Analysis
-
max time kernel
154s -
max time network
139s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
26-11-2021 09:27
Static task
static1
Behavioral task
behavioral1
Sample
114957fd7fb9c6830b6da37b828ad27a8c8a61f01abb6f52424ca1c5da9f523f.dll
Resource
win7-en-20211104
General
-
Target
114957fd7fb9c6830b6da37b828ad27a8c8a61f01abb6f52424ca1c5da9f523f.dll
-
Size
1.3MB
-
MD5
4bcdeb39da135fecdcaad9f1a96c3186
-
SHA1
8432f49550f40d8da39ccbc9fdfaf6fc631def1f
-
SHA256
114957fd7fb9c6830b6da37b828ad27a8c8a61f01abb6f52424ca1c5da9f523f
-
SHA512
c2b8da83cf40228071c27de1592b81bf9ed622e9506ca9942e2f6409ef2d6ccb7cf655cf3eedc4089b8f91eaf470d2ebce1ac06bc5837b468f4f1d46d7124c2a
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2800-121-0x0000000000A70000-0x0000000000A71000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
cmstp.exeEaseOfAccessDialog.exeDisplaySwitch.exepid process 676 cmstp.exe 2460 EaseOfAccessDialog.exe 724 DisplaySwitch.exe -
Loads dropped DLL 4 IoCs
Processes:
cmstp.exeEaseOfAccessDialog.exeDisplaySwitch.exepid process 676 cmstp.exe 676 cmstp.exe 2460 EaseOfAccessDialog.exe 724 DisplaySwitch.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\Slqggwbvaxk = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Protect\\S-1-5-21-941723256-3451054534-3089625102-1000\\ubN6mcutg\\EaseOfAccessDialog.exe" -
Processes:
rundll32.execmstp.exeEaseOfAccessDialog.exeDisplaySwitch.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmstp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA EaseOfAccessDialog.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DisplaySwitch.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2288 rundll32.exe 2288 rundll32.exe 2288 rundll32.exe 2288 rundll32.exe 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 2800 -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
Processes:
rundll32.execmstp.exeEaseOfAccessDialog.exeDisplaySwitch.exepid process 2288 rundll32.exe 2800 676 cmstp.exe 2460 EaseOfAccessDialog.exe 724 DisplaySwitch.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 2800 wrote to memory of 1240 2800 cmstp.exe PID 2800 wrote to memory of 1240 2800 cmstp.exe PID 2800 wrote to memory of 676 2800 cmstp.exe PID 2800 wrote to memory of 676 2800 cmstp.exe PID 2800 wrote to memory of 2704 2800 EaseOfAccessDialog.exe PID 2800 wrote to memory of 2704 2800 EaseOfAccessDialog.exe PID 2800 wrote to memory of 2460 2800 EaseOfAccessDialog.exe PID 2800 wrote to memory of 2460 2800 EaseOfAccessDialog.exe PID 2800 wrote to memory of 2336 2800 DisplaySwitch.exe PID 2800 wrote to memory of 2336 2800 DisplaySwitch.exe PID 2800 wrote to memory of 724 2800 DisplaySwitch.exe PID 2800 wrote to memory of 724 2800 DisplaySwitch.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\114957fd7fb9c6830b6da37b828ad27a8c8a61f01abb6f52424ca1c5da9f523f.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\cmstp.exeC:\Windows\system32\cmstp.exe1⤵
-
C:\Users\Admin\AppData\Local\iSlh\cmstp.exeC:\Users\Admin\AppData\Local\iSlh\cmstp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\EaseOfAccessDialog.exeC:\Windows\system32\EaseOfAccessDialog.exe1⤵
-
C:\Users\Admin\AppData\Local\S73k5Uonz\EaseOfAccessDialog.exeC:\Users\Admin\AppData\Local\S73k5Uonz\EaseOfAccessDialog.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\DisplaySwitch.exeC:\Windows\system32\DisplaySwitch.exe1⤵
-
C:\Users\Admin\AppData\Local\ZgjX\DisplaySwitch.exeC:\Users\Admin\AppData\Local\ZgjX\DisplaySwitch.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\S73k5Uonz\EaseOfAccessDialog.exeMD5
7eea1db3812b97249530920bb6984f1b
SHA164a217bb388459aee06f2e838404f5136faaee4d
SHA25645d3a9f983aa6307ecba03bd5c8fe1dcaa510753178c8a126b55c565b7cf01c5
SHA512911d60bb9780b9dda5e7f5cdc791d2c90fc161504d24a6d66a5f3c78dc3c2d30b5222247d4372486ba3c784a53a09a67c953aad7410e9a53c58fd49298bf421d
-
C:\Users\Admin\AppData\Local\S73k5Uonz\OLEACC.dllMD5
81fe2d8ea1eece125026abdced7bd848
SHA16f181227ecc799884b550efaed9063a5e89a5b22
SHA256ec7c19319fb6edcdac01edd9860c61be4e5bb1ed1a9cc9661f8674a658975968
SHA51200e2179fe1399125e9a4acbcaa3e519519b66e3029094ccfa06c59ad4ed963de24df96eafae4a2c57e7efa781d251feec8dc97ca1de70ed836ea970eb3e3fd13
-
C:\Users\Admin\AppData\Local\ZgjX\DisplaySwitch.exeMD5
9e139d8cdf910f624c4cb0a63cbab22d
SHA114b7259a609fddb0c561e1154dac638fa0db06b3
SHA2563374874744179d8f880791ff4373736d9bb93ae3275be6ff26b296b4d8b9619c
SHA512d2c7521cc65c92da10a337303f5902560f3dc30ba0dfb959196337d4dcbc13a2ef69de7e7cfdc5e983affc3fc6938a485ef8ead0cf1c485aa0893c667fe08357
-
C:\Users\Admin\AppData\Local\ZgjX\UxTheme.dllMD5
83553c9df5a93cc8a4f6cf3c82a2f11e
SHA1f1143c0791ccd126e1e76afdbe7782a4c93c67a9
SHA2560d5305f18f2e3b8cd76969d0095b1a06dd8b0d047dd0c6403b7bce9619ace2f1
SHA5123a8aa97d7581f5da2caea3c440d7157f6a30aa2903480ced0b374fca7a6c3c4c117e540f5c40230ec8d07ad9b2b8ffd83e7e2f1dc22e179728061f6b3bed1d7d
-
C:\Users\Admin\AppData\Local\iSlh\VERSION.dllMD5
98defe5b83ef4303151149c36291387f
SHA1127017a6f16521b67de98722444ba69e03429396
SHA256f3cb787663e61c9cfe6042851d3a3f6f50e4c9ba1a40697e063a1c68fc3e9fbc
SHA5125ed1b329a9a4e65c9c3c30b4704c7fab615c2583fcf6e144b9002691b796cf518b63dde1ea9b77a29010824a68b27707d0522201c1e23d74024ba0a7d6137332
-
C:\Users\Admin\AppData\Local\iSlh\cmstp.exeMD5
1474ec07a09879ee8637fae8bcb9fbb7
SHA1ddf0885d51430a4d51a908065a2cf66b95cb90a0
SHA256bccd3610cd2b5ef1a7f1b224a5c68f97da484200bb525423659e51283d22d3e7
SHA512c6959f44b8a77399507a563c3094f9646d5feda36d221e34db1e61da7148e1fd13f7d1a7befeb0617015f06005547f477ff26130e1b55f4130a0205bb1e51369
-
\Users\Admin\AppData\Local\S73k5Uonz\OLEACC.dllMD5
81fe2d8ea1eece125026abdced7bd848
SHA16f181227ecc799884b550efaed9063a5e89a5b22
SHA256ec7c19319fb6edcdac01edd9860c61be4e5bb1ed1a9cc9661f8674a658975968
SHA51200e2179fe1399125e9a4acbcaa3e519519b66e3029094ccfa06c59ad4ed963de24df96eafae4a2c57e7efa781d251feec8dc97ca1de70ed836ea970eb3e3fd13
-
\Users\Admin\AppData\Local\ZgjX\UxTheme.dllMD5
83553c9df5a93cc8a4f6cf3c82a2f11e
SHA1f1143c0791ccd126e1e76afdbe7782a4c93c67a9
SHA2560d5305f18f2e3b8cd76969d0095b1a06dd8b0d047dd0c6403b7bce9619ace2f1
SHA5123a8aa97d7581f5da2caea3c440d7157f6a30aa2903480ced0b374fca7a6c3c4c117e540f5c40230ec8d07ad9b2b8ffd83e7e2f1dc22e179728061f6b3bed1d7d
-
\Users\Admin\AppData\Local\iSlh\VERSION.dllMD5
98defe5b83ef4303151149c36291387f
SHA1127017a6f16521b67de98722444ba69e03429396
SHA256f3cb787663e61c9cfe6042851d3a3f6f50e4c9ba1a40697e063a1c68fc3e9fbc
SHA5125ed1b329a9a4e65c9c3c30b4704c7fab615c2583fcf6e144b9002691b796cf518b63dde1ea9b77a29010824a68b27707d0522201c1e23d74024ba0a7d6137332
-
\Users\Admin\AppData\Local\iSlh\VERSION.dllMD5
98defe5b83ef4303151149c36291387f
SHA1127017a6f16521b67de98722444ba69e03429396
SHA256f3cb787663e61c9cfe6042851d3a3f6f50e4c9ba1a40697e063a1c68fc3e9fbc
SHA5125ed1b329a9a4e65c9c3c30b4704c7fab615c2583fcf6e144b9002691b796cf518b63dde1ea9b77a29010824a68b27707d0522201c1e23d74024ba0a7d6137332
-
memory/676-159-0x000001F125340000-0x000001F125342000-memory.dmpFilesize
8KB
-
memory/676-155-0x0000000140000000-0x0000000140159000-memory.dmpFilesize
1.3MB
-
memory/676-158-0x000001F125340000-0x000001F125342000-memory.dmpFilesize
8KB
-
memory/676-150-0x0000000000000000-mapping.dmp
-
memory/676-161-0x000001F125290000-0x000001F1253E9000-memory.dmpFilesize
1.3MB
-
memory/676-160-0x000001F125340000-0x000001F125342000-memory.dmpFilesize
8KB
-
memory/724-179-0x000001F90CA00000-0x000001F90CA02000-memory.dmpFilesize
8KB
-
memory/724-180-0x000001F90CA00000-0x000001F90CA02000-memory.dmpFilesize
8KB
-
memory/724-172-0x0000000000000000-mapping.dmp
-
memory/724-181-0x000001F90CA00000-0x000001F90CA02000-memory.dmpFilesize
8KB
-
memory/2288-115-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/2288-120-0x00000282E5840000-0x00000282E5847000-memory.dmpFilesize
28KB
-
memory/2288-119-0x00000282E5850000-0x00000282E5852000-memory.dmpFilesize
8KB
-
memory/2288-118-0x00000282E5850000-0x00000282E5852000-memory.dmpFilesize
8KB
-
memory/2460-162-0x0000000000000000-mapping.dmp
-
memory/2460-170-0x000001E086E20000-0x000001E086E22000-memory.dmpFilesize
8KB
-
memory/2460-169-0x000001E086E20000-0x000001E086E22000-memory.dmpFilesize
8KB
-
memory/2460-171-0x000001E086E20000-0x000001E086E22000-memory.dmpFilesize
8KB
-
memory/2800-130-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/2800-149-0x00007FF8AEB80000-0x00007FF8AEB82000-memory.dmpFilesize
8KB
-
memory/2800-148-0x0000000000A50000-0x0000000000A52000-memory.dmpFilesize
8KB
-
memory/2800-147-0x00007FF8AEA45000-0x00007FF8AEA46000-memory.dmpFilesize
4KB
-
memory/2800-146-0x0000000000A50000-0x0000000000A52000-memory.dmpFilesize
8KB
-
memory/2800-145-0x0000000000A50000-0x0000000000A52000-memory.dmpFilesize
8KB
-
memory/2800-139-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/2800-138-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/2800-137-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/2800-136-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/2800-135-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/2800-134-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/2800-133-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/2800-132-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/2800-131-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/2800-129-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/2800-128-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/2800-127-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/2800-126-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/2800-125-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/2800-122-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/2800-124-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/2800-123-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB
-
memory/2800-121-0x0000000000A70000-0x0000000000A71000-memory.dmpFilesize
4KB
-
memory/2800-182-0x0000000000A50000-0x0000000000A52000-memory.dmpFilesize
8KB