Analysis
-
max time kernel
141s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
01-02-2022 11:42
Static task
static1
Behavioral task
behavioral1
Sample
86bcfce2dd342e9a1c04cfc65731d40ed1c397a4ec47bd9f5b41771297d81100.dll
Resource
win7-en-20211208
General
-
Target
86bcfce2dd342e9a1c04cfc65731d40ed1c397a4ec47bd9f5b41771297d81100.dll
-
Size
768KB
-
MD5
bd5cfa593ed87901f8184eaa44c0a8b8
-
SHA1
963a57fb83ca6361624fb057058ea4fb538015dc
-
SHA256
86bcfce2dd342e9a1c04cfc65731d40ed1c397a4ec47bd9f5b41771297d81100
-
SHA512
f6235abb0503db5a7cc7a0f6d2a4682db1491127a4f5700d3f68e15535b838651e1df8a8292643e46febb678e16abe9f36f6990db57db3f58c60ceae186ae489
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2384-137-0x00000000027E0000-0x00000000027E1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
Taskmgr.exeApplicationFrameHost.exephoneactivate.exepid process 3880 Taskmgr.exe 2824 ApplicationFrameHost.exe 2836 phoneactivate.exe -
Sets service image path in registry 2 TTPs
-
Loads dropped DLL 3 IoCs
Processes:
Taskmgr.exeApplicationFrameHost.exephoneactivate.exepid process 3880 Taskmgr.exe 2824 ApplicationFrameHost.exe 2836 phoneactivate.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Flqldkhbz = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\zZ6Jk3gb5cg\\ApplicationFrameHost.exe" -
Processes:
rundll32.exeTaskmgr.exeApplicationFrameHost.exephoneactivate.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Taskmgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ApplicationFrameHost.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA phoneactivate.exe -
Modifies data under HKEY_USERS 41 IoCs
Processes:
WaaSMedicAgent.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exeTaskmgr.exepid process 3428 rundll32.exe 3428 rundll32.exe 3428 rundll32.exe 3428 rundll32.exe 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 2384 3880 Taskmgr.exe 3880 Taskmgr.exe 2384 2384 2384 2384 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2384 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 2384 wrote to memory of 3288 2384 Taskmgr.exe PID 2384 wrote to memory of 3288 2384 Taskmgr.exe PID 2384 wrote to memory of 3880 2384 Taskmgr.exe PID 2384 wrote to memory of 3880 2384 Taskmgr.exe PID 2384 wrote to memory of 2812 2384 ApplicationFrameHost.exe PID 2384 wrote to memory of 2812 2384 ApplicationFrameHost.exe PID 2384 wrote to memory of 2824 2384 ApplicationFrameHost.exe PID 2384 wrote to memory of 2824 2384 ApplicationFrameHost.exe PID 2384 wrote to memory of 3128 2384 phoneactivate.exe PID 2384 wrote to memory of 3128 2384 phoneactivate.exe PID 2384 wrote to memory of 2836 2384 phoneactivate.exe PID 2384 wrote to memory of 2836 2384 phoneactivate.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\86bcfce2dd342e9a1c04cfc65731d40ed1c397a4ec47bd9f5b41771297d81100.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\Taskmgr.exeC:\Windows\system32\Taskmgr.exe1⤵
-
C:\Users\Admin\AppData\Local\Hz3K\Taskmgr.exeC:\Users\Admin\AppData\Local\Hz3K\Taskmgr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 6c6d6071fb34ff300d8d82c473415888 siIubRRiTk+y8IxrmhWjIw.0.1.0.0.01⤵
- Modifies data under HKEY_USERS
-
C:\Windows\system32\ApplicationFrameHost.exeC:\Windows\system32\ApplicationFrameHost.exe1⤵
-
C:\Users\Admin\AppData\Local\dIlQu02\ApplicationFrameHost.exeC:\Users\Admin\AppData\Local\dIlQu02\ApplicationFrameHost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\phoneactivate.exeC:\Windows\system32\phoneactivate.exe1⤵
-
C:\Users\Admin\AppData\Local\0ku\phoneactivate.exeC:\Users\Admin\AppData\Local\0ku\phoneactivate.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k wusvcs -p1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\0ku\DUI70.dllMD5
2c87be48e288917b334599d0f5611978
SHA1bb8497e3ef34dd17212c4a04d5e56e367b217217
SHA2566724dc312aafa1901ec2fe4566c7e3126cfe6fa1587dcf75549b169cf3948124
SHA51217a85d145f0b0670dfa3f32b199913140953d52b0d8533e26328d5eb66150b1df057f35acd760be5988d4bca996af6d8e8311508442f17d119b4897367591b77
-
C:\Users\Admin\AppData\Local\0ku\DUI70.dllMD5
2c87be48e288917b334599d0f5611978
SHA1bb8497e3ef34dd17212c4a04d5e56e367b217217
SHA2566724dc312aafa1901ec2fe4566c7e3126cfe6fa1587dcf75549b169cf3948124
SHA51217a85d145f0b0670dfa3f32b199913140953d52b0d8533e26328d5eb66150b1df057f35acd760be5988d4bca996af6d8e8311508442f17d119b4897367591b77
-
C:\Users\Admin\AppData\Local\0ku\phoneactivate.exeMD5
32c31f06e0b68f349f68afdd08e45f3d
SHA1e4b642f887e2c1d76b6b4777ade91e3cb3b9e27c
SHA256cea83eb34233fed5ebeef8745c7c581a8adbefbcfc0e30e2d30a81000c821017
SHA512fe61764b471465b164c9c2202ed349605117d57ceb0eca75acf8bda44e8744c115767ee0caed0b7feb70ba37b477d00805b3fdf0d0fa879dd4c8e3c1dc1c0d26
-
C:\Users\Admin\AppData\Local\Hz3K\DUI70.dllMD5
c9eb3c7716d14c612f757135a6ddaaf2
SHA1cf01c71e26344aea8623598481d75ae09dc27d25
SHA256d7e8bb77cdf19210440d83310ec3e38e66fb5bad4f07dfc3c4613813b632bace
SHA51212e0045a8e02d5679d70337857988b81b7e1daed3b4c5dad3f77a73752bd3e21f405cee1b59201f1f5c11ca03be0a1f227f2115a18b92069a5768336a53d0d2a
-
C:\Users\Admin\AppData\Local\Hz3K\DUI70.dllMD5
c9eb3c7716d14c612f757135a6ddaaf2
SHA1cf01c71e26344aea8623598481d75ae09dc27d25
SHA256d7e8bb77cdf19210440d83310ec3e38e66fb5bad4f07dfc3c4613813b632bace
SHA51212e0045a8e02d5679d70337857988b81b7e1daed3b4c5dad3f77a73752bd3e21f405cee1b59201f1f5c11ca03be0a1f227f2115a18b92069a5768336a53d0d2a
-
C:\Users\Admin\AppData\Local\Hz3K\Taskmgr.exeMD5
58d5bc7895f7f32ee308e34f06f25dd5
SHA17a7f5e991ddeaf73e15a0fdcb5c999c0248a2fa4
SHA2564e305198f15bafd5728b5fb8e7ff48d9f312399c744ecfea0ecac79d93c5e478
SHA512872c84c92b0e4050ae4a4137330ec3cda30008fd15d6413bf7a913c03a021ad41b6131e5a7356b374ced98d37ae207147ebefd93893560dc15c3e9875f93f7a9
-
C:\Users\Admin\AppData\Local\dIlQu02\ApplicationFrameHost.exeMD5
d58a8a987a8dafad9dc32a548cc061e7
SHA1f79fc9e0ab066cad530b949c2153c532a5223156
SHA256cf58e424b86775e6f2354291052126a646f842fff811b730714dfbbd8ebc71a4
SHA51293df28b65af23a5f82124ba644e821614e2e2074c98dbb2bd7319d1dfe9e2179b9d660d7720913c79a8e7b2f8560440789ad5e170b9d94670589885060c14265
-
C:\Users\Admin\AppData\Local\dIlQu02\dxgi.dllMD5
40c508e6f625a898a9478ecf93f22ad5
SHA14f3ed66d24797a1f8f0a392d5564da9381794dfc
SHA25624fbe10e590003886e281b5b4ee10f61bf9475d37499c1a3f01c9cd88e3579c7
SHA5123d4d27af60c16b8a8da6d64323ddf85ca68db59a608f5b0b09baa339687ed29c6ed80133f455178d36bd7d30eae2301aefd26eceb5cfe508daa6361ad5e82931
-
C:\Users\Admin\AppData\Local\dIlQu02\dxgi.dllMD5
40c508e6f625a898a9478ecf93f22ad5
SHA14f3ed66d24797a1f8f0a392d5564da9381794dfc
SHA25624fbe10e590003886e281b5b4ee10f61bf9475d37499c1a3f01c9cd88e3579c7
SHA5123d4d27af60c16b8a8da6d64323ddf85ca68db59a608f5b0b09baa339687ed29c6ed80133f455178d36bd7d30eae2301aefd26eceb5cfe508daa6361ad5e82931
-
memory/2384-140-0x0000000140000000-0x00000001400C0000-memory.dmpFilesize
768KB
-
memory/2384-137-0x00000000027E0000-0x00000000027E1000-memory.dmpFilesize
4KB
-
memory/2384-148-0x00007FFC9B3DCF20-0x00007FFC9B4BDF20-memory.dmpFilesize
900KB
-
memory/2384-143-0x0000000140000000-0x00000001400C0000-memory.dmpFilesize
768KB
-
memory/2384-142-0x0000000140000000-0x00000001400C0000-memory.dmpFilesize
768KB
-
memory/2384-141-0x0000000140000000-0x00000001400C0000-memory.dmpFilesize
768KB
-
memory/2384-149-0x00007FFC9B3A0000-0x00007FFC9B3B0000-memory.dmpFilesize
64KB
-
memory/2384-139-0x0000000140000000-0x00000001400C0000-memory.dmpFilesize
768KB
-
memory/2384-138-0x0000000140000000-0x00000001400C0000-memory.dmpFilesize
768KB
-
memory/2824-163-0x00007FFC7D150000-0x00007FFC7D210000-memory.dmpFilesize
768KB
-
memory/2836-175-0x00007FFC7BC10000-0x00007FFC7BD16000-memory.dmpFilesize
1.0MB
-
memory/3428-130-0x00007FFC7C940000-0x00007FFC7CA00000-memory.dmpFilesize
768KB
-
memory/3428-136-0x00000253D51D0000-0x00000253D51D7000-memory.dmpFilesize
28KB
-
memory/3880-153-0x00007FFC7BB90000-0x00007FFC7BC96000-memory.dmpFilesize
1.0MB