Analysis
-
max time kernel
151s -
max time network
128s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
26-11-2021 09:27
Static task
static1
Behavioral task
behavioral1
Sample
96de5810e971a8db608ef7932e4fe14a7fd9c48cf630df5b46f75ab9d60cedaf.dll
Resource
win7-en-20211014
General
-
Target
96de5810e971a8db608ef7932e4fe14a7fd9c48cf630df5b46f75ab9d60cedaf.dll
-
Size
1.4MB
-
MD5
310ff2d4c32854b9bdbcc78fbcb58bcc
-
SHA1
b85029ce9032492b65d29e10e8686b17b23eda8b
-
SHA256
96de5810e971a8db608ef7932e4fe14a7fd9c48cf630df5b46f75ab9d60cedaf
-
SHA512
8d755fd88063723b3dffbe35d997b9fffe8768e4d9e631da2175c36944704d11ccdda04211a14bb84f2b86a40a97d15272fcbef1c233d3e13cb9a55d3a199667
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3032-125-0x00000000009B0000-0x00000000009B1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
SystemPropertiesComputerName.exeslui.exeMDMAppInstaller.exepid process 4328 SystemPropertiesComputerName.exe 4416 slui.exe 1000 MDMAppInstaller.exe -
Loads dropped DLL 3 IoCs
Processes:
SystemPropertiesComputerName.exeslui.exeMDMAppInstaller.exepid process 4328 SystemPropertiesComputerName.exe 4416 slui.exe 1000 MDMAppInstaller.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ziekmjidk = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Libraries\\GOeTX504Xs6\\slui.exe" -
Processes:
slui.exeMDMAppInstaller.exerundll32.exeSystemPropertiesComputerName.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA slui.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA MDMAppInstaller.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesComputerName.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exeSystemPropertiesComputerName.exepid process 3652 rundll32.exe 3652 rundll32.exe 3652 rundll32.exe 3652 rundll32.exe 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 4328 SystemPropertiesComputerName.exe 4328 SystemPropertiesComputerName.exe 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 3032 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3032 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3032 wrote to memory of 4340 3032 SystemPropertiesComputerName.exe PID 3032 wrote to memory of 4340 3032 SystemPropertiesComputerName.exe PID 3032 wrote to memory of 4328 3032 SystemPropertiesComputerName.exe PID 3032 wrote to memory of 4328 3032 SystemPropertiesComputerName.exe PID 3032 wrote to memory of 4432 3032 slui.exe PID 3032 wrote to memory of 4432 3032 slui.exe PID 3032 wrote to memory of 4416 3032 slui.exe PID 3032 wrote to memory of 4416 3032 slui.exe PID 3032 wrote to memory of 4588 3032 MDMAppInstaller.exe PID 3032 wrote to memory of 4588 3032 MDMAppInstaller.exe PID 3032 wrote to memory of 1000 3032 MDMAppInstaller.exe PID 3032 wrote to memory of 1000 3032 MDMAppInstaller.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\96de5810e971a8db608ef7932e4fe14a7fd9c48cf630df5b46f75ab9d60cedaf.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\SystemPropertiesComputerName.exeC:\Windows\system32\SystemPropertiesComputerName.exe1⤵
-
C:\Users\Admin\AppData\Local\IPEf\SystemPropertiesComputerName.exeC:\Users\Admin\AppData\Local\IPEf\SystemPropertiesComputerName.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\slui.exeC:\Windows\system32\slui.exe1⤵
-
C:\Users\Admin\AppData\Local\JaQf\slui.exeC:\Users\Admin\AppData\Local\JaQf\slui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\MDMAppInstaller.exeC:\Windows\system32\MDMAppInstaller.exe1⤵
-
C:\Users\Admin\AppData\Local\15TTOLu2\MDMAppInstaller.exeC:\Users\Admin\AppData\Local\15TTOLu2\MDMAppInstaller.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\15TTOLu2\MDMAppInstaller.exeMD5
4dd62f5c80e61f360e4178e64bdd9eb2
SHA10bb999e6fcf480e135f0c2f548beac45bf8388f9
SHA2569487e1da940889f7144de063e6999d1a76a1b93be195ea4f9d32be765e5eba99
SHA512a3bb8133a23680f44e06f7b8c3bcb3630103cde12e21cae3a1292633ffc51cc07f1a220774b85fc8021424e668f2518c6b8ddc0df3a5e4dd10d21e16c7a7091e
-
C:\Users\Admin\AppData\Local\15TTOLu2\WTSAPI32.dllMD5
fc4642335a6a936b110afb92d7ba54b9
SHA1aa16b747e20c3404e894c293e891134f42b8550b
SHA256ea79e4c66f847a63108e42439b9a86bad76175187fccb612b9684fa35757268d
SHA5120d2124721e220deb0a1d8db011dd5c7e8c7aa13f98eee2fef53b22fe2a2500b669b38ef5997b2af2d3b9e09568c5115ef02ec5ce46f595ec473e0ba6f7072730
-
C:\Users\Admin\AppData\Local\IPEf\SYSDM.CPLMD5
574ec9b0901f4cabddb2e5dd64b884e7
SHA1e3b7c2d9c517fcb7816880b8796e7e8a3695001c
SHA25670fe97f531d442563706e09cf0b2366999eef05ec6c2e5f8d585088040a7c3f4
SHA5124d3da4ed224be0de7516261aecb9d64c163dd2fe529f1936948fdd4ef1047ddf908d933c8a20e99c929bc68230c0e8ad291258cad28ceeea93f18706b5274df3
-
C:\Users\Admin\AppData\Local\IPEf\SystemPropertiesComputerName.exeMD5
d2d62d055f517f71b0fd9a649727ff6c
SHA143f627215d57e0396ad74e9b0ed4bd29f60fca33
SHA256222d3d4f7c8f64beb0a0007120b4411c2040c50e1d376420228151bdd230fe7d
SHA512f46e02a465425a148fcd4be5fda0889c412eeab4c50abf9874b3ee02af83c96403167c99aa57961e1c631a5a7a5070e8a1c363688581ff83ed176b4206564cd0
-
C:\Users\Admin\AppData\Local\JaQf\WTSAPI32.dllMD5
fb5c3c493d5bd6910a2ff6afb00dd734
SHA1c7118fd687ada564f8ff1dacd11108f4eed35a88
SHA2567264e66339cb54175057b21969c01974297f394c18d20f1dd218e9d1c8dd38f7
SHA512c5687802cfa0337c640238d0c99a004793e7df7902a54c7c4544083237371e0d77333b881db20591fcaf0a5cfb3e43eb97106a315d3a2aeebba275640d4058b4
-
C:\Users\Admin\AppData\Local\JaQf\slui.exeMD5
f162f859fb38a39f83c049f5480c11eb
SHA14090dacb56dbff6a5306e13ff5fa157eca4714a9
SHA25667daef4a468f00305a44e41b369890fc0d6ed41c509432c6b1402caa1b09b7c5
SHA51273a7ba851b560caf0a4150ff192c02bcac5475de2f265430e079ce1a20dc25b0f86873bc1dc4db0fc660031aa7c32d03a941ada8afc0bc91c63fb2e9ed8e0d80
-
\Users\Admin\AppData\Local\15TTOLu2\WTSAPI32.dllMD5
fc4642335a6a936b110afb92d7ba54b9
SHA1aa16b747e20c3404e894c293e891134f42b8550b
SHA256ea79e4c66f847a63108e42439b9a86bad76175187fccb612b9684fa35757268d
SHA5120d2124721e220deb0a1d8db011dd5c7e8c7aa13f98eee2fef53b22fe2a2500b669b38ef5997b2af2d3b9e09568c5115ef02ec5ce46f595ec473e0ba6f7072730
-
\Users\Admin\AppData\Local\IPEf\SYSDM.CPLMD5
574ec9b0901f4cabddb2e5dd64b884e7
SHA1e3b7c2d9c517fcb7816880b8796e7e8a3695001c
SHA25670fe97f531d442563706e09cf0b2366999eef05ec6c2e5f8d585088040a7c3f4
SHA5124d3da4ed224be0de7516261aecb9d64c163dd2fe529f1936948fdd4ef1047ddf908d933c8a20e99c929bc68230c0e8ad291258cad28ceeea93f18706b5274df3
-
\Users\Admin\AppData\Local\JaQf\WTSAPI32.dllMD5
fb5c3c493d5bd6910a2ff6afb00dd734
SHA1c7118fd687ada564f8ff1dacd11108f4eed35a88
SHA2567264e66339cb54175057b21969c01974297f394c18d20f1dd218e9d1c8dd38f7
SHA512c5687802cfa0337c640238d0c99a004793e7df7902a54c7c4544083237371e0d77333b881db20591fcaf0a5cfb3e43eb97106a315d3a2aeebba275640d4058b4
-
memory/1000-184-0x0000000000000000-mapping.dmp
-
memory/1000-188-0x00007FFAA75F0000-0x00007FFAA774B000-memory.dmpFilesize
1.4MB
-
memory/1000-192-0x000001E1E6A50000-0x000001E1E6A52000-memory.dmpFilesize
8KB
-
memory/1000-193-0x000001E1E6A50000-0x000001E1E6A52000-memory.dmpFilesize
8KB
-
memory/1000-194-0x000001E1E6A50000-0x000001E1E6A52000-memory.dmpFilesize
8KB
-
memory/3032-151-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/3032-135-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/3032-137-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/3032-138-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/3032-139-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/3032-140-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/3032-141-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/3032-142-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/3032-143-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/3032-144-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/3032-145-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/3032-146-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/3032-147-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/3032-148-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/3032-149-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/3032-150-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/3032-125-0x00000000009B0000-0x00000000009B1000-memory.dmpFilesize
4KB
-
memory/3032-152-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/3032-157-0x00000000009E0000-0x00000000009E2000-memory.dmpFilesize
8KB
-
memory/3032-158-0x00000000009E0000-0x00000000009E2000-memory.dmpFilesize
8KB
-
memory/3032-159-0x00007FFABC125000-0x00007FFABC126000-memory.dmpFilesize
4KB
-
memory/3032-160-0x00000000009E0000-0x00000000009E2000-memory.dmpFilesize
8KB
-
memory/3032-161-0x00007FFABC260000-0x00007FFABC262000-memory.dmpFilesize
8KB
-
memory/3032-136-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/3032-133-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/3032-127-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/3032-134-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/3032-126-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/3032-128-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/3032-129-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/3032-130-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/3032-131-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/3032-132-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/3652-118-0x00007FFAAE310000-0x00007FFAAE46A000-memory.dmpFilesize
1.4MB
-
memory/3652-122-0x000002C81C190000-0x000002C81C192000-memory.dmpFilesize
8KB
-
memory/3652-123-0x000002C81C190000-0x000002C81C192000-memory.dmpFilesize
8KB
-
memory/3652-124-0x000002C81C180000-0x000002C81C187000-memory.dmpFilesize
28KB
-
memory/4328-171-0x0000029026F30000-0x0000029026F32000-memory.dmpFilesize
8KB
-
memory/4328-172-0x0000029026F30000-0x0000029026F32000-memory.dmpFilesize
8KB
-
memory/4328-166-0x00007FFAAE310000-0x00007FFAAE46B000-memory.dmpFilesize
1.4MB
-
memory/4328-162-0x0000000000000000-mapping.dmp
-
memory/4328-170-0x0000029026F30000-0x0000029026F32000-memory.dmpFilesize
8KB
-
memory/4416-173-0x0000000000000000-mapping.dmp
-
memory/4416-182-0x0000016EFD5F0000-0x0000016EFD5F2000-memory.dmpFilesize
8KB
-
memory/4416-183-0x0000016EFD5F0000-0x0000016EFD5F2000-memory.dmpFilesize
8KB
-
memory/4416-181-0x0000016EFD5F0000-0x0000016EFD5F2000-memory.dmpFilesize
8KB