Analysis
-
max time kernel
151s -
max time network
123s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
26-11-2021 09:27
Static task
static1
Behavioral task
behavioral1
Sample
114957fd7fb9c6830b6da37b828ad27a8c8a61f01abb6f52424ca1c5da9f523f.dll
Resource
win7-en-20211104
General
-
Target
114957fd7fb9c6830b6da37b828ad27a8c8a61f01abb6f52424ca1c5da9f523f.dll
-
Size
1.3MB
-
MD5
4bcdeb39da135fecdcaad9f1a96c3186
-
SHA1
8432f49550f40d8da39ccbc9fdfaf6fc631def1f
-
SHA256
114957fd7fb9c6830b6da37b828ad27a8c8a61f01abb6f52424ca1c5da9f523f
-
SHA512
c2b8da83cf40228071c27de1592b81bf9ed622e9506ca9942e2f6409ef2d6ccb7cf655cf3eedc4089b8f91eaf470d2ebce1ac06bc5837b468f4f1d46d7124c2a
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1260-59-0x0000000002A70000-0x0000000002A71000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
Utilman.exeEhStorAuthn.exerrinstaller.exepid process 1052 Utilman.exe 960 EhStorAuthn.exe 936 rrinstaller.exe -
Loads dropped DLL 7 IoCs
Processes:
Utilman.exeEhStorAuthn.exerrinstaller.exepid process 1260 1052 Utilman.exe 1260 960 EhStorAuthn.exe 1260 936 rrinstaller.exe 1260 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Windows\CurrentVersion\Run\Myzdcwow = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Protect\\S-1-5-21-103686315-404690609-2047157615-1000\\I6Mtnk\\EhStorAuthn.exe" -
Processes:
EhStorAuthn.exerrinstaller.exerundll32.exeUtilman.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rrinstaller.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Utilman.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1752 rundll32.exe 1752 rundll32.exe 1752 rundll32.exe 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
Processes:
rundll32.exeUtilman.exeEhStorAuthn.exerrinstaller.exepid process 1752 rundll32.exe 1260 1052 Utilman.exe 960 EhStorAuthn.exe 936 rrinstaller.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1260 wrote to memory of 1984 1260 Utilman.exe PID 1260 wrote to memory of 1984 1260 Utilman.exe PID 1260 wrote to memory of 1984 1260 Utilman.exe PID 1260 wrote to memory of 1052 1260 Utilman.exe PID 1260 wrote to memory of 1052 1260 Utilman.exe PID 1260 wrote to memory of 1052 1260 Utilman.exe PID 1260 wrote to memory of 1728 1260 EhStorAuthn.exe PID 1260 wrote to memory of 1728 1260 EhStorAuthn.exe PID 1260 wrote to memory of 1728 1260 EhStorAuthn.exe PID 1260 wrote to memory of 960 1260 EhStorAuthn.exe PID 1260 wrote to memory of 960 1260 EhStorAuthn.exe PID 1260 wrote to memory of 960 1260 EhStorAuthn.exe PID 1260 wrote to memory of 992 1260 rrinstaller.exe PID 1260 wrote to memory of 992 1260 rrinstaller.exe PID 1260 wrote to memory of 992 1260 rrinstaller.exe PID 1260 wrote to memory of 936 1260 rrinstaller.exe PID 1260 wrote to memory of 936 1260 rrinstaller.exe PID 1260 wrote to memory of 936 1260 rrinstaller.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\114957fd7fb9c6830b6da37b828ad27a8c8a61f01abb6f52424ca1c5da9f523f.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\Utilman.exeC:\Windows\system32\Utilman.exe1⤵
-
C:\Users\Admin\AppData\Local\UBE3Sf\Utilman.exeC:\Users\Admin\AppData\Local\UBE3Sf\Utilman.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\EhStorAuthn.exeC:\Windows\system32\EhStorAuthn.exe1⤵
-
C:\Users\Admin\AppData\Local\zSUKN\EhStorAuthn.exeC:\Users\Admin\AppData\Local\zSUKN\EhStorAuthn.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\rrinstaller.exeC:\Windows\system32\rrinstaller.exe1⤵
-
C:\Users\Admin\AppData\Local\DLKf\rrinstaller.exeC:\Users\Admin\AppData\Local\DLKf\rrinstaller.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\DLKf\MFPlat.DLLMD5
f264a54403aff056ac4e266d237536d7
SHA16113ac7b461163bd0ad5dae581aba729d2884f2b
SHA2564ea6f3ace771d75113aa8e2c13c42189f7c3a9aa6b6f5e383ba46850a149daf0
SHA5128331c4e4504c638f6632b4a43a23b458a7572df19db49c1c019720825be72e8dce80d20abfe0e83ae8e29b610f63749d37fab9f41e3851fbf3cebc8b95e7c8d9
-
C:\Users\Admin\AppData\Local\DLKf\rrinstaller.exeMD5
0d3a73b0b30252680b383532f1758649
SHA19f098d2037e4dd94eca6d04c37b3d4ad8b0cc931
SHA256fc8a992b6ac311e1b1491ec3e31e273a41f7fdf3f68176321307b68489a03fbc
SHA512a7961f4d8d0e07959d1501d721c7751b01af6704c7da5c1f31e40de5372ee6a1fce2f3e0077c8e6a1bed017e11ce4be9b0d17c04e30b222fb3f0df67b870b2d4
-
C:\Users\Admin\AppData\Local\UBE3Sf\DUI70.dllMD5
493a900f368e66a00abe424b5a784587
SHA148ce6e8f4a0b74d5ac233113e39df5d8727fd3f6
SHA25636bea355204f8a8e3816dc15e7336e31fcf54683f1ded04db3a5e187b0695f38
SHA512ddcd7ca970d3e6642fd176f0bfc5343bd8e7f6382faf55478f742d30bd7917143e03878e1eb635d6dc239ab5926d48eaaa88faebf802ba3c6c08efbcb4356aa6
-
C:\Users\Admin\AppData\Local\UBE3Sf\Utilman.exeMD5
32c5ee55eadfc071e57851e26ac98477
SHA18f8d0aee344e152424143da49ce2c7badabb8f9d
SHA2567ca90616e68bc851f14658a366d80f21ddb7a7dd8a866049e54651158784a9ea
SHA512e0943efa81f3087c84a5909c72a436671ee8cc3cc80154901430e83ec7966aac800ad4b26f4a174a0071da617c0982ceda584686c6e2056e1a83e864aca6c975
-
C:\Users\Admin\AppData\Local\zSUKN\EhStorAuthn.exeMD5
3abe95d92c80dc79707d8e168d79a994
SHA164b10c17f602d3f21c84954541e7092bc55bb5ab
SHA2562159d9d5c9355521de859d1c40907fcdfef19f8cf68eda7485b89e9aa119e3ad
SHA51270fee5e87121229bba5c5e5aaa9f028ac0546dc9d38b7a00a81b882c8f8ce4abfdc364a598976b1463cca05e9400db715f8a4478ec61b03a693bbeee18c6ae5c
-
C:\Users\Admin\AppData\Local\zSUKN\WTSAPI32.dllMD5
ca1b57790caf67c9ef71066b1c2db7cf
SHA1c3c77dd659e50539030b8744d9a2731340202908
SHA256109e3f70a355e3743da2973d0d02388d4a51559bca729b593e06985605274fbc
SHA5125472796de05261373d47125efe8615d9220bb8318704ba348ff58a79feb57b459d43eb0522488df77d0d48402ba0c605b152c02173bf2654ed0540b0a8ca69c3
-
\Users\Admin\AppData\Local\DLKf\MFPlat.DLLMD5
f264a54403aff056ac4e266d237536d7
SHA16113ac7b461163bd0ad5dae581aba729d2884f2b
SHA2564ea6f3ace771d75113aa8e2c13c42189f7c3a9aa6b6f5e383ba46850a149daf0
SHA5128331c4e4504c638f6632b4a43a23b458a7572df19db49c1c019720825be72e8dce80d20abfe0e83ae8e29b610f63749d37fab9f41e3851fbf3cebc8b95e7c8d9
-
\Users\Admin\AppData\Local\DLKf\rrinstaller.exeMD5
0d3a73b0b30252680b383532f1758649
SHA19f098d2037e4dd94eca6d04c37b3d4ad8b0cc931
SHA256fc8a992b6ac311e1b1491ec3e31e273a41f7fdf3f68176321307b68489a03fbc
SHA512a7961f4d8d0e07959d1501d721c7751b01af6704c7da5c1f31e40de5372ee6a1fce2f3e0077c8e6a1bed017e11ce4be9b0d17c04e30b222fb3f0df67b870b2d4
-
\Users\Admin\AppData\Local\UBE3Sf\DUI70.dllMD5
493a900f368e66a00abe424b5a784587
SHA148ce6e8f4a0b74d5ac233113e39df5d8727fd3f6
SHA25636bea355204f8a8e3816dc15e7336e31fcf54683f1ded04db3a5e187b0695f38
SHA512ddcd7ca970d3e6642fd176f0bfc5343bd8e7f6382faf55478f742d30bd7917143e03878e1eb635d6dc239ab5926d48eaaa88faebf802ba3c6c08efbcb4356aa6
-
\Users\Admin\AppData\Local\UBE3Sf\Utilman.exeMD5
32c5ee55eadfc071e57851e26ac98477
SHA18f8d0aee344e152424143da49ce2c7badabb8f9d
SHA2567ca90616e68bc851f14658a366d80f21ddb7a7dd8a866049e54651158784a9ea
SHA512e0943efa81f3087c84a5909c72a436671ee8cc3cc80154901430e83ec7966aac800ad4b26f4a174a0071da617c0982ceda584686c6e2056e1a83e864aca6c975
-
\Users\Admin\AppData\Local\zSUKN\EhStorAuthn.exeMD5
3abe95d92c80dc79707d8e168d79a994
SHA164b10c17f602d3f21c84954541e7092bc55bb5ab
SHA2562159d9d5c9355521de859d1c40907fcdfef19f8cf68eda7485b89e9aa119e3ad
SHA51270fee5e87121229bba5c5e5aaa9f028ac0546dc9d38b7a00a81b882c8f8ce4abfdc364a598976b1463cca05e9400db715f8a4478ec61b03a693bbeee18c6ae5c
-
\Users\Admin\AppData\Local\zSUKN\WTSAPI32.dllMD5
ca1b57790caf67c9ef71066b1c2db7cf
SHA1c3c77dd659e50539030b8744d9a2731340202908
SHA256109e3f70a355e3743da2973d0d02388d4a51559bca729b593e06985605274fbc
SHA5125472796de05261373d47125efe8615d9220bb8318704ba348ff58a79feb57b459d43eb0522488df77d0d48402ba0c605b152c02173bf2654ed0540b0a8ca69c3
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Sg0Av\rrinstaller.exeMD5
0d3a73b0b30252680b383532f1758649
SHA19f098d2037e4dd94eca6d04c37b3d4ad8b0cc931
SHA256fc8a992b6ac311e1b1491ec3e31e273a41f7fdf3f68176321307b68489a03fbc
SHA512a7961f4d8d0e07959d1501d721c7751b01af6704c7da5c1f31e40de5372ee6a1fce2f3e0077c8e6a1bed017e11ce4be9b0d17c04e30b222fb3f0df67b870b2d4
-
memory/936-107-0x0000000140000000-0x000000014015A000-memory.dmpFilesize
1.4MB
-
memory/936-103-0x0000000000000000-mapping.dmp
-
memory/960-94-0x0000000000000000-mapping.dmp
-
memory/960-99-0x0000000140000000-0x0000000140159000-memory.dmpFilesize
1.3MB
-
memory/1052-90-0x0000000140000000-0x000000014018C000-memory.dmpFilesize
1.5MB
-
memory/1052-87-0x000007FEFC061000-0x000007FEFC063000-memory.dmpFilesize
8KB
-
memory/1052-85-0x0000000000000000-mapping.dmp
-
memory/1260-73-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/1260-72-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/1260-66-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/1260-67-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/1260-68-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/1260-69-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/1260-75-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/1260-76-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/1260-77-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/1260-70-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/1260-71-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/1260-83-0x0000000077990000-0x0000000077992000-memory.dmpFilesize
8KB
-
memory/1260-59-0x0000000002A70000-0x0000000002A71000-memory.dmpFilesize
4KB
-
memory/1260-74-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/1260-65-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/1260-64-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/1260-62-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/1260-63-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/1260-61-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/1260-60-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/1752-55-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/1752-58-0x0000000000190000-0x0000000000197000-memory.dmpFilesize
28KB