Analysis
-
max time kernel
153s -
max time network
126s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
26-11-2021 09:28
Static task
static1
Behavioral task
behavioral1
Sample
248f05930d4cf6075a5e309d4c20c5cf422a750d52a4f7afc31fd983b9cf897e.dll
Resource
win7-en-20211014
General
-
Target
248f05930d4cf6075a5e309d4c20c5cf422a750d52a4f7afc31fd983b9cf897e.dll
-
Size
1.3MB
-
MD5
a547e2f14c375de73aa013704367f35f
-
SHA1
c29eededd89c502cb410ecb45540f935aaa3dd5d
-
SHA256
248f05930d4cf6075a5e309d4c20c5cf422a750d52a4f7afc31fd983b9cf897e
-
SHA512
8b470f3360dcea76e432641a127c5b487aaee7196f9b821586b8d18958485e84a834552a2ae9c252fcc315328ddca643f6b29c164e7e0f4a4857a8bb041bed4c
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2416-124-0x0000000000900000-0x0000000000901000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
InfDefaultInstall.exepsr.exerecdisc.exepid process 4404 InfDefaultInstall.exe 632 psr.exe 3728 recdisc.exe -
Loads dropped DLL 3 IoCs
Processes:
InfDefaultInstall.exepsr.exerecdisc.exepid process 4404 InfDefaultInstall.exe 632 psr.exe 3728 recdisc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ziekmjidk = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\CRLs\\pK\\psr.exe" -
Processes:
rundll32.exeInfDefaultInstall.exepsr.exerecdisc.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA InfDefaultInstall.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA psr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA recdisc.exe -
Modifies registry class 2 IoCs
Processes:
description ioc process Key created \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 3968 rundll32.exe 3968 rundll32.exe 3968 rundll32.exe 3968 rundll32.exe 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 2416 -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
Processes:
rundll32.exeInfDefaultInstall.exepsr.exerecdisc.exepid process 3968 rundll32.exe 2416 4404 InfDefaultInstall.exe 632 psr.exe 3728 recdisc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 2416 Token: SeCreatePagefilePrivilege 2416 Token: SeShutdownPrivilege 2416 Token: SeCreatePagefilePrivilege 2416 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 2416 wrote to memory of 4420 2416 InfDefaultInstall.exe PID 2416 wrote to memory of 4420 2416 InfDefaultInstall.exe PID 2416 wrote to memory of 4404 2416 InfDefaultInstall.exe PID 2416 wrote to memory of 4404 2416 InfDefaultInstall.exe PID 2416 wrote to memory of 804 2416 psr.exe PID 2416 wrote to memory of 804 2416 psr.exe PID 2416 wrote to memory of 632 2416 psr.exe PID 2416 wrote to memory of 632 2416 psr.exe PID 2416 wrote to memory of 3724 2416 recdisc.exe PID 2416 wrote to memory of 3724 2416 recdisc.exe PID 2416 wrote to memory of 3728 2416 recdisc.exe PID 2416 wrote to memory of 3728 2416 recdisc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\248f05930d4cf6075a5e309d4c20c5cf422a750d52a4f7afc31fd983b9cf897e.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\InfDefaultInstall.exeC:\Windows\system32\InfDefaultInstall.exe1⤵
-
C:\Users\Admin\AppData\Local\9MbA\InfDefaultInstall.exeC:\Users\Admin\AppData\Local\9MbA\InfDefaultInstall.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\psr.exeC:\Windows\system32\psr.exe1⤵
-
C:\Users\Admin\AppData\Local\JIkNCL\psr.exeC:\Users\Admin\AppData\Local\JIkNCL\psr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\recdisc.exeC:\Windows\system32\recdisc.exe1⤵
-
C:\Users\Admin\AppData\Local\5eB8\recdisc.exeC:\Users\Admin\AppData\Local\5eB8\recdisc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\5eB8\ReAgent.dllMD5
6267d6ab8e62597318e2f11688ef4825
SHA1bfe598d8c69e0d7629842c837362c7751f2d1090
SHA2560360cd43f62b886b1d3fbcdbdfc5f8007796b5fd9b8a3e31cd45ba46863eda90
SHA5127c92cee2022e995861238a3a11d1579b2162461125e901a148073ed6da7aba4dd38aa36386d1de58786deeccbf908eeee4a41b95e362a1ef45baf023df40d2cf
-
C:\Users\Admin\AppData\Local\5eB8\recdisc.exeMD5
d1028c10d2c261d3470df8ff6347981b
SHA104a99956e99b8dbed380df60e0812e92685b6ca9
SHA256063e57b52257fda4cfa15c98a84f3461a9fb1c9d39e6ab55eae41a793a4d852b
SHA51280922e37cdfe69d5390f8a5bf8f0aab98407d40549c8972c33c6b9ef15b38962887ef4637c81c248ba7ee649bfe20f318358359140d879f7e2820e135e11a9c3
-
C:\Users\Admin\AppData\Local\9MbA\InfDefaultInstall.exeMD5
f6ae349f1213aea7dfe83b1292e1bb7e
SHA112023a2d08978dba0c6a701197c249751ee30e1e
SHA256c374b081881eafe94338f12f9bc8288c5fe510a4fb3260cb0fd0135646dd768c
SHA5120a23f91c4f6e4780c4096fae817a6753daa72b5b290f6be0593ef055f4149fc2294e35661adf75f529c5b72801062e8fb46f4fccd83dbea7603f6e6a4aefee74
-
C:\Users\Admin\AppData\Local\9MbA\newdev.dllMD5
1c3651083aff69064d36bafef35d5ea1
SHA19b773850f047cbd610268b52f0276882e9d93396
SHA25608f6b695b3eacb88fb11b47813f3745e929507acd6241e29675f2f42e6607d0d
SHA5127c93818630ef5a1bc7ce6ec99982050a0c610f584d995932d20694360154e1a266d492197dfb459b47dbb05bb6b048ca3c70af8d6c224217b8d1568c4297a820
-
C:\Users\Admin\AppData\Local\JIkNCL\XmlLite.dllMD5
fe28d4bf041b92d64083dd702ea55534
SHA10f73d4f4cb8d7484af5cf46f4b5cbf658fcd2dd3
SHA25655210dec835f222b06e7acf852340eff8291053769213d3072ac2a83ee2ebf0c
SHA512a7fbadf2d3a5de79f19edd9630303c9689d987b2ed79d06c3ea67251135472c1d5538c0282a89f96ff4b9d0e0ba8ea67b1cd3b5053464e6b5ed0ddd34473690a
-
C:\Users\Admin\AppData\Local\JIkNCL\psr.exeMD5
264a61b365dd314f3c82d1efba60fe17
SHA19a778a13f5e85d7c5bf2e21ceb398ae0a4300ffa
SHA256880fafbd4087442964a7780331a0e8dd43b78e2106e9df545f0432d4aa15ce93
SHA5129b26021b49ed0f8cfb05d9c8f5e0cec7beaebe9ee14acfc3237cec1255bb9e6a4f5f7a6b902f3d561bbbac7489f64e5a39f498261eef7e93178be97f9cc15e3c
-
\Users\Admin\AppData\Local\5eB8\ReAgent.dllMD5
6267d6ab8e62597318e2f11688ef4825
SHA1bfe598d8c69e0d7629842c837362c7751f2d1090
SHA2560360cd43f62b886b1d3fbcdbdfc5f8007796b5fd9b8a3e31cd45ba46863eda90
SHA5127c92cee2022e995861238a3a11d1579b2162461125e901a148073ed6da7aba4dd38aa36386d1de58786deeccbf908eeee4a41b95e362a1ef45baf023df40d2cf
-
\Users\Admin\AppData\Local\9MbA\newdev.dllMD5
1c3651083aff69064d36bafef35d5ea1
SHA19b773850f047cbd610268b52f0276882e9d93396
SHA25608f6b695b3eacb88fb11b47813f3745e929507acd6241e29675f2f42e6607d0d
SHA5127c93818630ef5a1bc7ce6ec99982050a0c610f584d995932d20694360154e1a266d492197dfb459b47dbb05bb6b048ca3c70af8d6c224217b8d1568c4297a820
-
\Users\Admin\AppData\Local\JIkNCL\XmlLite.dllMD5
fe28d4bf041b92d64083dd702ea55534
SHA10f73d4f4cb8d7484af5cf46f4b5cbf658fcd2dd3
SHA25655210dec835f222b06e7acf852340eff8291053769213d3072ac2a83ee2ebf0c
SHA512a7fbadf2d3a5de79f19edd9630303c9689d987b2ed79d06c3ea67251135472c1d5538c0282a89f96ff4b9d0e0ba8ea67b1cd3b5053464e6b5ed0ddd34473690a
-
memory/632-167-0x000001AE15CE0000-0x000001AE15CE2000-memory.dmpFilesize
8KB
-
memory/632-160-0x0000000000000000-mapping.dmp
-
memory/632-168-0x000001AE15CE0000-0x000001AE15CE2000-memory.dmpFilesize
8KB
-
memory/632-169-0x000001AE15CE0000-0x000001AE15CE2000-memory.dmpFilesize
8KB
-
memory/2416-132-0x0000000140000000-0x0000000140156000-memory.dmpFilesize
1.3MB
-
memory/2416-125-0x0000000140000000-0x0000000140156000-memory.dmpFilesize
1.3MB
-
memory/2416-134-0x0000000140000000-0x0000000140156000-memory.dmpFilesize
1.3MB
-
memory/2416-136-0x0000000140000000-0x0000000140156000-memory.dmpFilesize
1.3MB
-
memory/2416-137-0x0000000140000000-0x0000000140156000-memory.dmpFilesize
1.3MB
-
memory/2416-138-0x0000000140000000-0x0000000140156000-memory.dmpFilesize
1.3MB
-
memory/2416-139-0x0000000140000000-0x0000000140156000-memory.dmpFilesize
1.3MB
-
memory/2416-145-0x0000000000940000-0x0000000000942000-memory.dmpFilesize
8KB
-
memory/2416-146-0x0000000000940000-0x0000000000942000-memory.dmpFilesize
8KB
-
memory/2416-147-0x00007FFB741F5000-0x00007FFB741F6000-memory.dmpFilesize
4KB
-
memory/2416-148-0x0000000000940000-0x0000000000942000-memory.dmpFilesize
8KB
-
memory/2416-149-0x00007FFB74140000-0x00007FFB74150000-memory.dmpFilesize
64KB
-
memory/2416-180-0x0000000000940000-0x0000000000942000-memory.dmpFilesize
8KB
-
memory/2416-133-0x0000000140000000-0x0000000140156000-memory.dmpFilesize
1.3MB
-
memory/2416-124-0x0000000000900000-0x0000000000901000-memory.dmpFilesize
4KB
-
memory/2416-131-0x0000000140000000-0x0000000140156000-memory.dmpFilesize
1.3MB
-
memory/2416-135-0x0000000140000000-0x0000000140156000-memory.dmpFilesize
1.3MB
-
memory/2416-126-0x0000000140000000-0x0000000140156000-memory.dmpFilesize
1.3MB
-
memory/2416-127-0x0000000140000000-0x0000000140156000-memory.dmpFilesize
1.3MB
-
memory/2416-128-0x0000000140000000-0x0000000140156000-memory.dmpFilesize
1.3MB
-
memory/2416-130-0x0000000140000000-0x0000000140156000-memory.dmpFilesize
1.3MB
-
memory/2416-129-0x0000000140000000-0x0000000140156000-memory.dmpFilesize
1.3MB
-
memory/3728-177-0x0000018A2DE70000-0x0000018A2DE72000-memory.dmpFilesize
8KB
-
memory/3728-170-0x0000000000000000-mapping.dmp
-
memory/3728-178-0x0000018A2DE70000-0x0000018A2DE72000-memory.dmpFilesize
8KB
-
memory/3728-179-0x0000018A2DE70000-0x0000018A2DE72000-memory.dmpFilesize
8KB
-
memory/3968-118-0x0000000140000000-0x0000000140156000-memory.dmpFilesize
1.3MB
-
memory/3968-123-0x0000027145DB0000-0x0000027145DB7000-memory.dmpFilesize
28KB
-
memory/3968-122-0x0000027145DC0000-0x0000027145DC2000-memory.dmpFilesize
8KB
-
memory/3968-121-0x0000027145DC0000-0x0000027145DC2000-memory.dmpFilesize
8KB
-
memory/4404-158-0x00000177E0F20000-0x00000177E0F22000-memory.dmpFilesize
8KB
-
memory/4404-157-0x00000177E0F20000-0x00000177E0F22000-memory.dmpFilesize
8KB
-
memory/4404-154-0x0000000140000000-0x0000000140157000-memory.dmpFilesize
1.3MB
-
memory/4404-159-0x00000177E0F20000-0x00000177E0F22000-memory.dmpFilesize
8KB
-
memory/4404-150-0x0000000000000000-mapping.dmp