Analysis
-
max time kernel
152s -
max time network
130s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
26-11-2021 09:28
Static task
static1
Behavioral task
behavioral1
Sample
248f05930d4cf6075a5e309d4c20c5cf422a750d52a4f7afc31fd983b9cf897e.dll
Resource
win7-en-20211014
General
-
Target
248f05930d4cf6075a5e309d4c20c5cf422a750d52a4f7afc31fd983b9cf897e.dll
-
Size
1.3MB
-
MD5
a547e2f14c375de73aa013704367f35f
-
SHA1
c29eededd89c502cb410ecb45540f935aaa3dd5d
-
SHA256
248f05930d4cf6075a5e309d4c20c5cf422a750d52a4f7afc31fd983b9cf897e
-
SHA512
8b470f3360dcea76e432641a127c5b487aaee7196f9b821586b8d18958485e84a834552a2ae9c252fcc315328ddca643f6b29c164e7e0f4a4857a8bb041bed4c
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1252-59-0x0000000002AF0000-0x0000000002AF1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
spreview.exeicardagt.exeWFS.exepid process 1064 spreview.exe 1172 icardagt.exe 1636 WFS.exe -
Loads dropped DLL 7 IoCs
Processes:
spreview.exeicardagt.exeWFS.exepid process 1252 1064 spreview.exe 1252 1172 icardagt.exe 1252 1636 WFS.exe 1252 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gpavvclvseucyal = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Protect\\S-1-5-21-2955169046-2371869340-1800780948-1000\\nH5XN\\icardagt.exe" -
Processes:
rundll32.exespreview.exeicardagt.exeWFS.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spreview.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA icardagt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WFS.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1604 rundll32.exe 1604 rundll32.exe 1604 rundll32.exe 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 1252 -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
Processes:
rundll32.exespreview.exeicardagt.exeWFS.exepid process 1604 rundll32.exe 1252 1064 spreview.exe 1172 icardagt.exe 1636 WFS.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1252 wrote to memory of 808 1252 spreview.exe PID 1252 wrote to memory of 808 1252 spreview.exe PID 1252 wrote to memory of 808 1252 spreview.exe PID 1252 wrote to memory of 1064 1252 spreview.exe PID 1252 wrote to memory of 1064 1252 spreview.exe PID 1252 wrote to memory of 1064 1252 spreview.exe PID 1252 wrote to memory of 1948 1252 icardagt.exe PID 1252 wrote to memory of 1948 1252 icardagt.exe PID 1252 wrote to memory of 1948 1252 icardagt.exe PID 1252 wrote to memory of 1172 1252 icardagt.exe PID 1252 wrote to memory of 1172 1252 icardagt.exe PID 1252 wrote to memory of 1172 1252 icardagt.exe PID 1252 wrote to memory of 1632 1252 WFS.exe PID 1252 wrote to memory of 1632 1252 WFS.exe PID 1252 wrote to memory of 1632 1252 WFS.exe PID 1252 wrote to memory of 1636 1252 WFS.exe PID 1252 wrote to memory of 1636 1252 WFS.exe PID 1252 wrote to memory of 1636 1252 WFS.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\248f05930d4cf6075a5e309d4c20c5cf422a750d52a4f7afc31fd983b9cf897e.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\spreview.exeC:\Windows\system32\spreview.exe1⤵
-
C:\Users\Admin\AppData\Local\sQt0zgt5e\spreview.exeC:\Users\Admin\AppData\Local\sQt0zgt5e\spreview.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\icardagt.exeC:\Windows\system32\icardagt.exe1⤵
-
C:\Users\Admin\AppData\Local\R3N\icardagt.exeC:\Users\Admin\AppData\Local\R3N\icardagt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\WFS.exeC:\Windows\system32\WFS.exe1⤵
-
C:\Users\Admin\AppData\Local\Oly\WFS.exeC:\Users\Admin\AppData\Local\Oly\WFS.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Oly\WFS.exeMD5
a943d670747778c7597987a4b5b9a679
SHA1c48b760ff9762205386563b93e8884352645ef40
SHA2561a582ebe780abc1143baccaf4910714d3e9f4195edd86939499d03ed6e756610
SHA5123d926ddead8afcb32b52b3eb3c416d197c15e5fff6ba9fa03a31a07522bdb9088b32500fc8b98d82af657071571d09cd336a65cf45c485ebcc145dea70b3a934
-
C:\Users\Admin\AppData\Local\Oly\WINMM.dllMD5
adc6d1ef00cfdd8da883f0d5d774ba74
SHA1f6b957e8492f2bdf166038c14de24692cf73856c
SHA256fe35c8913e9e06262c11cba1c00ba7525dd7f6b6a2153f2ff11270c09f3c5d38
SHA5125cc268251df2782768426f6f9d1590f9ccd8e36c5157277dd497687f646881d0f6aeae2432bf8840533b1ceb10d4b85d135c20d47a6d3cbea9bb48b665cfb40e
-
C:\Users\Admin\AppData\Local\R3N\UxTheme.dllMD5
8309813202cc087a097ba42d6a9362a3
SHA1341753757066bcf5e9688c6c30b9a65989f33072
SHA2562da6580f0f8e1fff971b5b2cf01c8a0c9f5f275d98790c56010f598af7002638
SHA512989e2a00cd41654c5ac7d67b3458b76d1fc24aadb3f2153cea3339e41b41d8e43f7218db4a8cc36e9f3a8e0a47c0ee1b44b68bd3ba1bc310a2d752de33fdccc1
-
C:\Users\Admin\AppData\Local\R3N\icardagt.exeMD5
2fe97a3052e847190a9775431292a3a3
SHA143edc451ac97365600391fa4af15476a30423ff6
SHA256473d17e571d6947ce93103454f1e9fe27136403125152b97acb6cad5cc2a9ac7
SHA51293ed1f9ef6fb256b53df9c6f2ce03301c0d3a0ef49c3f0604872653e4ba3fce369256f50604dd8386f543e1ea9231f5700213e683d3ea9af9e4d6c427a19117a
-
C:\Users\Admin\AppData\Local\sQt0zgt5e\spreview.exeMD5
704cd4cac010e8e6d8de9b778ed17773
SHA181856abf70640f102b8b3defe2cf65669fe8e165
SHA2564307f21d3ec3b51cba6a905a80045314ffccb4c60c11d99a3d77cc8103014208
SHA512b380264276bad01d619a5f1f112791d6bf73dc52cdd5cca0cc1f726a6f66eefc5a78a37646792987c508f9cb5049f0eb86c71fb4c7a2d3e670c0c8623f0522ee
-
C:\Users\Admin\AppData\Local\sQt0zgt5e\sqmapi.dllMD5
9a95ae0dcd409c3102678032685fb568
SHA145a7b22ac752fcd4879577e53561cede396cfa6b
SHA256e2a1f61af0018a6414626ef2dcb493277d0e406959f7e136bcbcac56a5cfaf58
SHA5120c24e3f6564a8d69d0bb78ce6138353452f499edb6d1e730e0dd8687bb063a7c9e9367ab84e36b73ce14ff95ecec9be857e46ce9312818a1cd08a158319e6f40
-
\Users\Admin\AppData\Local\Oly\WFS.exeMD5
a943d670747778c7597987a4b5b9a679
SHA1c48b760ff9762205386563b93e8884352645ef40
SHA2561a582ebe780abc1143baccaf4910714d3e9f4195edd86939499d03ed6e756610
SHA5123d926ddead8afcb32b52b3eb3c416d197c15e5fff6ba9fa03a31a07522bdb9088b32500fc8b98d82af657071571d09cd336a65cf45c485ebcc145dea70b3a934
-
\Users\Admin\AppData\Local\Oly\WINMM.dllMD5
adc6d1ef00cfdd8da883f0d5d774ba74
SHA1f6b957e8492f2bdf166038c14de24692cf73856c
SHA256fe35c8913e9e06262c11cba1c00ba7525dd7f6b6a2153f2ff11270c09f3c5d38
SHA5125cc268251df2782768426f6f9d1590f9ccd8e36c5157277dd497687f646881d0f6aeae2432bf8840533b1ceb10d4b85d135c20d47a6d3cbea9bb48b665cfb40e
-
\Users\Admin\AppData\Local\R3N\UxTheme.dllMD5
8309813202cc087a097ba42d6a9362a3
SHA1341753757066bcf5e9688c6c30b9a65989f33072
SHA2562da6580f0f8e1fff971b5b2cf01c8a0c9f5f275d98790c56010f598af7002638
SHA512989e2a00cd41654c5ac7d67b3458b76d1fc24aadb3f2153cea3339e41b41d8e43f7218db4a8cc36e9f3a8e0a47c0ee1b44b68bd3ba1bc310a2d752de33fdccc1
-
\Users\Admin\AppData\Local\R3N\icardagt.exeMD5
2fe97a3052e847190a9775431292a3a3
SHA143edc451ac97365600391fa4af15476a30423ff6
SHA256473d17e571d6947ce93103454f1e9fe27136403125152b97acb6cad5cc2a9ac7
SHA51293ed1f9ef6fb256b53df9c6f2ce03301c0d3a0ef49c3f0604872653e4ba3fce369256f50604dd8386f543e1ea9231f5700213e683d3ea9af9e4d6c427a19117a
-
\Users\Admin\AppData\Local\sQt0zgt5e\spreview.exeMD5
704cd4cac010e8e6d8de9b778ed17773
SHA181856abf70640f102b8b3defe2cf65669fe8e165
SHA2564307f21d3ec3b51cba6a905a80045314ffccb4c60c11d99a3d77cc8103014208
SHA512b380264276bad01d619a5f1f112791d6bf73dc52cdd5cca0cc1f726a6f66eefc5a78a37646792987c508f9cb5049f0eb86c71fb4c7a2d3e670c0c8623f0522ee
-
\Users\Admin\AppData\Local\sQt0zgt5e\sqmapi.dllMD5
9a95ae0dcd409c3102678032685fb568
SHA145a7b22ac752fcd4879577e53561cede396cfa6b
SHA256e2a1f61af0018a6414626ef2dcb493277d0e406959f7e136bcbcac56a5cfaf58
SHA5120c24e3f6564a8d69d0bb78ce6138353452f499edb6d1e730e0dd8687bb063a7c9e9367ab84e36b73ce14ff95ecec9be857e46ce9312818a1cd08a158319e6f40
-
\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\Collab\0eVa9Oir\WFS.exeMD5
a943d670747778c7597987a4b5b9a679
SHA1c48b760ff9762205386563b93e8884352645ef40
SHA2561a582ebe780abc1143baccaf4910714d3e9f4195edd86939499d03ed6e756610
SHA5123d926ddead8afcb32b52b3eb3c416d197c15e5fff6ba9fa03a31a07522bdb9088b32500fc8b98d82af657071571d09cd336a65cf45c485ebcc145dea70b3a934
-
memory/1064-87-0x0000000140000000-0x0000000140157000-memory.dmpFilesize
1.3MB
-
memory/1064-82-0x0000000000000000-mapping.dmp
-
memory/1064-84-0x000007FEFBD11000-0x000007FEFBD13000-memory.dmpFilesize
8KB
-
memory/1172-91-0x0000000000000000-mapping.dmp
-
memory/1252-66-0x0000000140000000-0x0000000140156000-memory.dmpFilesize
1.3MB
-
memory/1252-65-0x0000000140000000-0x0000000140156000-memory.dmpFilesize
1.3MB
-
memory/1252-74-0x0000000140000000-0x0000000140156000-memory.dmpFilesize
1.3MB
-
memory/1252-73-0x0000000140000000-0x0000000140156000-memory.dmpFilesize
1.3MB
-
memory/1252-72-0x0000000140000000-0x0000000140156000-memory.dmpFilesize
1.3MB
-
memory/1252-68-0x0000000140000000-0x0000000140156000-memory.dmpFilesize
1.3MB
-
memory/1252-71-0x0000000140000000-0x0000000140156000-memory.dmpFilesize
1.3MB
-
memory/1252-70-0x0000000140000000-0x0000000140156000-memory.dmpFilesize
1.3MB
-
memory/1252-69-0x0000000140000000-0x0000000140156000-memory.dmpFilesize
1.3MB
-
memory/1252-67-0x0000000140000000-0x0000000140156000-memory.dmpFilesize
1.3MB
-
memory/1252-59-0x0000000002AF0000-0x0000000002AF1000-memory.dmpFilesize
4KB
-
memory/1252-80-0x00000000774A0000-0x00000000774A2000-memory.dmpFilesize
8KB
-
memory/1252-64-0x0000000140000000-0x0000000140156000-memory.dmpFilesize
1.3MB
-
memory/1252-63-0x0000000140000000-0x0000000140156000-memory.dmpFilesize
1.3MB
-
memory/1252-62-0x0000000140000000-0x0000000140156000-memory.dmpFilesize
1.3MB
-
memory/1252-61-0x0000000140000000-0x0000000140156000-memory.dmpFilesize
1.3MB
-
memory/1252-60-0x0000000140000000-0x0000000140156000-memory.dmpFilesize
1.3MB
-
memory/1604-55-0x0000000140000000-0x0000000140156000-memory.dmpFilesize
1.3MB
-
memory/1604-58-0x0000000000100000-0x0000000000107000-memory.dmpFilesize
28KB
-
memory/1636-100-0x0000000000000000-mapping.dmp
-
memory/1636-105-0x000000013F7F1000-0x000000013F7F3000-memory.dmpFilesize
8KB
-
memory/1636-106-0x0000000140000000-0x0000000140158000-memory.dmpFilesize
1.3MB