Analysis
-
max time kernel
154s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
01-02-2022 11:51
Static task
static1
Behavioral task
behavioral1
Sample
6712500bb0de148a99ec940160d3d61850e2ce3803adca8f39e9fa8621b8ea6f.dll
Resource
win7-en-20211208
General
-
Target
6712500bb0de148a99ec940160d3d61850e2ce3803adca8f39e9fa8621b8ea6f.dll
-
Size
1.0MB
-
MD5
369638ac700f3c41ebaba447d4048ff8
-
SHA1
6c50a1abf9dc992e74a73279d40fb1a09368cdfe
-
SHA256
6712500bb0de148a99ec940160d3d61850e2ce3803adca8f39e9fa8621b8ea6f
-
SHA512
5f7a1913e83cd443a3339af0a52c04a4de17c67be480646d9bb02c984196a0a1ec3d7419ee88ca12d219af927aad1859c47372e08ba6a7a35ad956d5dc4ce7f5
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2432-137-0x0000000000F80000-0x0000000000F81000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
mfpmp.exerstrui.exeSystemPropertiesHardware.exepid process 3848 mfpmp.exe 2296 rstrui.exe 2584 SystemPropertiesHardware.exe -
Sets service image path in registry 2 TTPs
-
Loads dropped DLL 3 IoCs
Processes:
mfpmp.exerstrui.exeSystemPropertiesHardware.exepid process 3848 mfpmp.exe 2296 rstrui.exe 2584 SystemPropertiesHardware.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Flqldkhbz = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Word\\BTtAc\\rstrui.exe" -
Processes:
rundll32.exemfpmp.exerstrui.exeSystemPropertiesHardware.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mfpmp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rstrui.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesHardware.exe -
Modifies data under HKEY_USERS 41 IoCs
Processes:
WaaSMedicAgent.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exemfpmp.exepid process 4000 rundll32.exe 4000 rundll32.exe 4000 rundll32.exe 4000 rundll32.exe 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 2432 3848 mfpmp.exe 3848 mfpmp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2432 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 2432 Token: SeCreatePagefilePrivilege 2432 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 2432 wrote to memory of 3852 2432 mfpmp.exe PID 2432 wrote to memory of 3852 2432 mfpmp.exe PID 2432 wrote to memory of 3848 2432 mfpmp.exe PID 2432 wrote to memory of 3848 2432 mfpmp.exe PID 2432 wrote to memory of 2360 2432 rstrui.exe PID 2432 wrote to memory of 2360 2432 rstrui.exe PID 2432 wrote to memory of 2296 2432 rstrui.exe PID 2432 wrote to memory of 2296 2432 rstrui.exe PID 2432 wrote to memory of 564 2432 SystemPropertiesHardware.exe PID 2432 wrote to memory of 564 2432 SystemPropertiesHardware.exe PID 2432 wrote to memory of 2584 2432 SystemPropertiesHardware.exe PID 2432 wrote to memory of 2584 2432 SystemPropertiesHardware.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6712500bb0de148a99ec940160d3d61850e2ce3803adca8f39e9fa8621b8ea6f.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\mfpmp.exeC:\Windows\system32\mfpmp.exe1⤵
-
C:\Users\Admin\AppData\Local\qPm4rFB\mfpmp.exeC:\Users\Admin\AppData\Local\qPm4rFB\mfpmp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\rstrui.exeC:\Windows\system32\rstrui.exe1⤵
-
C:\Users\Admin\AppData\Local\5LXMT\rstrui.exeC:\Users\Admin\AppData\Local\5LXMT\rstrui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 4c4715869dad9bb08378e2bc665701f0 m1LUVBdGck63P0D30X+vRQ.0.1.0.0.01⤵
- Modifies data under HKEY_USERS
-
C:\Windows\system32\SystemPropertiesHardware.exeC:\Windows\system32\SystemPropertiesHardware.exe1⤵
-
C:\Users\Admin\AppData\Local\UPZ6w5DHu\SystemPropertiesHardware.exeC:\Users\Admin\AppData\Local\UPZ6w5DHu\SystemPropertiesHardware.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k wusvcs -p1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\5LXMT\SPP.dllMD5
ed6de4fea764ae85c887dc91db3a2294
SHA10c15bcae0d37c5be99ddc4a8bc8341dbcd16804e
SHA2566ddf989b9c0affecfc5068e43eb174f073f69ab803c0317252b24ecbc90297a1
SHA512c440612ac4f0ab00e36cf8ad102650028187943fcb93daba8d5d807b724cc960487c0b6b927e495d331adaf38eeeb9f4a62ae1c79f865578debfe7b12a621371
-
C:\Users\Admin\AppData\Local\5LXMT\SPP.dllMD5
ed6de4fea764ae85c887dc91db3a2294
SHA10c15bcae0d37c5be99ddc4a8bc8341dbcd16804e
SHA2566ddf989b9c0affecfc5068e43eb174f073f69ab803c0317252b24ecbc90297a1
SHA512c440612ac4f0ab00e36cf8ad102650028187943fcb93daba8d5d807b724cc960487c0b6b927e495d331adaf38eeeb9f4a62ae1c79f865578debfe7b12a621371
-
C:\Users\Admin\AppData\Local\5LXMT\rstrui.exeMD5
4cad10846e93e85790865d5c0ab6ffd9
SHA18a223f4bab28afa4c7ed630f29325563c5dcda1a
SHA2569ddcfcaf2ebc810cc2e593446681bc4ccbad39756b1712cf045db8dee6310b4b
SHA512c0db44de0d35a70277f8621a318c5099378da675376e47545cfbfa7412e70a870fd05c92e0d6523ea2e0139d54d9eeaed14973762341fa3154406ae36f4ce7c6
-
C:\Users\Admin\AppData\Local\UPZ6w5DHu\SYSDM.CPLMD5
1726724eea580b20db0c6c518b530c9e
SHA12130570129ecb642ad719324a2ebe9e4d910b2a1
SHA256cca6c4eed117133b71030b4a87a36b8f331951c08f149006ca52d0b7d1b428b2
SHA51270e5745bbc1839862b224868d38f47af6f8c75d6b54a4c0586d73bda07e1c814bf7353b3f4a7dea905f762a2ad22804b33ff68bd899a6f995ba5cb5285bbaf3e
-
C:\Users\Admin\AppData\Local\UPZ6w5DHu\SYSDM.CPLMD5
1726724eea580b20db0c6c518b530c9e
SHA12130570129ecb642ad719324a2ebe9e4d910b2a1
SHA256cca6c4eed117133b71030b4a87a36b8f331951c08f149006ca52d0b7d1b428b2
SHA51270e5745bbc1839862b224868d38f47af6f8c75d6b54a4c0586d73bda07e1c814bf7353b3f4a7dea905f762a2ad22804b33ff68bd899a6f995ba5cb5285bbaf3e
-
C:\Users\Admin\AppData\Local\UPZ6w5DHu\SystemPropertiesHardware.exeMD5
bf5bc0d70a936890d38d2510ee07a2cd
SHA169d5971fd264d8128f5633db9003afef5fad8f10
SHA256c8ebd920399ebcf3ab72bd325b71a6b4c6119dfecea03f25059a920c4d32acc7
SHA5120e129044777cbbf5ea995715159c50773c1818fc5e8faa5c827fd631b44c086b34dfdcbe174b105891ccc3882cc63a8664d189fb6a631d8f589de4e01a862f51
-
C:\Users\Admin\AppData\Local\qPm4rFB\MFPlat.DLLMD5
7b261b217f62eeb2d3c030882df8e53f
SHA1edc53e0151ca36c64294ef531f48d3177272820e
SHA2560a109d5fe7e3a96a781ae9036e414bf09d3f86dc4e3121c8ed2ba11d74b62a4a
SHA5120a76b938544d14304bd1c937bbd89a3bf87c8958aa06c31d4bf3685c2d6830ad199dd7405d18fc5d624d914921ca726e748f203703ce6897d1c47cadb66d56da
-
C:\Users\Admin\AppData\Local\qPm4rFB\MFPlat.DLLMD5
7b261b217f62eeb2d3c030882df8e53f
SHA1edc53e0151ca36c64294ef531f48d3177272820e
SHA2560a109d5fe7e3a96a781ae9036e414bf09d3f86dc4e3121c8ed2ba11d74b62a4a
SHA5120a76b938544d14304bd1c937bbd89a3bf87c8958aa06c31d4bf3685c2d6830ad199dd7405d18fc5d624d914921ca726e748f203703ce6897d1c47cadb66d56da
-
C:\Users\Admin\AppData\Local\qPm4rFB\mfpmp.exeMD5
8f8fd1988973bac0c5244431473b96a5
SHA1ce81ea37260d7cafe27612606cf044921ad1304c
SHA25627287ac874cef86be03aee7b6d34fdc3bd208070ed20e44621a305865fb7579e
SHA512a91179e1561168b3b58f5ca893bce425d35f4a02aec20ac3d6fb944f5eb3c06b0a1b9d9f3fb9ea87869d65671d2b89b4ae19acf794372bdbd27f5e9756c5a8ab
-
memory/2296-164-0x00007FFCC7C40000-0x00007FFCC7D45000-memory.dmpFilesize
1.0MB
-
memory/2432-139-0x0000000140000000-0x0000000140105000-memory.dmpFilesize
1.0MB
-
memory/2432-149-0x00007FFCE5960000-0x00007FFCE5970000-memory.dmpFilesize
64KB
-
memory/2432-148-0x00007FFCE599CF20-0x00007FFCE5A7DF20-memory.dmpFilesize
900KB
-
memory/2432-143-0x0000000140000000-0x0000000140105000-memory.dmpFilesize
1.0MB
-
memory/2432-142-0x0000000140000000-0x0000000140105000-memory.dmpFilesize
1.0MB
-
memory/2432-141-0x0000000140000000-0x0000000140105000-memory.dmpFilesize
1.0MB
-
memory/2432-140-0x0000000140000000-0x0000000140105000-memory.dmpFilesize
1.0MB
-
memory/2432-138-0x0000000140000000-0x0000000140105000-memory.dmpFilesize
1.0MB
-
memory/2432-137-0x0000000000F80000-0x0000000000F81000-memory.dmpFilesize
4KB
-
memory/3848-155-0x00007FFCC74F0000-0x00007FFCC75F7000-memory.dmpFilesize
1.0MB
-
memory/4000-130-0x00007FFCC74F0000-0x00007FFCC75F5000-memory.dmpFilesize
1.0MB
-
memory/4000-135-0x0000023665D00000-0x0000023665D07000-memory.dmpFilesize
28KB