Analysis
-
max time kernel
154s -
max time network
122s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
26-11-2021 09:31
Static task
static1
Behavioral task
behavioral1
Sample
e222b35f91a6abd76a3226837ef9eda5ede74ccfaae17ed01a7538fe79a2da4b.dll
Resource
win7-en-20211104
General
-
Target
e222b35f91a6abd76a3226837ef9eda5ede74ccfaae17ed01a7538fe79a2da4b.dll
-
Size
1.2MB
-
MD5
f013bd186a7cc04178679a1b24b7ef64
-
SHA1
30dd7d35772cfe50cac035ecb21e3ea8e17551db
-
SHA256
e222b35f91a6abd76a3226837ef9eda5ede74ccfaae17ed01a7538fe79a2da4b
-
SHA512
d8c9ad1efc9f04975590d64e21c132cdf0e301558f69321f07211716aedf1b9dfd4974660c1638e443ae331422d2be1f5d9d493129a3af21b16f1ca47d1ee79b
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1276-59-0x00000000021F0000-0x00000000021F1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
spreview.exemblctr.exespreview.exepid process 1188 spreview.exe 1176 mblctr.exe 1392 spreview.exe -
Loads dropped DLL 7 IoCs
Processes:
spreview.exemblctr.exespreview.exepid process 1276 1188 spreview.exe 1276 1176 mblctr.exe 1276 1392 spreview.exe 1276 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-103686315-404690609-2047157615-1000\Software\Microsoft\Windows\CurrentVersion\Run\Myzdcwow = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\ACCESS~1\\0GMJD5~1\\mblctr.exe" -
Processes:
spreview.exerundll32.exespreview.exemblctr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spreview.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA spreview.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mblctr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 864 rundll32.exe 864 rundll32.exe 864 rundll32.exe 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 1276 -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
Processes:
rundll32.exespreview.exemblctr.exespreview.exepid process 864 rundll32.exe 1276 1188 spreview.exe 1176 mblctr.exe 1392 spreview.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1276 wrote to memory of 760 1276 spreview.exe PID 1276 wrote to memory of 760 1276 spreview.exe PID 1276 wrote to memory of 760 1276 spreview.exe PID 1276 wrote to memory of 1188 1276 spreview.exe PID 1276 wrote to memory of 1188 1276 spreview.exe PID 1276 wrote to memory of 1188 1276 spreview.exe PID 1276 wrote to memory of 1148 1276 mblctr.exe PID 1276 wrote to memory of 1148 1276 mblctr.exe PID 1276 wrote to memory of 1148 1276 mblctr.exe PID 1276 wrote to memory of 1176 1276 mblctr.exe PID 1276 wrote to memory of 1176 1276 mblctr.exe PID 1276 wrote to memory of 1176 1276 mblctr.exe PID 1276 wrote to memory of 988 1276 spreview.exe PID 1276 wrote to memory of 988 1276 spreview.exe PID 1276 wrote to memory of 988 1276 spreview.exe PID 1276 wrote to memory of 1392 1276 spreview.exe PID 1276 wrote to memory of 1392 1276 spreview.exe PID 1276 wrote to memory of 1392 1276 spreview.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e222b35f91a6abd76a3226837ef9eda5ede74ccfaae17ed01a7538fe79a2da4b.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\spreview.exeC:\Windows\system32\spreview.exe1⤵
-
C:\Users\Admin\AppData\Local\ADT1\spreview.exeC:\Users\Admin\AppData\Local\ADT1\spreview.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\mblctr.exeC:\Windows\system32\mblctr.exe1⤵
-
C:\Users\Admin\AppData\Local\4lc\mblctr.exeC:\Users\Admin\AppData\Local\4lc\mblctr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\spreview.exeC:\Windows\system32\spreview.exe1⤵
-
C:\Users\Admin\AppData\Local\hkp5Wl\spreview.exeC:\Users\Admin\AppData\Local\hkp5Wl\spreview.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\4lc\WTSAPI32.dllMD5
2cbf710fedd121764a309c869e7f22c8
SHA18c44240154d093adaf261f9801d69327b20509e4
SHA256bfbf48e1305572b68811abb276f581bd72509e58b18e19e0aeb27af61b8b8752
SHA5126f671ff061c713487bd7ec2d47820a33e299fd56ffe6f4ed051d3eaf82d060da7586c70f68fd5064af76377f09955c4dce6e1ffbdbdf4ac2adb904e505ca560c
-
C:\Users\Admin\AppData\Local\4lc\mblctr.exeMD5
fa4c36b574bf387d9582ed2c54a347a8
SHA1149077715ee56c668567e3a9cb9842284f4fe678
SHA256b71cdf708d4a4f045f784de5e5458ebf9a4fa2b188c3f7422e2fbfe19310be3f
SHA5121f04ce0440eec7477153ebc2ce56eaabcbbac58d9d703c03337f030e160d22cd635ae201752bc2962643c75bbf2036afdd69d97e8cbc81260fd0e2f55946bb55
-
C:\Users\Admin\AppData\Local\ADT1\VERSION.dllMD5
faa17972e90a0c64d89d12471f76a6a1
SHA132e77afe565bdd7864b7a312374f8d93192c3144
SHA256fb193ee781bc5c3e43d956dbe958daa399dc39af63a460d5cdccb024a3399cf4
SHA512e0bcb4bcdabf15a19e4ccac9e317fefce73e34350fce77d15e1be3611fa28032bf667596798336402d44d829681523bf49c31ccc8820360f7b48c4db3f6a816d
-
C:\Users\Admin\AppData\Local\ADT1\spreview.exeMD5
704cd4cac010e8e6d8de9b778ed17773
SHA181856abf70640f102b8b3defe2cf65669fe8e165
SHA2564307f21d3ec3b51cba6a905a80045314ffccb4c60c11d99a3d77cc8103014208
SHA512b380264276bad01d619a5f1f112791d6bf73dc52cdd5cca0cc1f726a6f66eefc5a78a37646792987c508f9cb5049f0eb86c71fb4c7a2d3e670c0c8623f0522ee
-
C:\Users\Admin\AppData\Local\hkp5Wl\VERSION.dllMD5
b4c312e039e1da188b2223a02692f4a0
SHA11774583b5d8e82570422aa82931593fb02bd7cf7
SHA25608d4ac990f7efc3f516722db1f05b003e416c9fbacd1669372331081ec6d4dd9
SHA5123e8f74fc7d8fe6925e8ae8e2dc962948a272036938787d70f508db0f51a3a9f4123c20a50a743567bd96d62e90bb03815b79d2ba5e1da14a45d3e34e9e21cd96
-
C:\Users\Admin\AppData\Local\hkp5Wl\spreview.exeMD5
704cd4cac010e8e6d8de9b778ed17773
SHA181856abf70640f102b8b3defe2cf65669fe8e165
SHA2564307f21d3ec3b51cba6a905a80045314ffccb4c60c11d99a3d77cc8103014208
SHA512b380264276bad01d619a5f1f112791d6bf73dc52cdd5cca0cc1f726a6f66eefc5a78a37646792987c508f9cb5049f0eb86c71fb4c7a2d3e670c0c8623f0522ee
-
\Users\Admin\AppData\Local\4lc\WTSAPI32.dllMD5
2cbf710fedd121764a309c869e7f22c8
SHA18c44240154d093adaf261f9801d69327b20509e4
SHA256bfbf48e1305572b68811abb276f581bd72509e58b18e19e0aeb27af61b8b8752
SHA5126f671ff061c713487bd7ec2d47820a33e299fd56ffe6f4ed051d3eaf82d060da7586c70f68fd5064af76377f09955c4dce6e1ffbdbdf4ac2adb904e505ca560c
-
\Users\Admin\AppData\Local\4lc\mblctr.exeMD5
fa4c36b574bf387d9582ed2c54a347a8
SHA1149077715ee56c668567e3a9cb9842284f4fe678
SHA256b71cdf708d4a4f045f784de5e5458ebf9a4fa2b188c3f7422e2fbfe19310be3f
SHA5121f04ce0440eec7477153ebc2ce56eaabcbbac58d9d703c03337f030e160d22cd635ae201752bc2962643c75bbf2036afdd69d97e8cbc81260fd0e2f55946bb55
-
\Users\Admin\AppData\Local\ADT1\VERSION.dllMD5
faa17972e90a0c64d89d12471f76a6a1
SHA132e77afe565bdd7864b7a312374f8d93192c3144
SHA256fb193ee781bc5c3e43d956dbe958daa399dc39af63a460d5cdccb024a3399cf4
SHA512e0bcb4bcdabf15a19e4ccac9e317fefce73e34350fce77d15e1be3611fa28032bf667596798336402d44d829681523bf49c31ccc8820360f7b48c4db3f6a816d
-
\Users\Admin\AppData\Local\ADT1\spreview.exeMD5
704cd4cac010e8e6d8de9b778ed17773
SHA181856abf70640f102b8b3defe2cf65669fe8e165
SHA2564307f21d3ec3b51cba6a905a80045314ffccb4c60c11d99a3d77cc8103014208
SHA512b380264276bad01d619a5f1f112791d6bf73dc52cdd5cca0cc1f726a6f66eefc5a78a37646792987c508f9cb5049f0eb86c71fb4c7a2d3e670c0c8623f0522ee
-
\Users\Admin\AppData\Local\hkp5Wl\VERSION.dllMD5
b4c312e039e1da188b2223a02692f4a0
SHA11774583b5d8e82570422aa82931593fb02bd7cf7
SHA25608d4ac990f7efc3f516722db1f05b003e416c9fbacd1669372331081ec6d4dd9
SHA5123e8f74fc7d8fe6925e8ae8e2dc962948a272036938787d70f508db0f51a3a9f4123c20a50a743567bd96d62e90bb03815b79d2ba5e1da14a45d3e34e9e21cd96
-
\Users\Admin\AppData\Local\hkp5Wl\spreview.exeMD5
704cd4cac010e8e6d8de9b778ed17773
SHA181856abf70640f102b8b3defe2cf65669fe8e165
SHA2564307f21d3ec3b51cba6a905a80045314ffccb4c60c11d99a3d77cc8103014208
SHA512b380264276bad01d619a5f1f112791d6bf73dc52cdd5cca0cc1f726a6f66eefc5a78a37646792987c508f9cb5049f0eb86c71fb4c7a2d3e670c0c8623f0522ee
-
\Users\Admin\AppData\Roaming\Identities\XgNFory7784\spreview.exeMD5
704cd4cac010e8e6d8de9b778ed17773
SHA181856abf70640f102b8b3defe2cf65669fe8e165
SHA2564307f21d3ec3b51cba6a905a80045314ffccb4c60c11d99a3d77cc8103014208
SHA512b380264276bad01d619a5f1f112791d6bf73dc52cdd5cca0cc1f726a6f66eefc5a78a37646792987c508f9cb5049f0eb86c71fb4c7a2d3e670c0c8623f0522ee
-
memory/864-55-0x0000000140000000-0x000000014012E000-memory.dmpFilesize
1.2MB
-
memory/864-58-0x0000000000100000-0x0000000000107000-memory.dmpFilesize
28KB
-
memory/1176-94-0x0000000000000000-mapping.dmp
-
memory/1188-90-0x0000000140000000-0x000000014012F000-memory.dmpFilesize
1.2MB
-
memory/1188-89-0x000007FEFB751000-0x000007FEFB753000-memory.dmpFilesize
8KB
-
memory/1188-85-0x0000000000000000-mapping.dmp
-
memory/1276-75-0x0000000140000000-0x000000014012E000-memory.dmpFilesize
1.2MB
-
memory/1276-74-0x0000000140000000-0x000000014012E000-memory.dmpFilesize
1.2MB
-
memory/1276-83-0x0000000077080000-0x0000000077082000-memory.dmpFilesize
8KB
-
memory/1276-64-0x0000000140000000-0x000000014012E000-memory.dmpFilesize
1.2MB
-
memory/1276-65-0x0000000140000000-0x000000014012E000-memory.dmpFilesize
1.2MB
-
memory/1276-66-0x0000000140000000-0x000000014012E000-memory.dmpFilesize
1.2MB
-
memory/1276-67-0x0000000140000000-0x000000014012E000-memory.dmpFilesize
1.2MB
-
memory/1276-68-0x0000000140000000-0x000000014012E000-memory.dmpFilesize
1.2MB
-
memory/1276-69-0x0000000140000000-0x000000014012E000-memory.dmpFilesize
1.2MB
-
memory/1276-72-0x0000000140000000-0x000000014012E000-memory.dmpFilesize
1.2MB
-
memory/1276-73-0x0000000140000000-0x000000014012E000-memory.dmpFilesize
1.2MB
-
memory/1276-63-0x0000000140000000-0x000000014012E000-memory.dmpFilesize
1.2MB
-
memory/1276-76-0x0000000140000000-0x000000014012E000-memory.dmpFilesize
1.2MB
-
memory/1276-77-0x0000000140000000-0x000000014012E000-memory.dmpFilesize
1.2MB
-
memory/1276-70-0x0000000140000000-0x000000014012E000-memory.dmpFilesize
1.2MB
-
memory/1276-71-0x0000000140000000-0x000000014012E000-memory.dmpFilesize
1.2MB
-
memory/1276-62-0x0000000140000000-0x000000014012E000-memory.dmpFilesize
1.2MB
-
memory/1276-59-0x00000000021F0000-0x00000000021F1000-memory.dmpFilesize
4KB
-
memory/1276-61-0x0000000140000000-0x000000014012E000-memory.dmpFilesize
1.2MB
-
memory/1276-60-0x0000000140000000-0x000000014012E000-memory.dmpFilesize
1.2MB
-
memory/1392-103-0x0000000000000000-mapping.dmp