Analysis
-
max time kernel
156s -
max time network
130s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
26-11-2021 09:32
Static task
static1
Behavioral task
behavioral1
Sample
a25acf9e95fa653dde6830bbe1dc4406804347b9d3f9a037f53f0a8e79296fe2.dll
Resource
win7-en-20211014
General
-
Target
a25acf9e95fa653dde6830bbe1dc4406804347b9d3f9a037f53f0a8e79296fe2.dll
-
Size
1.2MB
-
MD5
92d2b982db190dd73a46815f69730460
-
SHA1
fa22116b54799ed06e28dca5a813c4ac29f24184
-
SHA256
a25acf9e95fa653dde6830bbe1dc4406804347b9d3f9a037f53f0a8e79296fe2
-
SHA512
f8abc9da38f5f04d91e7f7c00ff8464914737f19a892374f960f511dd36c15ba2c901e53e2a4e4f5047d89f15af7f6d3fbb4e790e2147ca2a828ef3b3d32d122
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3060-125-0x00000000012E0000-0x00000000012E1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
ApplySettingsTemplateCatalog.exeomadmclient.exePasswordOnWakeSettingFlyout.exepid process 1224 ApplySettingsTemplateCatalog.exe 576 omadmclient.exe 1092 PasswordOnWakeSettingFlyout.exe -
Loads dropped DLL 3 IoCs
Processes:
ApplySettingsTemplateCatalog.exeomadmclient.exePasswordOnWakeSettingFlyout.exepid process 1224 ApplySettingsTemplateCatalog.exe 576 omadmclient.exe 1092 PasswordOnWakeSettingFlyout.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ziekmjidk = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Themes\\oZOkgRQ\\omadmclient.exe" -
Processes:
rundll32.exeApplySettingsTemplateCatalog.exeomadmclient.exePasswordOnWakeSettingFlyout.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ApplySettingsTemplateCatalog.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA omadmclient.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA PasswordOnWakeSettingFlyout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exeApplySettingsTemplateCatalog.exepid process 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 2104 rundll32.exe 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 1224 ApplySettingsTemplateCatalog.exe 1224 ApplySettingsTemplateCatalog.exe 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 3060 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3060 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3060 wrote to memory of 936 3060 ApplySettingsTemplateCatalog.exe PID 3060 wrote to memory of 936 3060 ApplySettingsTemplateCatalog.exe PID 3060 wrote to memory of 1224 3060 ApplySettingsTemplateCatalog.exe PID 3060 wrote to memory of 1224 3060 ApplySettingsTemplateCatalog.exe PID 3060 wrote to memory of 592 3060 omadmclient.exe PID 3060 wrote to memory of 592 3060 omadmclient.exe PID 3060 wrote to memory of 576 3060 omadmclient.exe PID 3060 wrote to memory of 576 3060 omadmclient.exe PID 3060 wrote to memory of 1260 3060 PasswordOnWakeSettingFlyout.exe PID 3060 wrote to memory of 1260 3060 PasswordOnWakeSettingFlyout.exe PID 3060 wrote to memory of 1092 3060 PasswordOnWakeSettingFlyout.exe PID 3060 wrote to memory of 1092 3060 PasswordOnWakeSettingFlyout.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a25acf9e95fa653dde6830bbe1dc4406804347b9d3f9a037f53f0a8e79296fe2.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\ApplySettingsTemplateCatalog.exeC:\Windows\system32\ApplySettingsTemplateCatalog.exe1⤵
-
C:\Users\Admin\AppData\Local\TSXYXth\ApplySettingsTemplateCatalog.exeC:\Users\Admin\AppData\Local\TSXYXth\ApplySettingsTemplateCatalog.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\omadmclient.exeC:\Windows\system32\omadmclient.exe1⤵
-
C:\Users\Admin\AppData\Local\I2QZj8iuw\omadmclient.exeC:\Users\Admin\AppData\Local\I2QZj8iuw\omadmclient.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\PasswordOnWakeSettingFlyout.exeC:\Windows\system32\PasswordOnWakeSettingFlyout.exe1⤵
-
C:\Users\Admin\AppData\Local\fzu\PasswordOnWakeSettingFlyout.exeC:\Users\Admin\AppData\Local\fzu\PasswordOnWakeSettingFlyout.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\I2QZj8iuw\XmlLite.dllMD5
469fc73251e5c2cbc93660dff6c7478e
SHA165ad98e3662434f49a349745796ccbe8cdec4ae1
SHA256c0d8e845ac9355bdeb2a1cf502dcaa018eb2f432e32603c193c42cd7e5924284
SHA5124d11e002a75f86aa6961396aee40d5a660ee4795a5bf750a9c762993d9df5e0e222bb4363f370ced7cbb75df2fc069c7e8d4526bcaad566273e618f883eadeb0
-
C:\Users\Admin\AppData\Local\I2QZj8iuw\omadmclient.exeMD5
0f8c6315c9458cab5b3aae2df853edb6
SHA1ff59734b75896b422e8d7a642c4ea59bf6dab759
SHA25676eb6879858ab42089e369984f6e0e775b32b6756a605ed5f2fb1a06c1151498
SHA512966045c25685a0f01bcd49f6e9ec5bbdaa8a3e261129c03db85031fb1d8705bfba967894d2530c2691e16fdbed11a9df9122d9093db2b46c6ce1b641db36bb3c
-
C:\Users\Admin\AppData\Local\TSXYXth\ACTIVEDS.dllMD5
72e9d0972b82fe454cf123cc66b334b2
SHA14a5b0b3532aacd9bddb90fc00fa3a66baf8a1454
SHA256dd92295472b2cd7ef9550c23b449735b079efe487b3f47095997254a60573d31
SHA512d2072d27b76da5662ed5a4271e26050b94d1035424e93cabe60c65f4647b34747c05e62b91f520ea18df80490ac66591b72bb74f51da15eaad6e4a928c7b35f8
-
C:\Users\Admin\AppData\Local\TSXYXth\ApplySettingsTemplateCatalog.exeMD5
ce074a9724e9335539b4318df1dc8f6c
SHA1f04dff9c5ee02a26d5feec0ce21d07c35f4d0129
SHA2567b72517d06869deb6efb72e6220fbd903333378afacd011950b8b2a47bf38967
SHA5129502cf40bba8da267b9dd219abe5d7249fc3fd59d45e66120a49b8cb0609a09aa5ef18d925036141049fa985fe45444d3af9412650d1c15bce27001dfb6b072a
-
C:\Users\Admin\AppData\Local\fzu\DUI70.dllMD5
17e63f7ab78ec9f029eedfc16f7f555e
SHA12c6a2925df3a1366b770f6999ca888ac1804c076
SHA256aafb5e7ed178e4c3577839b414cccb47e74115c04b5c10bb1f4448520334fc10
SHA51283bf01ca681963b84cb4b366ce4fde91695930a6484708d49eef220d019f87c2139cc7d3a8b4f2cacdeaf851c16a0055a83da8383773f0cfbb5b5fa5ef4e0578
-
C:\Users\Admin\AppData\Local\fzu\PasswordOnWakeSettingFlyout.exeMD5
a81fed73da02db15df427da1cd5f4141
SHA1f831fc6377a6264be621e23635f22b437129b2ce
SHA2561afed5b9302a4a4669ac7f966b7cf9fcaab037e94a0b3cabea3631055c97d3a5
SHA5123c4541160f0f69d1c3a9dc4e67643864493eadb0450426f7f323d87fa7b0c81d96ef2201d33b3421a307171274615e90d4ee8bd07107ff4f75beedec0a2bf156
-
\Users\Admin\AppData\Local\I2QZj8iuw\XmlLite.dllMD5
469fc73251e5c2cbc93660dff6c7478e
SHA165ad98e3662434f49a349745796ccbe8cdec4ae1
SHA256c0d8e845ac9355bdeb2a1cf502dcaa018eb2f432e32603c193c42cd7e5924284
SHA5124d11e002a75f86aa6961396aee40d5a660ee4795a5bf750a9c762993d9df5e0e222bb4363f370ced7cbb75df2fc069c7e8d4526bcaad566273e618f883eadeb0
-
\Users\Admin\AppData\Local\TSXYXth\ACTIVEDS.dllMD5
72e9d0972b82fe454cf123cc66b334b2
SHA14a5b0b3532aacd9bddb90fc00fa3a66baf8a1454
SHA256dd92295472b2cd7ef9550c23b449735b079efe487b3f47095997254a60573d31
SHA512d2072d27b76da5662ed5a4271e26050b94d1035424e93cabe60c65f4647b34747c05e62b91f520ea18df80490ac66591b72bb74f51da15eaad6e4a928c7b35f8
-
\Users\Admin\AppData\Local\fzu\DUI70.dllMD5
17e63f7ab78ec9f029eedfc16f7f555e
SHA12c6a2925df3a1366b770f6999ca888ac1804c076
SHA256aafb5e7ed178e4c3577839b414cccb47e74115c04b5c10bb1f4448520334fc10
SHA51283bf01ca681963b84cb4b366ce4fde91695930a6484708d49eef220d019f87c2139cc7d3a8b4f2cacdeaf851c16a0055a83da8383773f0cfbb5b5fa5ef4e0578
-
memory/576-176-0x0000028B401F0000-0x0000028B401F2000-memory.dmpFilesize
8KB
-
memory/576-175-0x0000028B401F0000-0x0000028B401F2000-memory.dmpFilesize
8KB
-
memory/576-166-0x0000000000000000-mapping.dmp
-
memory/576-174-0x0000028B401F0000-0x0000028B401F2000-memory.dmpFilesize
8KB
-
memory/1092-187-0x0000020D0ABC0000-0x0000020D0ABC2000-memory.dmpFilesize
8KB
-
memory/1092-177-0x0000000000000000-mapping.dmp
-
memory/1092-181-0x00007FFC81C10000-0x00007FFC81D82000-memory.dmpFilesize
1.4MB
-
memory/1092-185-0x0000020D0ABC0000-0x0000020D0ABC2000-memory.dmpFilesize
8KB
-
memory/1092-186-0x0000020D0ABC0000-0x0000020D0ABC2000-memory.dmpFilesize
8KB
-
memory/1224-165-0x0000021F984E0000-0x0000021F984E2000-memory.dmpFilesize
8KB
-
memory/1224-155-0x0000000000000000-mapping.dmp
-
memory/1224-164-0x0000021F984E0000-0x0000021F984E2000-memory.dmpFilesize
8KB
-
memory/1224-163-0x0000021F984E0000-0x0000021F984E2000-memory.dmpFilesize
8KB
-
memory/1224-159-0x00007FFC81C60000-0x00007FFC81D8D000-memory.dmpFilesize
1.2MB
-
memory/2104-118-0x00007FFC81C60000-0x00007FFC81D8C000-memory.dmpFilesize
1.2MB
-
memory/2104-124-0x000001B5A8AC0000-0x000001B5A8AC7000-memory.dmpFilesize
28KB
-
memory/2104-123-0x000001B5A8AD0000-0x000001B5A8AD2000-memory.dmpFilesize
8KB
-
memory/2104-122-0x000001B5A8AD0000-0x000001B5A8AD2000-memory.dmpFilesize
8KB
-
memory/3060-134-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/3060-153-0x00000000012F0000-0x00000000012F2000-memory.dmpFilesize
8KB
-
memory/3060-154-0x00007FFC8E060000-0x00007FFC8E062000-memory.dmpFilesize
8KB
-
memory/3060-152-0x00007FFC8DF25000-0x00007FFC8DF26000-memory.dmpFilesize
4KB
-
memory/3060-151-0x00000000012F0000-0x00000000012F2000-memory.dmpFilesize
8KB
-
memory/3060-150-0x00000000012F0000-0x00000000012F2000-memory.dmpFilesize
8KB
-
memory/3060-145-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/3060-144-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/3060-143-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/3060-142-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/3060-141-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/3060-140-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/3060-139-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/3060-138-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/3060-137-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/3060-136-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/3060-135-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/3060-133-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/3060-132-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/3060-131-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/3060-130-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/3060-129-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/3060-128-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/3060-126-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/3060-127-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/3060-125-0x00000000012E0000-0x00000000012E1000-memory.dmpFilesize
4KB