Analysis
-
max time kernel
152s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
17-04-2022 07:15
Static task
static1
Behavioral task
behavioral1
Sample
91a7289739c77592bb9df66d5c071d4db3776f1605f2c424b81d785ebccd4a65.dll
Resource
win7-20220414-en
General
-
Target
91a7289739c77592bb9df66d5c071d4db3776f1605f2c424b81d785ebccd4a65.dll
-
Size
884KB
-
MD5
ced02686016fde4bfb16ba8f821108bf
-
SHA1
3a0d57f789e19bc2dd84697f283fb21a49d45800
-
SHA256
91a7289739c77592bb9df66d5c071d4db3776f1605f2c424b81d785ebccd4a65
-
SHA512
9b278ec14d2c3cfb2f5ee3a4a622c37302a6e3573d7364c32f1124a578e98aeb84a576848fffe5f580495841a7bae1ac6fdebba7da1fda26aab5bee08bf13d9a
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1272-54-0x0000000002980000-0x0000000002981000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
recdisc.exewisptis.exesigverif.exepid process 1940 recdisc.exe 1244 wisptis.exe 776 sigverif.exe -
Loads dropped DLL 7 IoCs
Processes:
recdisc.exewisptis.exesigverif.exepid process 1272 1940 recdisc.exe 1272 1244 wisptis.exe 1272 776 sigverif.exe 1272 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\Evgmngveltmlhb = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\qSWW0TEL\\wisptis.exe" -
Processes:
recdisc.exewisptis.exesigverif.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA recdisc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wisptis.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sigverif.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exerecdisc.exepid process 1984 rundll32.exe 1984 rundll32.exe 1984 rundll32.exe 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1940 recdisc.exe 1940 recdisc.exe 1272 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 1272 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1272 wrote to memory of 1888 1272 recdisc.exe PID 1272 wrote to memory of 1888 1272 recdisc.exe PID 1272 wrote to memory of 1888 1272 recdisc.exe PID 1272 wrote to memory of 1940 1272 recdisc.exe PID 1272 wrote to memory of 1940 1272 recdisc.exe PID 1272 wrote to memory of 1940 1272 recdisc.exe PID 1272 wrote to memory of 1752 1272 wisptis.exe PID 1272 wrote to memory of 1752 1272 wisptis.exe PID 1272 wrote to memory of 1752 1272 wisptis.exe PID 1272 wrote to memory of 1244 1272 wisptis.exe PID 1272 wrote to memory of 1244 1272 wisptis.exe PID 1272 wrote to memory of 1244 1272 wisptis.exe PID 1272 wrote to memory of 1520 1272 sigverif.exe PID 1272 wrote to memory of 1520 1272 sigverif.exe PID 1272 wrote to memory of 1520 1272 sigverif.exe PID 1272 wrote to memory of 776 1272 sigverif.exe PID 1272 wrote to memory of 776 1272 sigverif.exe PID 1272 wrote to memory of 776 1272 sigverif.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\91a7289739c77592bb9df66d5c071d4db3776f1605f2c424b81d785ebccd4a65.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\recdisc.exeC:\Windows\system32\recdisc.exe1⤵
-
C:\Users\Admin\AppData\Local\Z9oqQqxU\recdisc.exeC:\Users\Admin\AppData\Local\Z9oqQqxU\recdisc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\wisptis.exeC:\Windows\system32\wisptis.exe1⤵
-
C:\Users\Admin\AppData\Local\KN1i\wisptis.exeC:\Users\Admin\AppData\Local\KN1i\wisptis.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\sigverif.exeC:\Windows\system32\sigverif.exe1⤵
-
C:\Users\Admin\AppData\Local\9nNk\sigverif.exeC:\Users\Admin\AppData\Local\9nNk\sigverif.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\9nNk\VERSION.dllFilesize
885KB
MD5e21b14e62ec5ac659ca406f943b39cfa
SHA1135241626f0d4b679473f4cb0e3459459410df7c
SHA256831ffbe39c2a34aa54e20abd6b1c866debffb1c5e37789d81ea9deb8a3586caf
SHA512f3b3cdfe5ceb450a962bad35b032d9c85eb5d4f0278b6b20c5cd59eb4dc48917e89e490252da29f1ff712f4c02915068360c42d266ef2df649b527e71de0ea6d
-
C:\Users\Admin\AppData\Local\9nNk\sigverif.exeFilesize
73KB
MD5e8e95ae5534553fc055051cee99a7f55
SHA14e0f668849fd546edd083d5981ed685d02a68df4
SHA2569e107fd99892d08b15c223ac17c49af75a4cbca41b5e939bb91c9dca9f0d0bec
SHA5125d3c32d136a264b6d2cfba4602e4d8f75e55ba0e199e0e81d7a515c34d8b9237db29647c10ab79081173010ff8e2c6a59b652c0a9cfa796433aed2d200f02da6
-
C:\Users\Admin\AppData\Local\KN1i\HID.DLLFilesize
886KB
MD594645e0dfc31f9bff222b2bde41245bd
SHA13f380705f330a397d9182d3da7215d864906a752
SHA256d504e1220e2d310d203457512d04ab2a90fd948a25e11deadf64b14c63274d8a
SHA51275012da3e39b0d6a4e82e0736995f8220972d492bb5e28d877ec8bbfe40a041710fc8c2beace1eb0a1869669096c2ae0afad69b200282ae0dc77f4a7a96d1b18
-
C:\Users\Admin\AppData\Local\KN1i\wisptis.exeFilesize
396KB
MD502e20372d9d6d28e37ba9704edc90b67
SHA1d7d18ba0df95c3507bf20be8d72e25c5d11ab40c
SHA2563338129ddf6fb53d6e743c10bc39ec372d9b2c39c607cbe8a71cff929f854144
SHA512bcad8894614dcfc1429be04829c217e7c8ac3c40ea3927073de3421d96d9815739ee1b84f0200eb18b3b8406b972bd934204b7b31638c9fe7c297fb201ed4200
-
C:\Users\Admin\AppData\Local\KN1i\wisptis.exeFilesize
396KB
MD502e20372d9d6d28e37ba9704edc90b67
SHA1d7d18ba0df95c3507bf20be8d72e25c5d11ab40c
SHA2563338129ddf6fb53d6e743c10bc39ec372d9b2c39c607cbe8a71cff929f854144
SHA512bcad8894614dcfc1429be04829c217e7c8ac3c40ea3927073de3421d96d9815739ee1b84f0200eb18b3b8406b972bd934204b7b31638c9fe7c297fb201ed4200
-
C:\Users\Admin\AppData\Local\Z9oqQqxU\SPP.dllFilesize
885KB
MD5d8f68d7375dd8fd9d18332e622ddd7de
SHA1fae08e7dee8ec4b223e0384ca9bed973403531a1
SHA256e3431e09c98f0f896678b7fd26817b7188c632f3746c4ca29467ef5b1f1f2eb4
SHA512129204975eed3c64b395275729e96628e44a6722eae7455016812e62f7ff23d3f43bc03d952f7db0103c3fde6e80234b8a8aca906d159ec09c1a6a346b753b32
-
C:\Users\Admin\AppData\Local\Z9oqQqxU\recdisc.exeFilesize
232KB
MD5f3b306179f1840c0813dc6771b018358
SHA1dec7ce3c13f7a684cb52ae6007c99cf03afef005
SHA256dcaeb590394b42d180e23e3cef4dd135513395b026e0ed489aec49848b85b8f0
SHA5129f9ec4c2ca6373bd738bf415d059f3536390e46e5b0a560e9ee1b190407a6d0f481c38664c51b834a9e72d8878f71c3c19e427e3a6b5ca4ec6b02d1156eb9ef4
-
\Users\Admin\AppData\Local\9nNk\VERSION.dllFilesize
885KB
MD5e21b14e62ec5ac659ca406f943b39cfa
SHA1135241626f0d4b679473f4cb0e3459459410df7c
SHA256831ffbe39c2a34aa54e20abd6b1c866debffb1c5e37789d81ea9deb8a3586caf
SHA512f3b3cdfe5ceb450a962bad35b032d9c85eb5d4f0278b6b20c5cd59eb4dc48917e89e490252da29f1ff712f4c02915068360c42d266ef2df649b527e71de0ea6d
-
\Users\Admin\AppData\Local\9nNk\sigverif.exeFilesize
73KB
MD5e8e95ae5534553fc055051cee99a7f55
SHA14e0f668849fd546edd083d5981ed685d02a68df4
SHA2569e107fd99892d08b15c223ac17c49af75a4cbca41b5e939bb91c9dca9f0d0bec
SHA5125d3c32d136a264b6d2cfba4602e4d8f75e55ba0e199e0e81d7a515c34d8b9237db29647c10ab79081173010ff8e2c6a59b652c0a9cfa796433aed2d200f02da6
-
\Users\Admin\AppData\Local\KN1i\HID.DLLFilesize
886KB
MD594645e0dfc31f9bff222b2bde41245bd
SHA13f380705f330a397d9182d3da7215d864906a752
SHA256d504e1220e2d310d203457512d04ab2a90fd948a25e11deadf64b14c63274d8a
SHA51275012da3e39b0d6a4e82e0736995f8220972d492bb5e28d877ec8bbfe40a041710fc8c2beace1eb0a1869669096c2ae0afad69b200282ae0dc77f4a7a96d1b18
-
\Users\Admin\AppData\Local\KN1i\wisptis.exeFilesize
396KB
MD502e20372d9d6d28e37ba9704edc90b67
SHA1d7d18ba0df95c3507bf20be8d72e25c5d11ab40c
SHA2563338129ddf6fb53d6e743c10bc39ec372d9b2c39c607cbe8a71cff929f854144
SHA512bcad8894614dcfc1429be04829c217e7c8ac3c40ea3927073de3421d96d9815739ee1b84f0200eb18b3b8406b972bd934204b7b31638c9fe7c297fb201ed4200
-
\Users\Admin\AppData\Local\Z9oqQqxU\SPP.dllFilesize
885KB
MD5d8f68d7375dd8fd9d18332e622ddd7de
SHA1fae08e7dee8ec4b223e0384ca9bed973403531a1
SHA256e3431e09c98f0f896678b7fd26817b7188c632f3746c4ca29467ef5b1f1f2eb4
SHA512129204975eed3c64b395275729e96628e44a6722eae7455016812e62f7ff23d3f43bc03d952f7db0103c3fde6e80234b8a8aca906d159ec09c1a6a346b753b32
-
\Users\Admin\AppData\Local\Z9oqQqxU\recdisc.exeFilesize
232KB
MD5f3b306179f1840c0813dc6771b018358
SHA1dec7ce3c13f7a684cb52ae6007c99cf03afef005
SHA256dcaeb590394b42d180e23e3cef4dd135513395b026e0ed489aec49848b85b8f0
SHA5129f9ec4c2ca6373bd738bf415d059f3536390e46e5b0a560e9ee1b190407a6d0f481c38664c51b834a9e72d8878f71c3c19e427e3a6b5ca4ec6b02d1156eb9ef4
-
\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\ImplicitAppShortcuts\FcSv3S\sigverif.exeFilesize
73KB
MD5e8e95ae5534553fc055051cee99a7f55
SHA14e0f668849fd546edd083d5981ed685d02a68df4
SHA2569e107fd99892d08b15c223ac17c49af75a4cbca41b5e939bb91c9dca9f0d0bec
SHA5125d3c32d136a264b6d2cfba4602e4d8f75e55ba0e199e0e81d7a515c34d8b9237db29647c10ab79081173010ff8e2c6a59b652c0a9cfa796433aed2d200f02da6
-
memory/776-81-0x0000000000000000-mapping.dmp
-
memory/1244-75-0x0000000000000000-mapping.dmp
-
memory/1272-64-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1272-61-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1272-57-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1272-60-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1272-56-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1272-67-0x0000000077B80000-0x0000000077B82000-memory.dmpFilesize
8KB
-
memory/1272-65-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1272-66-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1272-54-0x0000000002980000-0x0000000002981000-memory.dmpFilesize
4KB
-
memory/1272-58-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1272-63-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1272-55-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1272-62-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1272-59-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1940-69-0x0000000000000000-mapping.dmp
-
memory/1940-71-0x000007FEFC1F1000-0x000007FEFC1F3000-memory.dmpFilesize
8KB