Analysis
-
max time kernel
4294211s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
01-03-2022 05:42
Static task
static1
Behavioral task
behavioral1
Sample
5af146f34a016cb00d039b9c27f9377562b2114d1bd3bfb3bae84e37b621faeb.dll
Resource
win7-20220223-en
General
-
Target
5af146f34a016cb00d039b9c27f9377562b2114d1bd3bfb3bae84e37b621faeb.dll
-
Size
1.4MB
-
MD5
bbd1c7e574466ed65425219a7aa7ff68
-
SHA1
e9778bcf32187c7b54d0879b4f57a9aa38e19fa6
-
SHA256
5af146f34a016cb00d039b9c27f9377562b2114d1bd3bfb3bae84e37b621faeb
-
SHA512
c57faf27f783786a284d65b7fb124d700d8c03c4a0447025976ea737555199bcb4b9a400c06c3d6829fee2658882fb8c5b1e538776ce34cabd2358f6d0f3f547
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1396-60-0x0000000002650000-0x0000000002651000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
vmicsvc.exerrinstaller.exenotepad.exepid process 904 vmicsvc.exe 968 rrinstaller.exe 1524 notepad.exe -
Loads dropped DLL 7 IoCs
Processes:
vmicsvc.exerrinstaller.exenotepad.exepid process 1396 904 vmicsvc.exe 1396 968 rrinstaller.exe 1396 1524 notepad.exe 1396 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1405931862-909307831-4085185274-1000\Software\Microsoft\Windows\CurrentVersion\Run\Dxvtsffzcoo = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\PRINTE~1\\pcIU\\RRINST~1.EXE" -
Processes:
notepad.exevmicsvc.exerrinstaller.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA notepad.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA vmicsvc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rrinstaller.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exepid process 1064 regsvr32.exe 1064 regsvr32.exe 1064 regsvr32.exe 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 1396 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1396 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1396 wrote to memory of 1792 1396 vmicsvc.exe PID 1396 wrote to memory of 1792 1396 vmicsvc.exe PID 1396 wrote to memory of 1792 1396 vmicsvc.exe PID 1396 wrote to memory of 904 1396 vmicsvc.exe PID 1396 wrote to memory of 904 1396 vmicsvc.exe PID 1396 wrote to memory of 904 1396 vmicsvc.exe PID 1396 wrote to memory of 592 1396 rrinstaller.exe PID 1396 wrote to memory of 592 1396 rrinstaller.exe PID 1396 wrote to memory of 592 1396 rrinstaller.exe PID 1396 wrote to memory of 968 1396 rrinstaller.exe PID 1396 wrote to memory of 968 1396 rrinstaller.exe PID 1396 wrote to memory of 968 1396 rrinstaller.exe PID 1396 wrote to memory of 1972 1396 notepad.exe PID 1396 wrote to memory of 1972 1396 notepad.exe PID 1396 wrote to memory of 1972 1396 notepad.exe PID 1396 wrote to memory of 1524 1396 notepad.exe PID 1396 wrote to memory of 1524 1396 notepad.exe PID 1396 wrote to memory of 1524 1396 notepad.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\5af146f34a016cb00d039b9c27f9377562b2114d1bd3bfb3bae84e37b621faeb.dll1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\vmicsvc.exeC:\Windows\system32\vmicsvc.exe1⤵
-
C:\Users\Admin\AppData\Local\GyYGV6ZwB\vmicsvc.exeC:\Users\Admin\AppData\Local\GyYGV6ZwB\vmicsvc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\rrinstaller.exeC:\Windows\system32\rrinstaller.exe1⤵
-
C:\Users\Admin\AppData\Local\raJUz7Ej\rrinstaller.exeC:\Users\Admin\AppData\Local\raJUz7Ej\rrinstaller.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\notepad.exeC:\Windows\system32\notepad.exe1⤵
-
C:\Users\Admin\AppData\Local\zikt\notepad.exeC:\Users\Admin\AppData\Local\zikt\notepad.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\GyYGV6ZwB\ACTIVEDS.dllMD5
da4be8b4b2eef1a891735e503f4abf04
SHA1a3cbd3c605eae357bfbd62030dd45b215f0a2165
SHA256b35098b24c21d96fbf40469c9663b0e491c9a5567aeb59eda4e7a96c85a06bdd
SHA512da7a634caeea9022db80553d55fbea128a875e272ca315fafc4a1ad603714da980a925b1a432123ad7ac15af5ab5d735521883aaeae0ec39956db0002041c998
-
C:\Users\Admin\AppData\Local\GyYGV6ZwB\vmicsvc.exeMD5
79e14b291ca96a02f1eb22bd721deccd
SHA14c8dbff611acd8a92cd2280239f78bebd2a9947e
SHA256d829166db30923406a025bf33d6a0997be0a3df950114d1f34547a9525b749e8
SHA512f3d1fa7732b6b027bbaf22530331d27ede85f92c9fd64f940139fd262bd7468211a8a54c835d3934b1974b3d8ecddefa79ea77901b9ef49ab36069963693f988
-
C:\Users\Admin\AppData\Local\raJUz7Ej\MFPlat.DLLMD5
181b1d32e2af4a26f5f1d21a391d538f
SHA1a8c81b7c11eab552e3c9d5c2258582372e50e98b
SHA2563983e047103839b71fbc088005cc5866ed74485a5bcba883651134f164e900cf
SHA5126efe92c66452ef4ca89bb9a9fccd76a567fbe04b95f0e6f3ed1aeaf540075c569346899101297e6f265c971d41ef23f417228c74b24934ebc5eea2c6a36ad6cb
-
C:\Users\Admin\AppData\Local\raJUz7Ej\rrinstaller.exeMD5
0d3a73b0b30252680b383532f1758649
SHA19f098d2037e4dd94eca6d04c37b3d4ad8b0cc931
SHA256fc8a992b6ac311e1b1491ec3e31e273a41f7fdf3f68176321307b68489a03fbc
SHA512a7961f4d8d0e07959d1501d721c7751b01af6704c7da5c1f31e40de5372ee6a1fce2f3e0077c8e6a1bed017e11ce4be9b0d17c04e30b222fb3f0df67b870b2d4
-
C:\Users\Admin\AppData\Local\zikt\VERSION.dllMD5
1298c9227447cd1fca99be6bad1de85b
SHA117d45f57214c3c7b8c8a745cc07d628f84fae648
SHA256184f239a48ff6fed61430693c14be762165a9325e1ae444b07d5ab30e928e958
SHA512ce699ad3a15cccdf23b6b67c91e82e6d876cea04b11eaef1ac6c1e336b36ce5519c8d1829e1c8b5b62ad34f5b926278f85fbb09d36ad07b8571ebcd1350f60be
-
C:\Users\Admin\AppData\Local\zikt\notepad.exeMD5
f2c7bb8acc97f92e987a2d4087d021b1
SHA17eb0139d2175739b3ccb0d1110067820be6abd29
SHA256142e1d688ef0568370c37187fd9f2351d7ddeda574f8bfa9b0fa4ef42db85aa2
SHA5122f37a2e503cffbd7c05c7d8a125b55368ce11aad5b62f17aaac7aaf3391a6886fa6a0fd73223e9f30072419bf5762a8af7958e805a52d788ba41f61eb084bfe8
-
\Users\Admin\AppData\Local\GyYGV6ZwB\ACTIVEDS.dllMD5
da4be8b4b2eef1a891735e503f4abf04
SHA1a3cbd3c605eae357bfbd62030dd45b215f0a2165
SHA256b35098b24c21d96fbf40469c9663b0e491c9a5567aeb59eda4e7a96c85a06bdd
SHA512da7a634caeea9022db80553d55fbea128a875e272ca315fafc4a1ad603714da980a925b1a432123ad7ac15af5ab5d735521883aaeae0ec39956db0002041c998
-
\Users\Admin\AppData\Local\GyYGV6ZwB\vmicsvc.exeMD5
79e14b291ca96a02f1eb22bd721deccd
SHA14c8dbff611acd8a92cd2280239f78bebd2a9947e
SHA256d829166db30923406a025bf33d6a0997be0a3df950114d1f34547a9525b749e8
SHA512f3d1fa7732b6b027bbaf22530331d27ede85f92c9fd64f940139fd262bd7468211a8a54c835d3934b1974b3d8ecddefa79ea77901b9ef49ab36069963693f988
-
\Users\Admin\AppData\Local\raJUz7Ej\MFPlat.DLLMD5
181b1d32e2af4a26f5f1d21a391d538f
SHA1a8c81b7c11eab552e3c9d5c2258582372e50e98b
SHA2563983e047103839b71fbc088005cc5866ed74485a5bcba883651134f164e900cf
SHA5126efe92c66452ef4ca89bb9a9fccd76a567fbe04b95f0e6f3ed1aeaf540075c569346899101297e6f265c971d41ef23f417228c74b24934ebc5eea2c6a36ad6cb
-
\Users\Admin\AppData\Local\raJUz7Ej\rrinstaller.exeMD5
0d3a73b0b30252680b383532f1758649
SHA19f098d2037e4dd94eca6d04c37b3d4ad8b0cc931
SHA256fc8a992b6ac311e1b1491ec3e31e273a41f7fdf3f68176321307b68489a03fbc
SHA512a7961f4d8d0e07959d1501d721c7751b01af6704c7da5c1f31e40de5372ee6a1fce2f3e0077c8e6a1bed017e11ce4be9b0d17c04e30b222fb3f0df67b870b2d4
-
\Users\Admin\AppData\Local\zikt\VERSION.dllMD5
1298c9227447cd1fca99be6bad1de85b
SHA117d45f57214c3c7b8c8a745cc07d628f84fae648
SHA256184f239a48ff6fed61430693c14be762165a9325e1ae444b07d5ab30e928e958
SHA512ce699ad3a15cccdf23b6b67c91e82e6d876cea04b11eaef1ac6c1e336b36ce5519c8d1829e1c8b5b62ad34f5b926278f85fbb09d36ad07b8571ebcd1350f60be
-
\Users\Admin\AppData\Local\zikt\notepad.exeMD5
f2c7bb8acc97f92e987a2d4087d021b1
SHA17eb0139d2175739b3ccb0d1110067820be6abd29
SHA256142e1d688ef0568370c37187fd9f2351d7ddeda574f8bfa9b0fa4ef42db85aa2
SHA5122f37a2e503cffbd7c05c7d8a125b55368ce11aad5b62f17aaac7aaf3391a6886fa6a0fd73223e9f30072419bf5762a8af7958e805a52d788ba41f61eb084bfe8
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Network Shortcuts\h1sWKFuMIi3\notepad.exeMD5
f2c7bb8acc97f92e987a2d4087d021b1
SHA17eb0139d2175739b3ccb0d1110067820be6abd29
SHA256142e1d688ef0568370c37187fd9f2351d7ddeda574f8bfa9b0fa4ef42db85aa2
SHA5122f37a2e503cffbd7c05c7d8a125b55368ce11aad5b62f17aaac7aaf3391a6886fa6a0fd73223e9f30072419bf5762a8af7958e805a52d788ba41f61eb084bfe8
-
memory/904-88-0x0000000000270000-0x0000000000277000-memory.dmpFilesize
28KB
-
memory/904-84-0x0000000140000000-0x0000000140179000-memory.dmpFilesize
1.5MB
-
memory/968-93-0x0000000140000000-0x000000014017A000-memory.dmpFilesize
1.5MB
-
memory/968-97-0x0000000000400000-0x0000000000407000-memory.dmpFilesize
28KB
-
memory/1064-54-0x000007FEFB7A1000-0x000007FEFB7A3000-memory.dmpFilesize
8KB
-
memory/1064-59-0x00000000001A0000-0x00000000001A7000-memory.dmpFilesize
28KB
-
memory/1064-55-0x0000000140000000-0x0000000140178000-memory.dmpFilesize
1.5MB
-
memory/1396-66-0x0000000140000000-0x0000000140178000-memory.dmpFilesize
1.5MB
-
memory/1396-69-0x0000000140000000-0x0000000140178000-memory.dmpFilesize
1.5MB
-
memory/1396-78-0x0000000076F71000-0x0000000076F72000-memory.dmpFilesize
4KB
-
memory/1396-79-0x0000000077100000-0x0000000077102000-memory.dmpFilesize
8KB
-
memory/1396-61-0x0000000140000000-0x0000000140178000-memory.dmpFilesize
1.5MB
-
memory/1396-67-0x0000000140000000-0x0000000140178000-memory.dmpFilesize
1.5MB
-
memory/1396-68-0x0000000076E66000-0x0000000076E67000-memory.dmpFilesize
4KB
-
memory/1396-77-0x0000000002630000-0x0000000002637000-memory.dmpFilesize
28KB
-
memory/1396-70-0x0000000140000000-0x0000000140178000-memory.dmpFilesize
1.5MB
-
memory/1396-63-0x0000000140000000-0x0000000140178000-memory.dmpFilesize
1.5MB
-
memory/1396-65-0x0000000140000000-0x0000000140178000-memory.dmpFilesize
1.5MB
-
memory/1396-64-0x0000000140000000-0x0000000140178000-memory.dmpFilesize
1.5MB
-
memory/1396-62-0x0000000140000000-0x0000000140178000-memory.dmpFilesize
1.5MB
-
memory/1396-60-0x0000000002650000-0x0000000002651000-memory.dmpFilesize
4KB
-
memory/1524-107-0x00000000000F0000-0x00000000000F7000-memory.dmpFilesize
28KB