Analysis
-
max time kernel
170s -
max time network
183s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
17-04-2022 07:16
Static task
static1
Behavioral task
behavioral1
Sample
73caa28a71480350c140f8cb71bf182687bf83c0d481692b2b3bf03aa5fbcfc9.dll
Resource
win7-20220414-en
General
-
Target
73caa28a71480350c140f8cb71bf182687bf83c0d481692b2b3bf03aa5fbcfc9.dll
-
Size
889KB
-
MD5
1460c61535d4ed50db9b869de9730df8
-
SHA1
fe13819850c1539cbd2cbefe62f5ad72f9b03fb5
-
SHA256
73caa28a71480350c140f8cb71bf182687bf83c0d481692b2b3bf03aa5fbcfc9
-
SHA512
ce3cbaad3e075cdfcbf0889d82f6a2d8fe8947fa00e09cc58b4bd77a85dbbace5564ea3ad33026dc1b482bf3b17f1194a8988b2c33513dc957550a3e713d5d10
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/1060-130-0x0000000000900000-0x0000000000901000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
sethc.exeomadmclient.exeBitLockerWizard.exepid process 2580 sethc.exe 3408 omadmclient.exe 4220 BitLockerWizard.exe -
Loads dropped DLL 3 IoCs
Processes:
sethc.exeomadmclient.exeBitLockerWizard.exepid process 2580 sethc.exe 3408 omadmclient.exe 4220 BitLockerWizard.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wurgjldbctt = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\rNfDyb8MFX\\omadmclient.exe" -
Processes:
omadmclient.exeBitLockerWizard.exerundll32.exesethc.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA omadmclient.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sethc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1112 rundll32.exe 1112 rundll32.exe 1112 rundll32.exe 1112 rundll32.exe 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 1060 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1060 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 1060 wrote to memory of 4124 1060 sethc.exe PID 1060 wrote to memory of 4124 1060 sethc.exe PID 1060 wrote to memory of 2580 1060 sethc.exe PID 1060 wrote to memory of 2580 1060 sethc.exe PID 1060 wrote to memory of 3276 1060 omadmclient.exe PID 1060 wrote to memory of 3276 1060 omadmclient.exe PID 1060 wrote to memory of 3408 1060 omadmclient.exe PID 1060 wrote to memory of 3408 1060 omadmclient.exe PID 1060 wrote to memory of 4652 1060 BitLockerWizard.exe PID 1060 wrote to memory of 4652 1060 BitLockerWizard.exe PID 1060 wrote to memory of 4220 1060 BitLockerWizard.exe PID 1060 wrote to memory of 4220 1060 BitLockerWizard.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\73caa28a71480350c140f8cb71bf182687bf83c0d481692b2b3bf03aa5fbcfc9.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\sethc.exeC:\Windows\system32\sethc.exe1⤵
-
C:\Users\Admin\AppData\Local\QGs64V\sethc.exeC:\Users\Admin\AppData\Local\QGs64V\sethc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\omadmclient.exeC:\Windows\system32\omadmclient.exe1⤵
-
C:\Users\Admin\AppData\Local\rnTz3PnN\omadmclient.exeC:\Users\Admin\AppData\Local\rnTz3PnN\omadmclient.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\BitLockerWizard.exeC:\Windows\system32\BitLockerWizard.exe1⤵
-
C:\Users\Admin\AppData\Local\m4OXyT\BitLockerWizard.exeC:\Users\Admin\AppData\Local\m4OXyT\BitLockerWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\QGs64V\WTSAPI32.dllFilesize
892KB
MD57745c15667cc04858cf9e06e1c9b9c5f
SHA1202decf7a9c28ea70f684deb21e002f89ee10dbe
SHA256359b17ced362de678237ed749051ea2dc0776209ca42db2da61fda8c0346533d
SHA5122fbf12375c6d125bc6ed490d3f92437261f6d05f5a5969970c0279147973d40043bfb9649de59934ee6a080c5b5e8eaf20cc3e987d589d14ccfa5d3067cb6321
-
C:\Users\Admin\AppData\Local\QGs64V\WTSAPI32.dllFilesize
892KB
MD57745c15667cc04858cf9e06e1c9b9c5f
SHA1202decf7a9c28ea70f684deb21e002f89ee10dbe
SHA256359b17ced362de678237ed749051ea2dc0776209ca42db2da61fda8c0346533d
SHA5122fbf12375c6d125bc6ed490d3f92437261f6d05f5a5969970c0279147973d40043bfb9649de59934ee6a080c5b5e8eaf20cc3e987d589d14ccfa5d3067cb6321
-
C:\Users\Admin\AppData\Local\QGs64V\sethc.exeFilesize
104KB
MD58ba3a9702a3f1799431cad6a290223a6
SHA19c7dc9b6830297c8f759d1f46c8b36664e26c031
SHA256615b2f2d7e3fce340839a9b54bdc3445eb2333d0fafee477d6113379e90935b8
SHA512680c216d54f4fd2a14f0398e4461c8340ac15acdca75c36a42083625e1081d5e7d262c4c12296b6f21ba2f593f92816edf1c9a0cf4cbee23588e590713b87746
-
C:\Users\Admin\AppData\Local\m4OXyT\BitLockerWizard.exeFilesize
100KB
MD56d30c96f29f64b34bc98e4c81d9b0ee8
SHA14a3adc355f02b9c69bdbe391bfb01469dee15cf0
SHA2567758227642702e645af5e84d1c0e5690e07687c8209072a2c5f79379299edf74
SHA51225471b0ac7156d9ee9d12181020039bf551ba3efe252b656030c12d93b8db2648a18bdf762740f2a5cd8e43640e4bd4e8742310dea15823fc76b9e1c126876b8
-
C:\Users\Admin\AppData\Local\m4OXyT\FVEWIZ.dllFilesize
892KB
MD5f8cbad01505f9d52a6b262dc4613f9b8
SHA1dac4eeff0d80d1e7c2f69646bc257c05f9903846
SHA25696cfb7e228139780ae8d5bc0b5fd0889be170cdadb151180bbb2e80320ba6b81
SHA512ade81d201c56f15d82f4675d54ce949ff517aa720f2be437bb7bbeb2e4770fb2ebac1c61948b7c2f60ca40a5d52928e48999c18697c091d7ab804d6f37d58a8e
-
C:\Users\Admin\AppData\Local\m4OXyT\FVEWIZ.dllFilesize
892KB
MD5f8cbad01505f9d52a6b262dc4613f9b8
SHA1dac4eeff0d80d1e7c2f69646bc257c05f9903846
SHA25696cfb7e228139780ae8d5bc0b5fd0889be170cdadb151180bbb2e80320ba6b81
SHA512ade81d201c56f15d82f4675d54ce949ff517aa720f2be437bb7bbeb2e4770fb2ebac1c61948b7c2f60ca40a5d52928e48999c18697c091d7ab804d6f37d58a8e
-
C:\Users\Admin\AppData\Local\rnTz3PnN\XmlLite.dllFilesize
890KB
MD5a2e159793246fff7ce84285b29442cc7
SHA1951f66cee701284e721c6f5c7b7524a8f2b58706
SHA2564e499c9e882131cbe5b7320f1f1fd5d42bb3b3bbed5fbd697ac37f8267f4e7f4
SHA5126de3c59c7b4dc7432b286d2d694688fcbe51f25adccf5590d46206c7330a054911d39b16d569114a5fc40aa38b123b8d53ab46d289a9b0c01cdd6d2afed05a81
-
C:\Users\Admin\AppData\Local\rnTz3PnN\XmlLite.dllFilesize
890KB
MD5a2e159793246fff7ce84285b29442cc7
SHA1951f66cee701284e721c6f5c7b7524a8f2b58706
SHA2564e499c9e882131cbe5b7320f1f1fd5d42bb3b3bbed5fbd697ac37f8267f4e7f4
SHA5126de3c59c7b4dc7432b286d2d694688fcbe51f25adccf5590d46206c7330a054911d39b16d569114a5fc40aa38b123b8d53ab46d289a9b0c01cdd6d2afed05a81
-
C:\Users\Admin\AppData\Local\rnTz3PnN\omadmclient.exeFilesize
425KB
MD58992b5b28a996eb83761dafb24959ab4
SHA1697ecb33b8ff5b0e73ef29ce471153b368b1b729
SHA256e0c6c1b082c5d61be95b7fad95155b7cb2e516d6dcd51b8e1554a176876699e7
SHA5124ab0d71f6f9e5a5d0870d8e6eaa4b5db74ea6148de0a00603e3e56303d0fec4722172e0207b9678a5bd0136f2d43d43b9d34907183369ab3b9b9c1484034fe3d
-
memory/1060-138-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/1060-139-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/1060-142-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/1060-131-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/1060-144-0x00007FFFB994C000-0x00007FFFB994D000-memory.dmpFilesize
4KB
-
memory/1060-143-0x00007FFFB997C000-0x00007FFFB997D000-memory.dmpFilesize
4KB
-
memory/1060-145-0x00007FFFB9890000-0x00007FFFB98A0000-memory.dmpFilesize
64KB
-
memory/1060-132-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/1060-140-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/1060-141-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/1060-130-0x0000000000900000-0x0000000000901000-memory.dmpFilesize
4KB
-
memory/1060-133-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/1060-137-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/1060-136-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/1060-135-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/1060-134-0x0000000140000000-0x00000001400E2000-memory.dmpFilesize
904KB
-
memory/2580-146-0x0000000000000000-mapping.dmp
-
memory/3408-150-0x0000000000000000-mapping.dmp
-
memory/4220-154-0x0000000000000000-mapping.dmp