHA1a9ca0fa092a467d54a702d31ac3bd4158ba6cf01
SHA256b4a6fde4e9d32eac29c9a5add1bbb65a27ce70b52e68a8aaac189518fbdb041e
SHA512b095d2cdec2e22dcce0615ae52d9b0725823f197aba6299d3c103bfaec9f2834a0001e981a5d723465d62713b06e592a93136d3cc6cfc7ac873fe6ba547d677c
-
\Users\Admin\AppData\Local\NcOezW\VERSION.dllMD5
defa02727d8085d5adf1ed0f11b7491e
SHA134a99f5f9ef6db3e0ffcb4f2e7fa3d118f370776
SHA256d20978c183de8723e85df975ed4e18907e9ed2f1aca694f420303500ecc55b19
SHA512aa9c168cd5390da80876e5a299ee28455c444eda6b3df52b0911e29ca6150e50efbbda180074b0796e1d04a5f75f70e3644f2561d75b782593079a2f3176674f
-
\Users\Admin\AppData\Local\NcOezW\wscript.exeMD5
8886e0697b0a93c521f99099ef643450
SHA1851bd390bf559e702b8323062dbeb251d9f2f6f7
SHA256d73f7ee4e6e992a618d02580bdbf4fd6ba7c683d110928001092f4073341e95f
SHA512fc4a176f49a69c5600c427af72d3d274cfeacef48612b18cda966c3b4dda0b9d59c0fe8114d5ed8e0fec780744346e2cd503d1fd15c0c908908d067214b9d837
-
\Users\Admin\AppData\Local\NcOezW\wscript.exeMD5
8886e0697b0a93c521f99099ef643450
SHA1851bd390bf559e702b8323062dbeb251d9f2f6f7
SHA256d73f7ee4e6e992a618d02580bdbf4fd6ba7c683d110928001092f4073341e95f
SHA512fc4a176f49a69c5600c427af72d3d274cfeacef48612b18cda966c3b4dda0b9d59c0fe8114d5ed8e0fec780744346e2cd503d1fd15c0c908908d067214b9d837
-
\Users\Admin\AppData\Local\TMgLdHn3B\XmlLite.dllMD5
c00cc273a4b010d2e16360acc593f1b9
SHA140ff5d644fd84124a81af3aa32f6380bc090db0e
SHA256d2c0527407f28898259ab66bba55aebba424d37395f7d0f97d7f0b5ad2b538b1
SHA512043f84c14aee7d82387383c87132052ec6e58db7b126787e363aa9da5878657d2ba62cf6d5e6479e5ee32562a7037669594af86ae37c31a61ca9692222a26496
-
\Users\Admin\AppData\Local\TMgLdHn3B\wbengine.exeMD5
78f4e7f5c56cb9716238eb57da4b6a75
SHA198b0b9db6ec5961dbb274eff433a8bc21f7e557b
SHA25646a4e78ce5f2a4b26f4e9c3ff04a99d9b727a82ac2e390a82a1611c3f6e0c9af
SHA5121a24ea71624dbbca188ee3b4812e09bc42e7d38ceac02b69940d7693475c792685a23141c8faa85a87ab6aace3f951c1a81facb610d757ac6df37cf2aa65ccd2
-
\Users\Admin\AppData\Local\jKEzP\FXSCOVER.exeMD5
5e2c61be8e093dbfe7fc37585be42869
SHA1ed46cda4ece3ef187b0cf29ca843a6c6735af6c0
SHA2563d1719c1caa5d6b0358830a30713c43a9710fbf7bcedca20815be54d24aa9121
SHA51290bf180c8f6e3d0286a19fcd4727f23925a39c90113db979e1b4bbf8f0491471ad26c877a6e2cf49638b14050d952a9ee02a3c1293129843ec6bba01bc325d0b
-
\Users\Admin\AppData\Local\jKEzP\MFC42u.dllMD5
831ac710e6ed38d1a1e73a718134e645
SHA1a9ca0fa092a467d54a702d31ac3bd4158ba6cf01
SHA256b4a6fde4e9d32eac29c9a5add1bbb65a27ce70b52e68a8aaac189518fbdb041e
SHA512b095d2cdec2e22dcce0615ae52d9b0725823f197aba6299d3c103bfaec9f2834a0001e981a5d723465d62713b06e592a93136d3cc6cfc7ac873fe6ba547d677c
-
\Users\Admin\AppData\Roaming\Mozilla\xQC4jL\wscript.exeMD5
8886e0697b0a93c521f99099ef643450
SHA1851bd390bf559e702b8323062dbeb251d9f2f6f7
SHA256d73f7ee4e6e992a618d02580bdbf4fd6ba7c683d110928001092f4073341e95f
SHA512fc4a176f49a69c5600c427af72d3d274cfeacef48612b18cda966c3b4dda0b9d59c0fe8114d5ed8e0fec780744346e2cd503d1fd15c0c908908d067214b9d837
-
memory/672-59-0x0000000000100000-0x0000000000107000-memory.dmpFilesize
28KB
-
memory/672-55-0x000007FEF6A30000-0x000007FEF6B8A000-memory.dmpFilesize
1.4MB
-
memory/948-115-0x0000000000000000-mapping.dmp
-
memory/1204-83-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1204-72-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1204-77-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1204-78-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1204-79-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1204-80-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1204-86-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1204-85-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1204-84-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1204-75-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1204-82-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1204-81-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1204-87-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1204-92-0x0000000077110000-0x0000000077112000-memory.dmpFilesize
8KB
-
memory/1204-74-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1204-60-0x0000000002C00000-0x0000000002C01000-memory.dmpFilesize
4KB
-
memory/1204-73-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1204-76-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1204-71-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1204-68-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1204-67-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1204-66-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1204-69-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1204-65-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1204-70-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1204-61-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1204-62-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1204-64-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1204-63-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1660-100-0x000007FEF6A20000-0x000007FEF6B81000-memory.dmpFilesize
1.4MB
-
memory/1660-99-0x000000013FD21000-0x000000013FD23000-memory.dmpFilesize
8KB
-
memory/1660-98-0x000007FEFB7E1000-0x000007FEFB7E3000-memory.dmpFilesize
8KB
-
memory/1660-94-0x0000000000000000-mapping.dmp
-
memory/1812-109-0x000007FEF6A30000-0x000007FEF6B8B000-memory.dmpFilesize
1.4MB
-
memory/1812-105-0x0000000000000000-mapping.dmp