Analysis
-
max time kernel
153s -
max time network
117s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
26-11-2021 09:27
Static task
static1
Behavioral task
behavioral1
Sample
7818fc1e2f9e7df1ba5688ddc87f54b59b3e12c3d2c60393b50f9b56447ac2ab.dll
Resource
win7-en-20211014
General
-
Target
7818fc1e2f9e7df1ba5688ddc87f54b59b3e12c3d2c60393b50f9b56447ac2ab.dll
-
Size
1.4MB
-
MD5
915d143eb22a1278b9d2d56abe7d6fef
-
SHA1
32cb17ebd3a9da188a833c7f66f8018a3ad06b00
-
SHA256
7818fc1e2f9e7df1ba5688ddc87f54b59b3e12c3d2c60393b50f9b56447ac2ab
-
SHA512
0c468fafedb26675d8c3d0dfaa30262f498b8c56b9d91f71e42b893e8e50aa5d05628cececb29285f773b4189edab83e659f8b3f736d8d3ab2aa8c48d7881d4e
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1276-59-0x0000000002A90000-0x0000000002A91000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
rdpclip.exeSystemPropertiesAdvanced.exesigverif.exepid process 1692 rdpclip.exe 1832 SystemPropertiesAdvanced.exe 920 sigverif.exe -
Loads dropped DLL 7 IoCs
Processes:
rdpclip.exeSystemPropertiesAdvanced.exesigverif.exepid process 1276 1692 rdpclip.exe 1276 1832 SystemPropertiesAdvanced.exe 1276 920 sigverif.exe 1276 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gpavvclvseucyal = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\IECompatUACache\\XoVD7TRyrP\\SystemPropertiesAdvanced.exe" -
Processes:
rundll32.exerdpclip.exeSystemPropertiesAdvanced.exesigverif.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpclip.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesAdvanced.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sigverif.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1980 rundll32.exe 1980 rundll32.exe 1980 rundll32.exe 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
Processes:
rundll32.exerdpclip.exeSystemPropertiesAdvanced.exesigverif.exepid process 1980 rundll32.exe 1276 1692 rdpclip.exe 1832 SystemPropertiesAdvanced.exe 920 sigverif.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1276 wrote to memory of 1168 1276 rdpclip.exe PID 1276 wrote to memory of 1168 1276 rdpclip.exe PID 1276 wrote to memory of 1168 1276 rdpclip.exe PID 1276 wrote to memory of 1692 1276 rdpclip.exe PID 1276 wrote to memory of 1692 1276 rdpclip.exe PID 1276 wrote to memory of 1692 1276 rdpclip.exe PID 1276 wrote to memory of 1320 1276 SystemPropertiesAdvanced.exe PID 1276 wrote to memory of 1320 1276 SystemPropertiesAdvanced.exe PID 1276 wrote to memory of 1320 1276 SystemPropertiesAdvanced.exe PID 1276 wrote to memory of 1832 1276 SystemPropertiesAdvanced.exe PID 1276 wrote to memory of 1832 1276 SystemPropertiesAdvanced.exe PID 1276 wrote to memory of 1832 1276 SystemPropertiesAdvanced.exe PID 1276 wrote to memory of 1104 1276 sigverif.exe PID 1276 wrote to memory of 1104 1276 sigverif.exe PID 1276 wrote to memory of 1104 1276 sigverif.exe PID 1276 wrote to memory of 920 1276 sigverif.exe PID 1276 wrote to memory of 920 1276 sigverif.exe PID 1276 wrote to memory of 920 1276 sigverif.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7818fc1e2f9e7df1ba5688ddc87f54b59b3e12c3d2c60393b50f9b56447ac2ab.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\rdpclip.exeC:\Windows\system32\rdpclip.exe1⤵
-
C:\Users\Admin\AppData\Local\En6rdp6\rdpclip.exeC:\Users\Admin\AppData\Local\En6rdp6\rdpclip.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\SystemPropertiesAdvanced.exeC:\Windows\system32\SystemPropertiesAdvanced.exe1⤵
-
C:\Users\Admin\AppData\Local\jvBAPs3su\SystemPropertiesAdvanced.exeC:\Users\Admin\AppData\Local\jvBAPs3su\SystemPropertiesAdvanced.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\sigverif.exeC:\Windows\system32\sigverif.exe1⤵
-
C:\Users\Admin\AppData\Local\Bk1R8t\sigverif.exeC:\Users\Admin\AppData\Local\Bk1R8t\sigverif.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Bk1R8t\VERSION.dllMD5
50c0d4dc0cf6732f131114daef5929f0
SHA10ce2cacfc897d62a4f7a179c39f304b2a504bdf8
SHA256ef353651870f12ad511d2ad4a8625c03cdd9204eaa03233d9e7c46e82ffe09c3
SHA51225c03104258ddf870aecb03b8a71f3183f78b3e8cb55cc1f6578965f75e68ffaad64067350cdd9ed3a9bc6ada0b60cf71632be65f053781d443f6cf3eb48da39
-
C:\Users\Admin\AppData\Local\Bk1R8t\sigverif.exeMD5
e8e95ae5534553fc055051cee99a7f55
SHA14e0f668849fd546edd083d5981ed685d02a68df4
SHA2569e107fd99892d08b15c223ac17c49af75a4cbca41b5e939bb91c9dca9f0d0bec
SHA5125d3c32d136a264b6d2cfba4602e4d8f75e55ba0e199e0e81d7a515c34d8b9237db29647c10ab79081173010ff8e2c6a59b652c0a9cfa796433aed2d200f02da6
-
C:\Users\Admin\AppData\Local\En6rdp6\WTSAPI32.dllMD5
763faceb062a5c478b0fa6e4c83de7aa
SHA1fd01e91dd8d5e749262f83c437cbf828b6486334
SHA2568c3e8d6eeedbd77bba3a68b420cb69db2411f87bb84ea5a0450e9446440490a6
SHA512087e3ab8528fbe85fe2bbd55ceed58c793df85368d259251a0b072203f9c2f93d5f2670baaa98994867637e1142f78a155ec71681ecc7bc0e21e5bc651395e68
-
C:\Users\Admin\AppData\Local\En6rdp6\rdpclip.exeMD5
25d284eb2f12254c001afe9a82575a81
SHA1cf131801fdd5ec92278f9e0ae62050e31c6670a5
SHA256837e0d864c474956c0d9d4e7ae5f884007f19b7f420db9afcf0d266aefa6608b
SHA5127b4f208fa1681a0a139577ebc974e7acfc85e3c906a674e111223783460585eb989cb6b38f215d79f89e747a0e9224d90e1aa43e091d2042edb8bac7b27b968b
-
C:\Users\Admin\AppData\Local\jvBAPs3su\SYSDM.CPLMD5
905b23a43a47781170aed74e60def2c5
SHA192613067b862423ee63792c1fda136b67a03e0cf
SHA2565c03ce340f49562016cd550167488a7107fa7aa8a60828d811fcd1a0e87d1199
SHA512cae3d8972bbe132d3dec15a14a3ffdd5f67801dd727bd62cb2efea4e794caa5a2f04e4baa2bda3ccc29075fc5cb381f915cebeb7c701a848617bda3771eba5ca
-
C:\Users\Admin\AppData\Local\jvBAPs3su\SystemPropertiesAdvanced.exeMD5
25dc1e599591871c074a68708206e734
SHA127a9dffa92d979d39c07d889fada536c062dac77
SHA256a13b2ba5892c11c731869410b1e3dd2f250d70ff9efd513a9f260ab506dd42ef
SHA512f7da9ce4c3e8aea9095fcc977084c042f85df48fca0b58fb136dfd835ce69b5b1e68f3c11eeb14c617ffcec7011ffc7e5d5a948f49dde653a2348b28e10adb72
-
\Users\Admin\AppData\Local\Bk1R8t\VERSION.dllMD5
50c0d4dc0cf6732f131114daef5929f0
SHA10ce2cacfc897d62a4f7a179c39f304b2a504bdf8
SHA256ef353651870f12ad511d2ad4a8625c03cdd9204eaa03233d9e7c46e82ffe09c3
SHA51225c03104258ddf870aecb03b8a71f3183f78b3e8cb55cc1f6578965f75e68ffaad64067350cdd9ed3a9bc6ada0b60cf71632be65f053781d443f6cf3eb48da39
-
\Users\Admin\AppData\Local\Bk1R8t\sigverif.exeMD5
e8e95ae5534553fc055051cee99a7f55
SHA14e0f668849fd546edd083d5981ed685d02a68df4
SHA2569e107fd99892d08b15c223ac17c49af75a4cbca41b5e939bb91c9dca9f0d0bec
SHA5125d3c32d136a264b6d2cfba4602e4d8f75e55ba0e199e0e81d7a515c34d8b9237db29647c10ab79081173010ff8e2c6a59b652c0a9cfa796433aed2d200f02da6
-
\Users\Admin\AppData\Local\En6rdp6\WTSAPI32.dllMD5
763faceb062a5c478b0fa6e4c83de7aa
SHA1fd01e91dd8d5e749262f83c437cbf828b6486334
SHA2568c3e8d6eeedbd77bba3a68b420cb69db2411f87bb84ea5a0450e9446440490a6
SHA512087e3ab8528fbe85fe2bbd55ceed58c793df85368d259251a0b072203f9c2f93d5f2670baaa98994867637e1142f78a155ec71681ecc7bc0e21e5bc651395e68
-
\Users\Admin\AppData\Local\En6rdp6\rdpclip.exeMD5
25d284eb2f12254c001afe9a82575a81
SHA1cf131801fdd5ec92278f9e0ae62050e31c6670a5
SHA256837e0d864c474956c0d9d4e7ae5f884007f19b7f420db9afcf0d266aefa6608b
SHA5127b4f208fa1681a0a139577ebc974e7acfc85e3c906a674e111223783460585eb989cb6b38f215d79f89e747a0e9224d90e1aa43e091d2042edb8bac7b27b968b
-
\Users\Admin\AppData\Local\jvBAPs3su\SYSDM.CPLMD5
905b23a43a47781170aed74e60def2c5
SHA192613067b862423ee63792c1fda136b67a03e0cf
SHA2565c03ce340f49562016cd550167488a7107fa7aa8a60828d811fcd1a0e87d1199
SHA512cae3d8972bbe132d3dec15a14a3ffdd5f67801dd727bd62cb2efea4e794caa5a2f04e4baa2bda3ccc29075fc5cb381f915cebeb7c701a848617bda3771eba5ca
-
\Users\Admin\AppData\Local\jvBAPs3su\SystemPropertiesAdvanced.exeMD5
25dc1e599591871c074a68708206e734
SHA127a9dffa92d979d39c07d889fada536c062dac77
SHA256a13b2ba5892c11c731869410b1e3dd2f250d70ff9efd513a9f260ab506dd42ef
SHA512f7da9ce4c3e8aea9095fcc977084c042f85df48fca0b58fb136dfd835ce69b5b1e68f3c11eeb14c617ffcec7011ffc7e5d5a948f49dde653a2348b28e10adb72
-
\Users\Admin\AppData\Roaming\Microsoft\Crypto\1WpHHk\sigverif.exeMD5
e8e95ae5534553fc055051cee99a7f55
SHA14e0f668849fd546edd083d5981ed685d02a68df4
SHA2569e107fd99892d08b15c223ac17c49af75a4cbca41b5e939bb91c9dca9f0d0bec
SHA5125d3c32d136a264b6d2cfba4602e4d8f75e55ba0e199e0e81d7a515c34d8b9237db29647c10ab79081173010ff8e2c6a59b652c0a9cfa796433aed2d200f02da6
-
memory/920-104-0x000007FEFC4B1000-0x000007FEFC4B3000-memory.dmpFilesize
8KB
-
memory/920-102-0x0000000000000000-mapping.dmp
-
memory/1276-78-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1276-64-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1276-69-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1276-68-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1276-67-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1276-59-0x0000000002A90000-0x0000000002A91000-memory.dmpFilesize
4KB
-
memory/1276-77-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1276-84-0x0000000077C40000-0x0000000077C42000-memory.dmpFilesize
8KB
-
memory/1276-60-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1276-71-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1276-72-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1276-73-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1276-74-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1276-61-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1276-75-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1276-62-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1276-76-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1276-66-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1276-65-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1276-70-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1276-63-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1692-90-0x0000000140000000-0x000000014015B000-memory.dmpFilesize
1.4MB
-
memory/1692-86-0x0000000000000000-mapping.dmp
-
memory/1832-94-0x0000000000000000-mapping.dmp
-
memory/1980-55-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/1980-58-0x0000000000100000-0x0000000000107000-memory.dmpFilesize
28KB