Analysis
-
max time kernel
155s -
max time network
118s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
26-11-2021 09:31
Static task
static1
Behavioral task
behavioral1
Sample
551ffee108503aaa811686e21a22388d509a652f7f4876a12de86092e19c596c.dll
Resource
win7-en-20211014
General
-
Target
551ffee108503aaa811686e21a22388d509a652f7f4876a12de86092e19c596c.dll
-
Size
1.2MB
-
MD5
0cea842b15be5b2e537ddfed28706abe
-
SHA1
510fd4fba4122a2d5cea810cb8d90493ef9570e4
-
SHA256
551ffee108503aaa811686e21a22388d509a652f7f4876a12de86092e19c596c
-
SHA512
3aa534022e692349519019fdce5fd1b74aeea0f22e627627c795970deded152881d3ac3cab391e85fd0330b1cd91ed216c80a0a9b08a464ce59ac8a6dfea9960
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1352-59-0x0000000001DE0000-0x0000000001DE1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
msdt.exeSystemPropertiesHardware.exeraserver.exepid process 1288 msdt.exe 1320 SystemPropertiesHardware.exe 1192 raserver.exe -
Loads dropped DLL 7 IoCs
Processes:
msdt.exeSystemPropertiesHardware.exeraserver.exepid process 1352 1288 msdt.exe 1352 1320 SystemPropertiesHardware.exe 1352 1192 raserver.exe 1352 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gpavvclvseucyal = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\8lYHFh\\SYSTEM~1.EXE" -
Processes:
rundll32.exemsdt.exeSystemPropertiesHardware.exeraserver.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msdt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesHardware.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA raserver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 948 rundll32.exe 948 rundll32.exe 948 rundll32.exe 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 1352 -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
Processes:
rundll32.exemsdt.exeSystemPropertiesHardware.exeraserver.exepid process 948 rundll32.exe 1352 1288 msdt.exe 1320 SystemPropertiesHardware.exe 1192 raserver.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1352 wrote to memory of 1264 1352 msdt.exe PID 1352 wrote to memory of 1264 1352 msdt.exe PID 1352 wrote to memory of 1264 1352 msdt.exe PID 1352 wrote to memory of 1288 1352 msdt.exe PID 1352 wrote to memory of 1288 1352 msdt.exe PID 1352 wrote to memory of 1288 1352 msdt.exe PID 1352 wrote to memory of 1608 1352 SystemPropertiesHardware.exe PID 1352 wrote to memory of 1608 1352 SystemPropertiesHardware.exe PID 1352 wrote to memory of 1608 1352 SystemPropertiesHardware.exe PID 1352 wrote to memory of 1320 1352 SystemPropertiesHardware.exe PID 1352 wrote to memory of 1320 1352 SystemPropertiesHardware.exe PID 1352 wrote to memory of 1320 1352 SystemPropertiesHardware.exe PID 1352 wrote to memory of 1116 1352 raserver.exe PID 1352 wrote to memory of 1116 1352 raserver.exe PID 1352 wrote to memory of 1116 1352 raserver.exe PID 1352 wrote to memory of 1192 1352 raserver.exe PID 1352 wrote to memory of 1192 1352 raserver.exe PID 1352 wrote to memory of 1192 1352 raserver.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\551ffee108503aaa811686e21a22388d509a652f7f4876a12de86092e19c596c.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\msdt.exeC:\Windows\system32\msdt.exe1⤵
-
C:\Users\Admin\AppData\Local\NOOa\msdt.exeC:\Users\Admin\AppData\Local\NOOa\msdt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\SystemPropertiesHardware.exeC:\Windows\system32\SystemPropertiesHardware.exe1⤵
-
C:\Users\Admin\AppData\Local\NsCJlpK\SystemPropertiesHardware.exeC:\Users\Admin\AppData\Local\NsCJlpK\SystemPropertiesHardware.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\raserver.exeC:\Windows\system32\raserver.exe1⤵
-
C:\Users\Admin\AppData\Local\xB5QGXh\raserver.exeC:\Users\Admin\AppData\Local\xB5QGXh\raserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\NOOa\DUI70.dllMD5
247cc8283e2949e17868a3b50f7768f5
SHA19814364f5c1ac9d264531ba91d3bebbb9fc030fc
SHA256272835a6a7b1b67ac6b235e1363e23b484b9a9a84408b8f5d82661d7fe01eb62
SHA5129aa870ed249d47b88b9183c3c1437379fde1c0f29422f7f5fb6612c99c07b05eb2b527ec8ab4f8a0a450efd44847ec4aa7c77172972b09f0bfb1dde4e6211c4f
-
C:\Users\Admin\AppData\Local\NOOa\msdt.exeMD5
aecb7b09566b1f83f61d5a4b44ae9c7e
SHA13a4a2338c6b5ac833dc87497e04fe89c5481e289
SHA256fbdbe7a2027cab237c4635ef71c1a93cf7afc4b79d56b63a119b7f8e3029ccf5
SHA5126e14200262e0729ebcab2226c3eac729ab5af2a4c6f4f9c3e2950cc203387d9a0a447cf38665c724d4397353931fd10064dc067e043a3579538a6144e33e4746
-
C:\Users\Admin\AppData\Local\NsCJlpK\SYSDM.CPLMD5
a3ade37230c8849478349ffe49acfd35
SHA1e93973fa385c6174b3584d695051358b46022509
SHA256334de3271877e7c5df9f6738bac7ef1185d2be5615d7ed60767d0258bada5180
SHA5123f982a871d84c77cddd4e120a056faddf4982d870224b783def9abca79b98b1b277e9f66b1f9017b6a5ff47affed18a274df38e6319fc9a3f141ee9486d22658
-
C:\Users\Admin\AppData\Local\NsCJlpK\SystemPropertiesHardware.exeMD5
c63d722641c417764247f683f9fb43be
SHA1948ec61ebf241c4d80efca3efdfc33fe746e3b98
SHA2564759296b421d60c80db0bb112a30425e04883900374602e13ed97f7c03a49df2
SHA5127223d1c81a4785ed790ec2303d5d9d7ebcae9404d7bf173b3145e51202564de9977e94ac10ab80c6fe49b5f697af3ec70dfd922a891915e8951b5a1b5841c8be
-
C:\Users\Admin\AppData\Local\xB5QGXh\WTSAPI32.dllMD5
1d7c01d786391a0b50f8317057dddae9
SHA1677cfb74c4c47ae6699db65b29befe00c76b302e
SHA25693e7d67a37f9e94fa31cb979c9a11feef82c54a0afa7cacdb514dd334a22d4a1
SHA5129636f2f9695966f8ad376931857101112a7bf6b9c9100a893fd3b0b89945ac657bc1a33b6aecce3eb29bc4c55fffb125b8b1ed1c0e8967af78acbbfc4dc217af
-
C:\Users\Admin\AppData\Local\xB5QGXh\raserver.exeMD5
cd0bc0b6b8d219808aea3ecd4e889b19
SHA19f8f4071ce2484008e36fdfd963378f4ebad703f
SHA25616abc530c0367df1ad631f09e14c565cf99561949aa14acc533cd54bf8a5e22c
SHA51284291ea3fafb38ef96817d5fe4a972475ef8ea24a4353568029e892fa8e15cf8e8f6ef4ff567813cd3b38092f0db4577d9dccb22be755eebdd4f77e623dc80ac
-
\Users\Admin\AppData\Local\NOOa\DUI70.dllMD5
247cc8283e2949e17868a3b50f7768f5
SHA19814364f5c1ac9d264531ba91d3bebbb9fc030fc
SHA256272835a6a7b1b67ac6b235e1363e23b484b9a9a84408b8f5d82661d7fe01eb62
SHA5129aa870ed249d47b88b9183c3c1437379fde1c0f29422f7f5fb6612c99c07b05eb2b527ec8ab4f8a0a450efd44847ec4aa7c77172972b09f0bfb1dde4e6211c4f
-
\Users\Admin\AppData\Local\NOOa\msdt.exeMD5
aecb7b09566b1f83f61d5a4b44ae9c7e
SHA13a4a2338c6b5ac833dc87497e04fe89c5481e289
SHA256fbdbe7a2027cab237c4635ef71c1a93cf7afc4b79d56b63a119b7f8e3029ccf5
SHA5126e14200262e0729ebcab2226c3eac729ab5af2a4c6f4f9c3e2950cc203387d9a0a447cf38665c724d4397353931fd10064dc067e043a3579538a6144e33e4746
-
\Users\Admin\AppData\Local\NsCJlpK\SYSDM.CPLMD5
a3ade37230c8849478349ffe49acfd35
SHA1e93973fa385c6174b3584d695051358b46022509
SHA256334de3271877e7c5df9f6738bac7ef1185d2be5615d7ed60767d0258bada5180
SHA5123f982a871d84c77cddd4e120a056faddf4982d870224b783def9abca79b98b1b277e9f66b1f9017b6a5ff47affed18a274df38e6319fc9a3f141ee9486d22658
-
\Users\Admin\AppData\Local\NsCJlpK\SystemPropertiesHardware.exeMD5
c63d722641c417764247f683f9fb43be
SHA1948ec61ebf241c4d80efca3efdfc33fe746e3b98
SHA2564759296b421d60c80db0bb112a30425e04883900374602e13ed97f7c03a49df2
SHA5127223d1c81a4785ed790ec2303d5d9d7ebcae9404d7bf173b3145e51202564de9977e94ac10ab80c6fe49b5f697af3ec70dfd922a891915e8951b5a1b5841c8be
-
\Users\Admin\AppData\Local\xB5QGXh\WTSAPI32.dllMD5
1d7c01d786391a0b50f8317057dddae9
SHA1677cfb74c4c47ae6699db65b29befe00c76b302e
SHA25693e7d67a37f9e94fa31cb979c9a11feef82c54a0afa7cacdb514dd334a22d4a1
SHA5129636f2f9695966f8ad376931857101112a7bf6b9c9100a893fd3b0b89945ac657bc1a33b6aecce3eb29bc4c55fffb125b8b1ed1c0e8967af78acbbfc4dc217af
-
\Users\Admin\AppData\Local\xB5QGXh\raserver.exeMD5
cd0bc0b6b8d219808aea3ecd4e889b19
SHA19f8f4071ce2484008e36fdfd963378f4ebad703f
SHA25616abc530c0367df1ad631f09e14c565cf99561949aa14acc533cd54bf8a5e22c
SHA51284291ea3fafb38ef96817d5fe4a972475ef8ea24a4353568029e892fa8e15cf8e8f6ef4ff567813cd3b38092f0db4577d9dccb22be755eebdd4f77e623dc80ac
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\h0GL\raserver.exeMD5
cd0bc0b6b8d219808aea3ecd4e889b19
SHA19f8f4071ce2484008e36fdfd963378f4ebad703f
SHA25616abc530c0367df1ad631f09e14c565cf99561949aa14acc533cd54bf8a5e22c
SHA51284291ea3fafb38ef96817d5fe4a972475ef8ea24a4353568029e892fa8e15cf8e8f6ef4ff567813cd3b38092f0db4577d9dccb22be755eebdd4f77e623dc80ac
-
memory/948-55-0x0000000140000000-0x0000000140130000-memory.dmpFilesize
1.2MB
-
memory/948-58-0x0000000000100000-0x0000000000107000-memory.dmpFilesize
28KB
-
memory/1192-102-0x0000000000000000-mapping.dmp
-
memory/1288-90-0x0000000140000000-0x0000000140164000-memory.dmpFilesize
1.4MB
-
memory/1288-87-0x000007FEFC291000-0x000007FEFC293000-memory.dmpFilesize
8KB
-
memory/1288-85-0x0000000000000000-mapping.dmp
-
memory/1320-94-0x0000000000000000-mapping.dmp
-
memory/1320-98-0x0000000140000000-0x0000000140131000-memory.dmpFilesize
1.2MB
-
memory/1352-65-0x0000000140000000-0x0000000140130000-memory.dmpFilesize
1.2MB
-
memory/1352-83-0x0000000077BC0000-0x0000000077BC2000-memory.dmpFilesize
8KB
-
memory/1352-77-0x0000000140000000-0x0000000140130000-memory.dmpFilesize
1.2MB
-
memory/1352-76-0x0000000140000000-0x0000000140130000-memory.dmpFilesize
1.2MB
-
memory/1352-74-0x0000000140000000-0x0000000140130000-memory.dmpFilesize
1.2MB
-
memory/1352-75-0x0000000140000000-0x0000000140130000-memory.dmpFilesize
1.2MB
-
memory/1352-73-0x0000000140000000-0x0000000140130000-memory.dmpFilesize
1.2MB
-
memory/1352-72-0x0000000140000000-0x0000000140130000-memory.dmpFilesize
1.2MB
-
memory/1352-71-0x0000000140000000-0x0000000140130000-memory.dmpFilesize
1.2MB
-
memory/1352-70-0x0000000140000000-0x0000000140130000-memory.dmpFilesize
1.2MB
-
memory/1352-69-0x0000000140000000-0x0000000140130000-memory.dmpFilesize
1.2MB
-
memory/1352-68-0x0000000140000000-0x0000000140130000-memory.dmpFilesize
1.2MB
-
memory/1352-67-0x0000000140000000-0x0000000140130000-memory.dmpFilesize
1.2MB
-
memory/1352-66-0x0000000140000000-0x0000000140130000-memory.dmpFilesize
1.2MB
-
memory/1352-64-0x0000000140000000-0x0000000140130000-memory.dmpFilesize
1.2MB
-
memory/1352-60-0x0000000140000000-0x0000000140130000-memory.dmpFilesize
1.2MB
-
memory/1352-63-0x0000000140000000-0x0000000140130000-memory.dmpFilesize
1.2MB
-
memory/1352-62-0x0000000140000000-0x0000000140130000-memory.dmpFilesize
1.2MB
-
memory/1352-61-0x0000000140000000-0x0000000140130000-memory.dmpFilesize
1.2MB
-
memory/1352-59-0x0000000001DE0000-0x0000000001DE1000-memory.dmpFilesize
4KB