Analysis
-
max time kernel
151s -
max time network
119s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
26-11-2021 09:29
Static task
static1
Behavioral task
behavioral1
Sample
a435f616d20bb7534e2a3a7ac480e52792c472ee0fd1e83c3203167af1c93407.dll
Resource
win7-en-20211104
General
-
Target
a435f616d20bb7534e2a3a7ac480e52792c472ee0fd1e83c3203167af1c93407.dll
-
Size
1.3MB
-
MD5
96a1a6247fd9266b2df8e83e40ec5066
-
SHA1
5af3279ed13f24ed21fc1c5de232f81e9a8defca
-
SHA256
a435f616d20bb7534e2a3a7ac480e52792c472ee0fd1e83c3203167af1c93407
-
SHA512
5256356f114d86110fa1d0f640dad9833b20366a0c9687dbdfcdc6cc71d6ef0d6ef8eefa2cc79afa3202f415af638a1384ab6b6a1517a8566f186a54a72cf6a9
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1220-60-0x0000000002140000-0x0000000002141000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
tabcal.exeRDVGHelper.exexpsrchvw.exepid process 1048 tabcal.exe 1940 RDVGHelper.exe 1392 xpsrchvw.exe -
Loads dropped DLL 7 IoCs
Processes:
tabcal.exeRDVGHelper.exexpsrchvw.exepid process 1220 1048 tabcal.exe 1220 1940 RDVGHelper.exe 1220 1392 xpsrchvw.exe 1220 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Windows\CurrentVersion\Run\Myzdcwow = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\QUICKL~1\\USERPI~1\\TaskBar\\fRE0wL\\RDVGHE~1.EXE" -
Processes:
xpsrchvw.exerundll32.exetabcal.exeRDVGHelper.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xpsrchvw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tabcal.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RDVGHelper.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exetabcal.exeRDVGHelper.exepid process 332 rundll32.exe 332 rundll32.exe 332 rundll32.exe 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1048 tabcal.exe 1048 tabcal.exe 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1220 1940 RDVGHelper.exe 1940 RDVGHelper.exe 1220 1220 1220 1220 1220 1220 1220 1220 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1220 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1220 wrote to memory of 432 1220 tabcal.exe PID 1220 wrote to memory of 432 1220 tabcal.exe PID 1220 wrote to memory of 432 1220 tabcal.exe PID 1220 wrote to memory of 1048 1220 tabcal.exe PID 1220 wrote to memory of 1048 1220 tabcal.exe PID 1220 wrote to memory of 1048 1220 tabcal.exe PID 1220 wrote to memory of 1312 1220 RDVGHelper.exe PID 1220 wrote to memory of 1312 1220 RDVGHelper.exe PID 1220 wrote to memory of 1312 1220 RDVGHelper.exe PID 1220 wrote to memory of 1940 1220 RDVGHelper.exe PID 1220 wrote to memory of 1940 1220 RDVGHelper.exe PID 1220 wrote to memory of 1940 1220 RDVGHelper.exe PID 1220 wrote to memory of 1480 1220 xpsrchvw.exe PID 1220 wrote to memory of 1480 1220 xpsrchvw.exe PID 1220 wrote to memory of 1480 1220 xpsrchvw.exe PID 1220 wrote to memory of 1392 1220 xpsrchvw.exe PID 1220 wrote to memory of 1392 1220 xpsrchvw.exe PID 1220 wrote to memory of 1392 1220 xpsrchvw.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a435f616d20bb7534e2a3a7ac480e52792c472ee0fd1e83c3203167af1c93407.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tabcal.exeC:\Windows\system32\tabcal.exe1⤵
-
C:\Users\Admin\AppData\Local\w2nXP\tabcal.exeC:\Users\Admin\AppData\Local\w2nXP\tabcal.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\RDVGHelper.exeC:\Windows\system32\RDVGHelper.exe1⤵
-
C:\Users\Admin\AppData\Local\7Gri\RDVGHelper.exeC:\Users\Admin\AppData\Local\7Gri\RDVGHelper.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\xpsrchvw.exeC:\Windows\system32\xpsrchvw.exe1⤵
-
C:\Users\Admin\AppData\Local\FS6omBaL\xpsrchvw.exeC:\Users\Admin\AppData\Local\FS6omBaL\xpsrchvw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\7Gri\RDVGHelper.exeMD5
53fda4af81e7c4895357a50e848b7cfe
SHA101fb2d0210f1c47aaf684e31a9fb78f89bba9c0f
SHA25662ab8c2c5b5bd84fd07e96b6a3b87a4ea56946107ed9b7f8076580ae1fefd038
SHA512dbbda90a57d27160c5a3a5e4e94cfc43b1663fcbfe424fdec851e52356f61492bdcf677c46be8aa4e8ccc8be7c389b6aa7bbbce8447e1fae32f03e5e409f4051
-
C:\Users\Admin\AppData\Local\7Gri\dwmapi.dllMD5
bd6e16b09e9b03a55d327678c1c0ba3f
SHA1c11200f2eea1ef2771ea77569e9536ddfa051e13
SHA25672b617c6ebbbaf4581e9673b4c048e6535e22d745ded396cf66857be161f4a64
SHA512b0e6fd5e1ab23a85bec8c2c5ae32f42d9c4dd99b571a2981131fb7e9b9756430534a17a3f10c2976cf6cfe92142fe3ba734cbff2b7bbe316ae4b70c231a9d465
-
C:\Users\Admin\AppData\Local\FS6omBaL\WINMM.dllMD5
fdbd45c92456339a44ef1cd7f241bc81
SHA1846a30cfb4f79d9698e2c82deb40322869a6d0f3
SHA25660183a76427daafdead14b7f6af262edd1d4f52ad7fd87628d92132e54781b94
SHA5123ce1ecfbc433798874daf4d25e80048f9f3ff91ebb29d1dd19952a93a8c7bda4fac49157dfa04dab3e491741b1ef2e11d19479b313190217096ed2a3fc74ecd0
-
C:\Users\Admin\AppData\Local\FS6omBaL\xpsrchvw.exeMD5
492cb6a624d5dad73ee0294b5db37dd6
SHA1e74806af04a5147ccabfb5b167eb95a0177c43b3
SHA256ccb4ecd48561ce024ea176b7036f0f2713b98bc82aa37347a30d8187762a8784
SHA51263bf2931764efe767fb42f9576702dd585a032f74ad2be2481eaf309f34950f05974d77b5cb220a3ff89c92af0c7693dc558f8e3a3ee2a0be6c5c07171d03835
-
C:\Users\Admin\AppData\Local\w2nXP\HID.DLLMD5
6a3eb005c65690fdcabb0418a6a19807
SHA109087591748e7065ba6cfcad4032bcff5f0d7a35
SHA25655b1a1dd6b1bbce0b44660529496ab2459d07888768dfdba8dc7dd5c471f8ada
SHA512eae8c5ccfce30ebc90f56506dc0c384636f341af86f19f6ce446a7d8c2b46a575f3608bb7a693900c4d4995f300d3e58fc4b61aa940f60a7856d9f418725c401
-
C:\Users\Admin\AppData\Local\w2nXP\tabcal.exeMD5
98e7911befe83f76777317ce6905666d
SHA12780088dffe1dd1356c5dd5112a9f04afee3ee8d
SHA2563fe8b63367b4298e70d46e87ce04cc7af5f30dfdb86b79eae41d0731d9415ea1
SHA512fc0226381d9a6984cccac8282697c78966524e1359f7f6044559b8223e773d3c108dda08a2dd283aa171dca3390801f2c92a5d1dbb978dd7f92a67bd8877b8b6
-
\Users\Admin\AppData\Local\7Gri\RDVGHelper.exeMD5
53fda4af81e7c4895357a50e848b7cfe
SHA101fb2d0210f1c47aaf684e31a9fb78f89bba9c0f
SHA25662ab8c2c5b5bd84fd07e96b6a3b87a4ea56946107ed9b7f8076580ae1fefd038
SHA512dbbda90a57d27160c5a3a5e4e94cfc43b1663fcbfe424fdec851e52356f61492bdcf677c46be8aa4e8ccc8be7c389b6aa7bbbce8447e1fae32f03e5e409f4051
-
\Users\Admin\AppData\Local\7Gri\dwmapi.dllMD5
bd6e16b09e9b03a55d327678c1c0ba3f
SHA1c11200f2eea1ef2771ea77569e9536ddfa051e13
SHA25672b617c6ebbbaf4581e9673b4c048e6535e22d745ded396cf66857be161f4a64
SHA512b0e6fd5e1ab23a85bec8c2c5ae32f42d9c4dd99b571a2981131fb7e9b9756430534a17a3f10c2976cf6cfe92142fe3ba734cbff2b7bbe316ae4b70c231a9d465
-
\Users\Admin\AppData\Local\FS6omBaL\WINMM.dllMD5
fdbd45c92456339a44ef1cd7f241bc81
SHA1846a30cfb4f79d9698e2c82deb40322869a6d0f3
SHA25660183a76427daafdead14b7f6af262edd1d4f52ad7fd87628d92132e54781b94
SHA5123ce1ecfbc433798874daf4d25e80048f9f3ff91ebb29d1dd19952a93a8c7bda4fac49157dfa04dab3e491741b1ef2e11d19479b313190217096ed2a3fc74ecd0
-
\Users\Admin\AppData\Local\FS6omBaL\xpsrchvw.exeMD5
492cb6a624d5dad73ee0294b5db37dd6
SHA1e74806af04a5147ccabfb5b167eb95a0177c43b3
SHA256ccb4ecd48561ce024ea176b7036f0f2713b98bc82aa37347a30d8187762a8784
SHA51263bf2931764efe767fb42f9576702dd585a032f74ad2be2481eaf309f34950f05974d77b5cb220a3ff89c92af0c7693dc558f8e3a3ee2a0be6c5c07171d03835
-
\Users\Admin\AppData\Local\w2nXP\HID.DLLMD5
6a3eb005c65690fdcabb0418a6a19807
SHA109087591748e7065ba6cfcad4032bcff5f0d7a35
SHA25655b1a1dd6b1bbce0b44660529496ab2459d07888768dfdba8dc7dd5c471f8ada
SHA512eae8c5ccfce30ebc90f56506dc0c384636f341af86f19f6ce446a7d8c2b46a575f3608bb7a693900c4d4995f300d3e58fc4b61aa940f60a7856d9f418725c401
-
\Users\Admin\AppData\Local\w2nXP\tabcal.exeMD5
98e7911befe83f76777317ce6905666d
SHA12780088dffe1dd1356c5dd5112a9f04afee3ee8d
SHA2563fe8b63367b4298e70d46e87ce04cc7af5f30dfdb86b79eae41d0731d9415ea1
SHA512fc0226381d9a6984cccac8282697c78966524e1359f7f6044559b8223e773d3c108dda08a2dd283aa171dca3390801f2c92a5d1dbb978dd7f92a67bd8877b8b6
-
\Users\Admin\AppData\Roaming\Macromedia\Flash Player\macromedia.com\support\flashplayer\9cgR0\xpsrchvw.exeMD5
492cb6a624d5dad73ee0294b5db37dd6
SHA1e74806af04a5147ccabfb5b167eb95a0177c43b3
SHA256ccb4ecd48561ce024ea176b7036f0f2713b98bc82aa37347a30d8187762a8784
SHA51263bf2931764efe767fb42f9576702dd585a032f74ad2be2481eaf309f34950f05974d77b5cb220a3ff89c92af0c7693dc558f8e3a3ee2a0be6c5c07171d03835
-
memory/332-59-0x0000000000180000-0x0000000000187000-memory.dmpFilesize
28KB
-
memory/332-55-0x000007FEF6830000-0x000007FEF6978000-memory.dmpFilesize
1.3MB
-
memory/1048-88-0x000007FEF6C30000-0x000007FEF6D79000-memory.dmpFilesize
1.3MB
-
memory/1048-84-0x0000000000000000-mapping.dmp
-
memory/1220-71-0x0000000140000000-0x0000000140148000-memory.dmpFilesize
1.3MB
-
memory/1220-74-0x0000000140000000-0x0000000140148000-memory.dmpFilesize
1.3MB
-
memory/1220-77-0x0000000140000000-0x0000000140148000-memory.dmpFilesize
1.3MB
-
memory/1220-82-0x00000000776B0000-0x00000000776B2000-memory.dmpFilesize
8KB
-
memory/1220-64-0x0000000140000000-0x0000000140148000-memory.dmpFilesize
1.3MB
-
memory/1220-65-0x0000000140000000-0x0000000140148000-memory.dmpFilesize
1.3MB
-
memory/1220-66-0x0000000140000000-0x0000000140148000-memory.dmpFilesize
1.3MB
-
memory/1220-67-0x0000000140000000-0x0000000140148000-memory.dmpFilesize
1.3MB
-
memory/1220-68-0x0000000140000000-0x0000000140148000-memory.dmpFilesize
1.3MB
-
memory/1220-69-0x0000000140000000-0x0000000140148000-memory.dmpFilesize
1.3MB
-
memory/1220-70-0x0000000140000000-0x0000000140148000-memory.dmpFilesize
1.3MB
-
memory/1220-72-0x0000000140000000-0x0000000140148000-memory.dmpFilesize
1.3MB
-
memory/1220-60-0x0000000002140000-0x0000000002141000-memory.dmpFilesize
4KB
-
memory/1220-63-0x0000000140000000-0x0000000140148000-memory.dmpFilesize
1.3MB
-
memory/1220-75-0x0000000140000000-0x0000000140148000-memory.dmpFilesize
1.3MB
-
memory/1220-61-0x0000000140000000-0x0000000140148000-memory.dmpFilesize
1.3MB
-
memory/1220-76-0x0000000140000000-0x0000000140148000-memory.dmpFilesize
1.3MB
-
memory/1220-62-0x0000000140000000-0x0000000140148000-memory.dmpFilesize
1.3MB
-
memory/1220-73-0x0000000140000000-0x0000000140148000-memory.dmpFilesize
1.3MB
-
memory/1392-104-0x000007FEFBF21000-0x000007FEFBF23000-memory.dmpFilesize
8KB
-
memory/1392-102-0x0000000000000000-mapping.dmp
-
memory/1392-107-0x00000000FF1D1000-0x00000000FF1D3000-memory.dmpFilesize
8KB
-
memory/1392-108-0x000007FEF6690000-0x000007FEF67DA000-memory.dmpFilesize
1.3MB
-
memory/1940-97-0x000007FEF6830000-0x000007FEF6979000-memory.dmpFilesize
1.3MB
-
memory/1940-93-0x0000000000000000-mapping.dmp