Analysis
-
max time kernel
153s -
max time network
129s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
26-11-2021 09:29
Static task
static1
Behavioral task
behavioral1
Sample
31a694cd04044831b2125f6cf16bc9dd342aee9ea89181e1aa302c82951cd956.dll
Resource
win7-en-20211104
General
-
Target
31a694cd04044831b2125f6cf16bc9dd342aee9ea89181e1aa302c82951cd956.dll
-
Size
1.3MB
-
MD5
d6d2b7aa9232eeda14644138ddbc6569
-
SHA1
6b419ed314f2bc61d236344b4cf302f0e9f2c237
-
SHA256
31a694cd04044831b2125f6cf16bc9dd342aee9ea89181e1aa302c82951cd956
-
SHA512
1a8fc090d443475b0a90d5b1aebe0d0e06f3caa3fef851df95070649de7a93c033519afe8df3f56984261b4db46b38b1e008a085e058e78a02ee274d7e45fc14
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2880-122-0x0000000000830000-0x0000000000831000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
printfilterpipelinesvc.exePasswordOnWakeSettingFlyout.exerstrui.exepid process 1020 printfilterpipelinesvc.exe 816 PasswordOnWakeSettingFlyout.exe 1316 rstrui.exe -
Loads dropped DLL 3 IoCs
Processes:
printfilterpipelinesvc.exePasswordOnWakeSettingFlyout.exerstrui.exepid process 1020 printfilterpipelinesvc.exe 816 PasswordOnWakeSettingFlyout.exe 1316 rstrui.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\Slqggwbvaxk = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\QUICKL~1\\2KOTDV~1\\PASSWO~1.EXE" -
Processes:
PasswordOnWakeSettingFlyout.exerstrui.exerundll32.exeprintfilterpipelinesvc.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PasswordOnWakeSettingFlyout.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rstrui.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA printfilterpipelinesvc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exeprintfilterpipelinesvc.exepid process 4204 rundll32.exe 4204 rundll32.exe 4204 rundll32.exe 4204 rundll32.exe 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 1020 printfilterpipelinesvc.exe 1020 printfilterpipelinesvc.exe 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 2880 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2880 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 2880 wrote to memory of 2452 2880 printfilterpipelinesvc.exe PID 2880 wrote to memory of 2452 2880 printfilterpipelinesvc.exe PID 2880 wrote to memory of 1020 2880 printfilterpipelinesvc.exe PID 2880 wrote to memory of 1020 2880 printfilterpipelinesvc.exe PID 2880 wrote to memory of 792 2880 PasswordOnWakeSettingFlyout.exe PID 2880 wrote to memory of 792 2880 PasswordOnWakeSettingFlyout.exe PID 2880 wrote to memory of 816 2880 PasswordOnWakeSettingFlyout.exe PID 2880 wrote to memory of 816 2880 PasswordOnWakeSettingFlyout.exe PID 2880 wrote to memory of 1216 2880 rstrui.exe PID 2880 wrote to memory of 1216 2880 rstrui.exe PID 2880 wrote to memory of 1316 2880 rstrui.exe PID 2880 wrote to memory of 1316 2880 rstrui.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\31a694cd04044831b2125f6cf16bc9dd342aee9ea89181e1aa302c82951cd956.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe1⤵
-
C:\Users\Admin\AppData\Local\Wv0Pz\printfilterpipelinesvc.exeC:\Users\Admin\AppData\Local\Wv0Pz\printfilterpipelinesvc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\PasswordOnWakeSettingFlyout.exeC:\Windows\system32\PasswordOnWakeSettingFlyout.exe1⤵
-
C:\Users\Admin\AppData\Local\qN5uEva2W\PasswordOnWakeSettingFlyout.exeC:\Users\Admin\AppData\Local\qN5uEva2W\PasswordOnWakeSettingFlyout.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\rstrui.exeC:\Windows\system32\rstrui.exe1⤵
-
C:\Users\Admin\AppData\Local\6gDogr\rstrui.exeC:\Users\Admin\AppData\Local\6gDogr\rstrui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\6gDogr\SRCORE.dllMD5
2178ef19417e49ad87c56bfe720fe71e
SHA133658c4fcac301a561fd9e9c0ab55e0932e0572c
SHA25631d89ab3ba7b5acf91ec2fb295160c8c30d418f5cb5f9c3188c44ec9200aafa7
SHA5122d9210197d8d7216ba61dde7fbb5f5854d62ba48840d35bf94c813e8d6c4634b3cad8e956df28a794fdde0e6249a97198861a9803258958cd53003f3089320b5
-
C:\Users\Admin\AppData\Local\6gDogr\rstrui.exeMD5
c0167cf19678a97a78a675ef18b7fc85
SHA1f7589dcdff216ca879dba1d68764b2cf69652d3b
SHA256b1aacd2735f524f8460c031a4f66e78fb09cffbc7350fac5695d448a287fb7cb
SHA512f71ca6d233784312dce0e5867d2710de40c738bb567aac212ccd78804176ac51b9ae82bc2ba0498cdd24893f3d3fa6cfddd0d7a9d2c1bd9148916961d6ee0c44
-
C:\Users\Admin\AppData\Local\Wv0Pz\XmlLite.dllMD5
460fc7d74f130a1069aaa54a4e207452
SHA10d6c57c27e667eb9f5a9f7884eb6dadf057ffbe2
SHA256b6f18b96fa29906b7a3066755ec7db26377e5656f401029c9382aedcfa7e066d
SHA512f16818239bf873444a9d29039556608dc1806e6fd4c7b9b6abdb357fa91d50cd888ae45b0fe3f73f016dec58df26fb5ed994c0f17fbf5e73f4fa32f373446c91
-
C:\Users\Admin\AppData\Local\Wv0Pz\printfilterpipelinesvc.exeMD5
3f759db69d6016c286bd25f10e4b6e0c
SHA1e2243c1e27b9a0b68e550e1775aa75f3bafd5286
SHA256eeb432af61d3157153cc6683ae4ffbb44b306ed0b980911be2891358048dc7c7
SHA51267f0cf128a048139b5ceb0b6fb88498076b60d5822fe807fe1ab0d1856e74096d3625cb824a80066b6a27ae0929c44164fc6e8e56cfc18b04e25ebcd51d948ac
-
C:\Users\Admin\AppData\Local\qN5uEva2W\DUI70.dllMD5
6aca2ec183e2e854a582922299d23e61
SHA17062e4d5ec70561dd06b664867be3240a9f8039d
SHA256a69b440fc6357742ab9b7da11cd8c12a343f5971c9bff036a072ea166e76e477
SHA51221cb7096d8812011891e9c6a38aec11d7e80782914bae24ecd5af3572b671f8d51e68b2887b702758cd4ae5076b23c6b4990460fe4241a16316306f71722ca52
-
C:\Users\Admin\AppData\Local\qN5uEva2W\PasswordOnWakeSettingFlyout.exeMD5
a81fed73da02db15df427da1cd5f4141
SHA1f831fc6377a6264be621e23635f22b437129b2ce
SHA2561afed5b9302a4a4669ac7f966b7cf9fcaab037e94a0b3cabea3631055c97d3a5
SHA5123c4541160f0f69d1c3a9dc4e67643864493eadb0450426f7f323d87fa7b0c81d96ef2201d33b3421a307171274615e90d4ee8bd07107ff4f75beedec0a2bf156
-
\Users\Admin\AppData\Local\6gDogr\SRCORE.dllMD5
2178ef19417e49ad87c56bfe720fe71e
SHA133658c4fcac301a561fd9e9c0ab55e0932e0572c
SHA25631d89ab3ba7b5acf91ec2fb295160c8c30d418f5cb5f9c3188c44ec9200aafa7
SHA5122d9210197d8d7216ba61dde7fbb5f5854d62ba48840d35bf94c813e8d6c4634b3cad8e956df28a794fdde0e6249a97198861a9803258958cd53003f3089320b5
-
\Users\Admin\AppData\Local\Wv0Pz\XmlLite.dllMD5
460fc7d74f130a1069aaa54a4e207452
SHA10d6c57c27e667eb9f5a9f7884eb6dadf057ffbe2
SHA256b6f18b96fa29906b7a3066755ec7db26377e5656f401029c9382aedcfa7e066d
SHA512f16818239bf873444a9d29039556608dc1806e6fd4c7b9b6abdb357fa91d50cd888ae45b0fe3f73f016dec58df26fb5ed994c0f17fbf5e73f4fa32f373446c91
-
\Users\Admin\AppData\Local\qN5uEva2W\DUI70.dllMD5
6aca2ec183e2e854a582922299d23e61
SHA17062e4d5ec70561dd06b664867be3240a9f8039d
SHA256a69b440fc6357742ab9b7da11cd8c12a343f5971c9bff036a072ea166e76e477
SHA51221cb7096d8812011891e9c6a38aec11d7e80782914bae24ecd5af3572b671f8d51e68b2887b702758cd4ae5076b23c6b4990460fe4241a16316306f71722ca52
-
memory/816-172-0x000001ED747B0000-0x000001ED747B2000-memory.dmpFilesize
8KB
-
memory/816-164-0x0000000000000000-mapping.dmp
-
memory/816-168-0x00007FFF30BD0000-0x00007FFF30D63000-memory.dmpFilesize
1.6MB
-
memory/816-173-0x000001ED747B0000-0x000001ED747B2000-memory.dmpFilesize
8KB
-
memory/816-174-0x000001ED747B0000-0x000001ED747B2000-memory.dmpFilesize
8KB
-
memory/1020-163-0x000001A894E60000-0x000001A894E62000-memory.dmpFilesize
8KB
-
memory/1020-153-0x0000000000000000-mapping.dmp
-
memory/1020-162-0x000001A894E60000-0x000001A894E62000-memory.dmpFilesize
8KB
-
memory/1020-161-0x000001A894E60000-0x000001A894E62000-memory.dmpFilesize
8KB
-
memory/1020-157-0x00007FFF30C20000-0x00007FFF30D6E000-memory.dmpFilesize
1.3MB
-
memory/1316-175-0x0000000000000000-mapping.dmp
-
memory/1316-183-0x000001CC01B50000-0x000001CC01B52000-memory.dmpFilesize
8KB
-
memory/1316-184-0x000001CC01B50000-0x000001CC01B52000-memory.dmpFilesize
8KB
-
memory/1316-185-0x000001CC01B50000-0x000001CC01B52000-memory.dmpFilesize
8KB
-
memory/2880-132-0x0000000140000000-0x000000014014D000-memory.dmpFilesize
1.3MB
-
memory/2880-134-0x0000000140000000-0x000000014014D000-memory.dmpFilesize
1.3MB
-
memory/2880-143-0x0000000140000000-0x000000014014D000-memory.dmpFilesize
1.3MB
-
memory/2880-148-0x0000000000870000-0x0000000000872000-memory.dmpFilesize
8KB
-
memory/2880-149-0x0000000000870000-0x0000000000872000-memory.dmpFilesize
8KB
-
memory/2880-150-0x00007FFF3EAD5000-0x00007FFF3EAD6000-memory.dmpFilesize
4KB
-
memory/2880-151-0x0000000000870000-0x0000000000872000-memory.dmpFilesize
8KB
-
memory/2880-152-0x00007FFF3EA20000-0x00007FFF3EA30000-memory.dmpFilesize
64KB
-
memory/2880-141-0x0000000140000000-0x000000014014D000-memory.dmpFilesize
1.3MB
-
memory/2880-139-0x0000000140000000-0x000000014014D000-memory.dmpFilesize
1.3MB
-
memory/2880-140-0x0000000140000000-0x000000014014D000-memory.dmpFilesize
1.3MB
-
memory/2880-138-0x0000000140000000-0x000000014014D000-memory.dmpFilesize
1.3MB
-
memory/2880-137-0x0000000140000000-0x000000014014D000-memory.dmpFilesize
1.3MB
-
memory/2880-136-0x0000000140000000-0x000000014014D000-memory.dmpFilesize
1.3MB
-
memory/2880-135-0x0000000140000000-0x000000014014D000-memory.dmpFilesize
1.3MB
-
memory/2880-142-0x0000000140000000-0x000000014014D000-memory.dmpFilesize
1.3MB
-
memory/2880-131-0x0000000140000000-0x000000014014D000-memory.dmpFilesize
1.3MB
-
memory/2880-133-0x0000000140000000-0x000000014014D000-memory.dmpFilesize
1.3MB
-
memory/2880-122-0x0000000000830000-0x0000000000831000-memory.dmpFilesize
4KB
-
memory/2880-130-0x0000000140000000-0x000000014014D000-memory.dmpFilesize
1.3MB
-
memory/2880-129-0x0000000140000000-0x000000014014D000-memory.dmpFilesize
1.3MB
-
memory/2880-128-0x0000000140000000-0x000000014014D000-memory.dmpFilesize
1.3MB
-
memory/2880-127-0x0000000140000000-0x000000014014D000-memory.dmpFilesize
1.3MB
-
memory/2880-126-0x0000000140000000-0x000000014014D000-memory.dmpFilesize
1.3MB
-
memory/2880-125-0x0000000140000000-0x000000014014D000-memory.dmpFilesize
1.3MB
-
memory/2880-124-0x0000000140000000-0x000000014014D000-memory.dmpFilesize
1.3MB
-
memory/2880-123-0x0000000140000000-0x000000014014D000-memory.dmpFilesize
1.3MB
-
memory/4204-115-0x00007FFF30C20000-0x00007FFF30D6D000-memory.dmpFilesize
1.3MB
-
memory/4204-121-0x000001452B570000-0x000001452B577000-memory.dmpFilesize
28KB
-
memory/4204-120-0x000001452B580000-0x000001452B582000-memory.dmpFilesize
8KB
-
memory/4204-119-0x000001452B580000-0x000001452B582000-memory.dmpFilesize
8KB