Analysis
-
max time kernel
62s -
max time network
26s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
03-12-2021 10:30
Static task
static1
Behavioral task
behavioral1
Sample
02a28f4bc46d29f2ae0c82813839b3f5661a26937bef1a5c2d9fc8f05406da26.dll
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
02a28f4bc46d29f2ae0c82813839b3f5661a26937bef1a5c2d9fc8f05406da26.dll
Resource
win10-en-20211014
Behavioral task
behavioral3
Sample
02a28f4bc46d29f2ae0c82813839b3f5661a26937bef1a5c2d9fc8f05406da26.dll
Resource
win7-en-20211104
General
-
Target
02a28f4bc46d29f2ae0c82813839b3f5661a26937bef1a5c2d9fc8f05406da26.dll
-
Size
1.0MB
-
MD5
6f35fe576a7c7bc71651a0ee2e76cb85
-
SHA1
b240f9008cfca0bc90865363a8fd5a56ed051435
-
SHA256
02a28f4bc46d29f2ae0c82813839b3f5661a26937bef1a5c2d9fc8f05406da26
-
SHA512
22707965963ea8b91c365f2439980113e5949db69cafbf8eb9358ee440908b686c16f1bddea7a8fd649acb10a18489b3f2582c02db329d9ab61f699b55cac764
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral4/memory/3064-121-0x0000000000840000-0x0000000000841000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
embeddedapplauncher.exerdpinput.exeDmNotificationBroker.exepid process 2972 embeddedapplauncher.exe 2852 rdpinput.exe 612 DmNotificationBroker.exe -
Loads dropped DLL 3 IoCs
Processes:
embeddedapplauncher.exerdpinput.exeDmNotificationBroker.exepid process 2972 embeddedapplauncher.exe 2852 rdpinput.exe 612 DmNotificationBroker.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-941723256-3451054534-3089625102-1000\Software\Microsoft\Windows\CurrentVersion\Run\Slqggwbvaxk = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\ACCESS~2\\WtmPz\\rdpinput.exe" -
Processes:
rundll32.exeembeddedapplauncher.exerdpinput.exeDmNotificationBroker.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA embeddedapplauncher.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpinput.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DmNotificationBroker.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2220 rundll32.exe 2220 rundll32.exe 2220 rundll32.exe 2220 rundll32.exe 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 3064 -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
Processes:
rundll32.exeembeddedapplauncher.exerdpinput.exeDmNotificationBroker.exepid process 2220 rundll32.exe 3064 2972 embeddedapplauncher.exe 2852 rdpinput.exe 612 DmNotificationBroker.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3064 wrote to memory of 2320 3064 embeddedapplauncher.exe PID 3064 wrote to memory of 2320 3064 embeddedapplauncher.exe PID 3064 wrote to memory of 2972 3064 embeddedapplauncher.exe PID 3064 wrote to memory of 2972 3064 embeddedapplauncher.exe PID 3064 wrote to memory of 2856 3064 rdpinput.exe PID 3064 wrote to memory of 2856 3064 rdpinput.exe PID 3064 wrote to memory of 2852 3064 rdpinput.exe PID 3064 wrote to memory of 2852 3064 rdpinput.exe PID 3064 wrote to memory of 1072 3064 DmNotificationBroker.exe PID 3064 wrote to memory of 1072 3064 DmNotificationBroker.exe PID 3064 wrote to memory of 612 3064 DmNotificationBroker.exe PID 3064 wrote to memory of 612 3064 DmNotificationBroker.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\02a28f4bc46d29f2ae0c82813839b3f5661a26937bef1a5c2d9fc8f05406da26.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\embeddedapplauncher.exeC:\Windows\system32\embeddedapplauncher.exe1⤵
-
C:\Users\Admin\AppData\Local\KZGR\embeddedapplauncher.exeC:\Users\Admin\AppData\Local\KZGR\embeddedapplauncher.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\rdpinput.exeC:\Windows\system32\rdpinput.exe1⤵
-
C:\Users\Admin\AppData\Local\FnAP\rdpinput.exeC:\Users\Admin\AppData\Local\FnAP\rdpinput.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\DmNotificationBroker.exeC:\Windows\system32\DmNotificationBroker.exe1⤵
-
C:\Users\Admin\AppData\Local\4RxOe\DmNotificationBroker.exeC:\Users\Admin\AppData\Local\4RxOe\DmNotificationBroker.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\4RxOe\DUI70.dllMD5
49f07c4a74d9c4b7d583deef3ec97492
SHA1fec91ba959ba7546d307573abf5a7c739f3fc7ac
SHA256d29eff953eef14c75e2d5f98604481370b8b0b8c343c991f89e9f5d9a87f535c
SHA512fb7a0c659316d782b64c4e973d5cf6eac951bb1f7faabcd10f760f52c0c3e8104fd05eeabd023f9341660f6e5f125903b475c474f8dc0ce9128075122cbc5aa0
-
C:\Users\Admin\AppData\Local\4RxOe\DmNotificationBroker.exeMD5
80650482bacf349d2d4aadc99e916da7
SHA17c3d6eb2fc82cfa2122f115b80d49a9887d089de
SHA2561cb2fe49a4d07375b6216bc51c372a3c78a96443765672ded3624d279c37c715
SHA512d3bf9501b25ffe7145dda9cf3aa521854949ed11ebb5dd48aba7aab16d3b0d75dfe8976d3c3b932cc4eb2f77cf185a0b2d81965e055fdb3c5606400d77824a56
-
C:\Users\Admin\AppData\Local\FnAP\WTSAPI32.dllMD5
c6da71bc09c9844dda3116d0a08f0808
SHA12e5b50e8f8e5d405382a55d3f1391f5623a670ef
SHA256c65b72021af9bf7c0e5264bc1d944f85cd3ac2c97321fe87c10e585509656a34
SHA51287fedaf56371c52d859225b99a924c96106903d5281cc3da2e8ea6fa32e3320ab4823bb418830b68fda69b4f95e29e9001f272acf852c7916f96dcf15d4321ac
-
C:\Users\Admin\AppData\Local\FnAP\rdpinput.exeMD5
431364c49991ebfea19b468020368e08
SHA1c36c8a01ccd17b8ec754fe92d1e03558bb3f05ac
SHA2566c59ea8b7807d9cc9de5c67cf679a1fb1bed4629da1f0a071e03af775de8e4fc
SHA5126b2baeb9abc1277fef874ead7d0c4b2b5c5953b8f9db5ae056a14a0af6edb6482b303e7f4ba5237a22e62919f09cd8334692dd58053754ed18837ace14565d8f
-
C:\Users\Admin\AppData\Local\KZGR\WTSAPI32.dllMD5
0edc32c63665cedbcd0aef04d49b8bbb
SHA1afa6a817df83147ebb273e7c246c391f8c56f088
SHA256d6144e2d05bdde07e79abc2c8a5ff74f67273ba120124ee6aae7e5f1e502a9f9
SHA512044c0cf4dc07aec2137f3f902366ed17dd3450a31c142b51bd79d2b1e160f1275757f67cb496f5ebd6dbc2e5f23a842fee2c8ccedbadd3cf371aa071b6ffdbfe
-
C:\Users\Admin\AppData\Local\KZGR\embeddedapplauncher.exeMD5
372475cd2d5658a529c83cbe159dd4ce
SHA1be8496491da2bbb3f06bfdf4ffe80285a7f891d9
SHA256708d78211be2333cab7658a99b02ae81014475973dea05d92115a8bc91965024
SHA51288f138678d8f8aae8bc0ac429744f8aad4a76187c0dd4367c03d9ed21ae132edae0109849570d49b47918ccac6fe671a896f64ef723e4e275a723b2c6e050028
-
\Users\Admin\AppData\Local\4RxOe\DUI70.dllMD5
49f07c4a74d9c4b7d583deef3ec97492
SHA1fec91ba959ba7546d307573abf5a7c739f3fc7ac
SHA256d29eff953eef14c75e2d5f98604481370b8b0b8c343c991f89e9f5d9a87f535c
SHA512fb7a0c659316d782b64c4e973d5cf6eac951bb1f7faabcd10f760f52c0c3e8104fd05eeabd023f9341660f6e5f125903b475c474f8dc0ce9128075122cbc5aa0
-
\Users\Admin\AppData\Local\FnAP\WTSAPI32.dllMD5
c6da71bc09c9844dda3116d0a08f0808
SHA12e5b50e8f8e5d405382a55d3f1391f5623a670ef
SHA256c65b72021af9bf7c0e5264bc1d944f85cd3ac2c97321fe87c10e585509656a34
SHA51287fedaf56371c52d859225b99a924c96106903d5281cc3da2e8ea6fa32e3320ab4823bb418830b68fda69b4f95e29e9001f272acf852c7916f96dcf15d4321ac
-
\Users\Admin\AppData\Local\KZGR\WTSAPI32.dllMD5
0edc32c63665cedbcd0aef04d49b8bbb
SHA1afa6a817df83147ebb273e7c246c391f8c56f088
SHA256d6144e2d05bdde07e79abc2c8a5ff74f67273ba120124ee6aae7e5f1e502a9f9
SHA512044c0cf4dc07aec2137f3f902366ed17dd3450a31c142b51bd79d2b1e160f1275757f67cb496f5ebd6dbc2e5f23a842fee2c8ccedbadd3cf371aa071b6ffdbfe
-
memory/612-179-0x000001F5BC480000-0x000001F5BC482000-memory.dmpFilesize
8KB
-
memory/612-181-0x000001F5BC480000-0x000001F5BC482000-memory.dmpFilesize
8KB
-
memory/612-172-0x0000000000000000-mapping.dmp
-
memory/612-176-0x0000000140000000-0x000000014014F000-memory.dmpFilesize
1.3MB
-
memory/612-180-0x000001F5BC480000-0x000001F5BC482000-memory.dmpFilesize
8KB
-
memory/2220-119-0x000002C6024B0000-0x000002C6024B2000-memory.dmpFilesize
8KB
-
memory/2220-115-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/2220-118-0x000002C6024B0000-0x000002C6024B2000-memory.dmpFilesize
8KB
-
memory/2220-120-0x000002C6024A0000-0x000002C6024A7000-memory.dmpFilesize
28KB
-
memory/2852-170-0x00000168C7AC0000-0x00000168C7AC2000-memory.dmpFilesize
8KB
-
memory/2852-162-0x0000000000000000-mapping.dmp
-
memory/2852-169-0x00000168C7AC0000-0x00000168C7AC2000-memory.dmpFilesize
8KB
-
memory/2852-171-0x00000168C7AC0000-0x00000168C7AC2000-memory.dmpFilesize
8KB
-
memory/2972-161-0x0000016DC60A0000-0x0000016DC60A2000-memory.dmpFilesize
8KB
-
memory/2972-160-0x0000016DC60A0000-0x0000016DC60A2000-memory.dmpFilesize
8KB
-
memory/2972-159-0x0000016DC60A0000-0x0000016DC60A2000-memory.dmpFilesize
8KB
-
memory/2972-156-0x0000000140000000-0x000000014010A000-memory.dmpFilesize
1.0MB
-
memory/2972-151-0x0000000000000000-mapping.dmp
-
memory/3064-130-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/3064-150-0x00000000009E0000-0x00000000009E2000-memory.dmpFilesize
8KB
-
memory/3064-149-0x00007FFB361D5000-0x00007FFB361D6000-memory.dmpFilesize
4KB
-
memory/3064-148-0x00000000009E0000-0x00000000009E2000-memory.dmpFilesize
8KB
-
memory/3064-147-0x00000000009E0000-0x00000000009E2000-memory.dmpFilesize
8KB
-
memory/3064-141-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/3064-155-0x00007FFB36310000-0x00007FFB36312000-memory.dmpFilesize
8KB
-
memory/3064-140-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/3064-139-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/3064-138-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/3064-136-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/3064-137-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/3064-135-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/3064-134-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/3064-133-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/3064-132-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/3064-131-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/3064-129-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/3064-128-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/3064-127-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/3064-126-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/3064-125-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/3064-124-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/3064-123-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/3064-122-0x0000000140000000-0x0000000140109000-memory.dmpFilesize
1.0MB
-
memory/3064-121-0x0000000000840000-0x0000000000841000-memory.dmpFilesize
4KB