Analysis
-
max time kernel
151s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
17-04-2022 07:16
Static task
static1
Behavioral task
behavioral1
Sample
73caa28a71480350c140f8cb71bf182687bf83c0d481692b2b3bf03aa5fbcfc9.dll
Resource
win7-20220414-en
General
-
Target
73caa28a71480350c140f8cb71bf182687bf83c0d481692b2b3bf03aa5fbcfc9.dll
-
Size
889KB
-
MD5
1460c61535d4ed50db9b869de9730df8
-
SHA1
fe13819850c1539cbd2cbefe62f5ad72f9b03fb5
-
SHA256
73caa28a71480350c140f8cb71bf182687bf83c0d481692b2b3bf03aa5fbcfc9
-
SHA512
ce3cbaad3e075cdfcbf0889d82f6a2d8fe8947fa00e09cc58b4bd77a85dbbace5564ea3ad33026dc1b482bf3b17f1194a8988b2c33513dc957550a3e713d5d10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1264-54-0x00000000026A0000-0x00000000026A1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
tabcal.exeDeviceDisplayObjectProvider.exerecdisc.exepid process 1780 tabcal.exe 304 DeviceDisplayObjectProvider.exe 1804 recdisc.exe -
Loads dropped DLL 7 IoCs
Processes:
tabcal.exeDeviceDisplayObjectProvider.exerecdisc.exepid process 1264 1780 tabcal.exe 1264 304 DeviceDisplayObjectProvider.exe 1264 1804 recdisc.exe 1264 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gcehmtlftxqmyqm = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\QUICKL~1\\9Sc\\DEVICE~1.EXE" -
Processes:
rundll32.exetabcal.exeDeviceDisplayObjectProvider.exerecdisc.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tabcal.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DeviceDisplayObjectProvider.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA recdisc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exetabcal.exepid process 1904 rundll32.exe 1904 rundll32.exe 1904 rundll32.exe 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1780 tabcal.exe 1780 tabcal.exe 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 1264 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1264 wrote to memory of 1284 1264 tabcal.exe PID 1264 wrote to memory of 1284 1264 tabcal.exe PID 1264 wrote to memory of 1284 1264 tabcal.exe PID 1264 wrote to memory of 1780 1264 tabcal.exe PID 1264 wrote to memory of 1780 1264 tabcal.exe PID 1264 wrote to memory of 1780 1264 tabcal.exe PID 1264 wrote to memory of 1796 1264 DeviceDisplayObjectProvider.exe PID 1264 wrote to memory of 1796 1264 DeviceDisplayObjectProvider.exe PID 1264 wrote to memory of 1796 1264 DeviceDisplayObjectProvider.exe PID 1264 wrote to memory of 304 1264 DeviceDisplayObjectProvider.exe PID 1264 wrote to memory of 304 1264 DeviceDisplayObjectProvider.exe PID 1264 wrote to memory of 304 1264 DeviceDisplayObjectProvider.exe PID 1264 wrote to memory of 1080 1264 recdisc.exe PID 1264 wrote to memory of 1080 1264 recdisc.exe PID 1264 wrote to memory of 1080 1264 recdisc.exe PID 1264 wrote to memory of 1804 1264 recdisc.exe PID 1264 wrote to memory of 1804 1264 recdisc.exe PID 1264 wrote to memory of 1804 1264 recdisc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\73caa28a71480350c140f8cb71bf182687bf83c0d481692b2b3bf03aa5fbcfc9.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\tabcal.exeC:\Windows\system32\tabcal.exe1⤵
-
C:\Users\Admin\AppData\Local\Wkup\tabcal.exeC:\Users\Admin\AppData\Local\Wkup\tabcal.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\DeviceDisplayObjectProvider.exeC:\Windows\system32\DeviceDisplayObjectProvider.exe1⤵
-
C:\Users\Admin\AppData\Local\RiSaYwh\DeviceDisplayObjectProvider.exeC:\Users\Admin\AppData\Local\RiSaYwh\DeviceDisplayObjectProvider.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\recdisc.exeC:\Windows\system32\recdisc.exe1⤵
-
C:\Users\Admin\AppData\Local\GaGlcj\recdisc.exeC:\Users\Admin\AppData\Local\GaGlcj\recdisc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\GaGlcj\ReAgent.dllFilesize
890KB
MD5a709241d961235324de73b427e7188a4
SHA11cda58d7af092f433f7811226ec67edd0939f2b9
SHA2565aeb51eece2d02afd444cf792377ff0cc65994c16b5c6d36559666ec02762f7b
SHA5126a2fd6399590e9bae1fd74b346ce154b29326f5678a945a458fa9f8907e6630a9069982ad4774ac37bda2374d76d62523ff8513b1856708eb6bff663c2040fdb
-
C:\Users\Admin\AppData\Local\GaGlcj\recdisc.exeFilesize
232KB
MD5f3b306179f1840c0813dc6771b018358
SHA1dec7ce3c13f7a684cb52ae6007c99cf03afef005
SHA256dcaeb590394b42d180e23e3cef4dd135513395b026e0ed489aec49848b85b8f0
SHA5129f9ec4c2ca6373bd738bf415d059f3536390e46e5b0a560e9ee1b190407a6d0f481c38664c51b834a9e72d8878f71c3c19e427e3a6b5ca4ec6b02d1156eb9ef4
-
C:\Users\Admin\AppData\Local\RiSaYwh\DeviceDisplayObjectProvider.exeFilesize
109KB
MD57e2eb3a4ae11190ef4c8a9b9a9123234
SHA172e98687a8d28614e2131c300403c2822856e865
SHA2568481a8ec19cb656ce328c877d5817d317203ba34424a2e9d169ddce5bf2cd2b0
SHA51218b1a0637f48929972a463d441182307725ebf1410dd461a1966bd040ac5dcced138155b7c713bfc924ea2f7b39527a084a08b44fa24c3eb9c654871f99caabf
-
C:\Users\Admin\AppData\Local\RiSaYwh\XmlLite.dllFilesize
890KB
MD50ef7a0d6bf360eecf617b7ea0a909edb
SHA175a6aeff69db8609bf726e171dc157563ea2d528
SHA256b585154109c8bf839aba9bf96fbd8ba92905e696faa998a29ae323c1461ab4b2
SHA512ab079699cff0010d403a9592dbc12b50124544016f87d4cba670fc09459c6780a63c345b47bf97f11d85257cef0fb8bc22c7b96965d493a94d9c9d3b34cf6ba1
-
C:\Users\Admin\AppData\Local\Wkup\HID.DLLFilesize
891KB
MD56f3347913fcc2d4f15dc0759b6ab0198
SHA131f8ffc93a1001880582d6bf6197f2f5fcf55687
SHA256095cb616cf0714b54f530edb18a5b96c9640e27186c50c5e47cce079b4f0ef38
SHA512b672ffc04c591ddc8f5116bd4b94eb72ecfd886e452d0e79783b6a1e4c2364df36774b226c7e1e60418c6e1f05fd2a828acb0d7e819cc1b7d9a5fda7bfd59f23
-
C:\Users\Admin\AppData\Local\Wkup\tabcal.exeFilesize
77KB
MD598e7911befe83f76777317ce6905666d
SHA12780088dffe1dd1356c5dd5112a9f04afee3ee8d
SHA2563fe8b63367b4298e70d46e87ce04cc7af5f30dfdb86b79eae41d0731d9415ea1
SHA512fc0226381d9a6984cccac8282697c78966524e1359f7f6044559b8223e773d3c108dda08a2dd283aa171dca3390801f2c92a5d1dbb978dd7f92a67bd8877b8b6
-
\Users\Admin\AppData\Local\GaGlcj\ReAgent.dllFilesize
890KB
MD5a709241d961235324de73b427e7188a4
SHA11cda58d7af092f433f7811226ec67edd0939f2b9
SHA2565aeb51eece2d02afd444cf792377ff0cc65994c16b5c6d36559666ec02762f7b
SHA5126a2fd6399590e9bae1fd74b346ce154b29326f5678a945a458fa9f8907e6630a9069982ad4774ac37bda2374d76d62523ff8513b1856708eb6bff663c2040fdb
-
\Users\Admin\AppData\Local\GaGlcj\recdisc.exeFilesize
232KB
MD5f3b306179f1840c0813dc6771b018358
SHA1dec7ce3c13f7a684cb52ae6007c99cf03afef005
SHA256dcaeb590394b42d180e23e3cef4dd135513395b026e0ed489aec49848b85b8f0
SHA5129f9ec4c2ca6373bd738bf415d059f3536390e46e5b0a560e9ee1b190407a6d0f481c38664c51b834a9e72d8878f71c3c19e427e3a6b5ca4ec6b02d1156eb9ef4
-
\Users\Admin\AppData\Local\RiSaYwh\DeviceDisplayObjectProvider.exeFilesize
109KB
MD57e2eb3a4ae11190ef4c8a9b9a9123234
SHA172e98687a8d28614e2131c300403c2822856e865
SHA2568481a8ec19cb656ce328c877d5817d317203ba34424a2e9d169ddce5bf2cd2b0
SHA51218b1a0637f48929972a463d441182307725ebf1410dd461a1966bd040ac5dcced138155b7c713bfc924ea2f7b39527a084a08b44fa24c3eb9c654871f99caabf
-
\Users\Admin\AppData\Local\RiSaYwh\XmlLite.dllFilesize
890KB
MD50ef7a0d6bf360eecf617b7ea0a909edb
SHA175a6aeff69db8609bf726e171dc157563ea2d528
SHA256b585154109c8bf839aba9bf96fbd8ba92905e696faa998a29ae323c1461ab4b2
SHA512ab079699cff0010d403a9592dbc12b50124544016f87d4cba670fc09459c6780a63c345b47bf97f11d85257cef0fb8bc22c7b96965d493a94d9c9d3b34cf6ba1
-
\Users\Admin\AppData\Local\Wkup\HID.DLLFilesize
891KB
MD56f3347913fcc2d4f15dc0759b6ab0198
SHA131f8ffc93a1001880582d6bf6197f2f5fcf55687
SHA256095cb616cf0714b54f530edb18a5b96c9640e27186c50c5e47cce079b4f0ef38
SHA512b672ffc04c591ddc8f5116bd4b94eb72ecfd886e452d0e79783b6a1e4c2364df36774b226c7e1e60418c6e1f05fd2a828acb0d7e819cc1b7d9a5fda7bfd59f23
-
\Users\Admin\AppData\Local\Wkup\tabcal.exeFilesize
77KB
MD598e7911befe83f76777317ce6905666d
SHA12780088dffe1dd1356c5dd5112a9f04afee3ee8d
SHA2563fe8b63367b4298e70d46e87ce04cc7af5f30dfdb86b79eae41d0731d9415ea1
SHA512fc0226381d9a6984cccac8282697c78966524e1359f7f6044559b8223e773d3c108dda08a2dd283aa171dca3390801f2c92a5d1dbb978dd7f92a67bd8877b8b6
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\krBhg74l9G\recdisc.exeFilesize
232KB
MD5f3b306179f1840c0813dc6771b018358
SHA1dec7ce3c13f7a684cb52ae6007c99cf03afef005
SHA256dcaeb590394b42d180e23e3cef4dd135513395b026e0ed489aec49848b85b8f0
SHA5129f9ec4c2ca6373bd738bf415d059f3536390e46e5b0a560e9ee1b190407a6d0f481c38664c51b834a9e72d8878f71c3c19e427e3a6b5ca4ec6b02d1156eb9ef4
-
memory/304-74-0x0000000000000000-mapping.dmp
-
memory/1264-62-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/1264-64-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/1264-67-0x0000000077030000-0x0000000077032000-memory.dmpFilesize
8KB
-
memory/1264-55-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/1264-57-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/1264-58-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/1264-59-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/1264-60-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/1264-54-0x00000000026A0000-0x00000000026A1000-memory.dmpFilesize
4KB
-
memory/1264-56-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/1264-61-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/1264-65-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/1264-66-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/1264-63-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/1780-69-0x0000000000000000-mapping.dmp
-
memory/1804-81-0x000007FEFB6D1000-0x000007FEFB6D3000-memory.dmpFilesize
8KB
-
memory/1804-79-0x0000000000000000-mapping.dmp