Analysis
-
max time kernel
151s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
17-04-2022 07:16
Static task
static1
Behavioral task
behavioral1
Sample
0731ec1f9527f2a2c35d1aaee97f959cb02e795821987aaff927d97daa42478d.dll
Resource
win7-20220414-en
General
-
Target
0731ec1f9527f2a2c35d1aaee97f959cb02e795821987aaff927d97daa42478d.dll
-
Size
883KB
-
MD5
ff389f0230936c0facf48d900e622849
-
SHA1
2cfcb3253c72dbe733bf9a6831f857c18e6dc7f8
-
SHA256
0731ec1f9527f2a2c35d1aaee97f959cb02e795821987aaff927d97daa42478d
-
SHA512
890b8918dc5c33ebc988bc9c6e1b850e1ef80afcbc03df47a0158b1cf072ebc09d0ee06626bd9f2ef287b17217e370150cb3e4ffc9c6b85613508d16ab5628af
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1272-54-0x0000000002A00000-0x0000000002A01000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
dvdupgrd.exemsdtc.exedccw.exepid process 804 dvdupgrd.exe 2040 msdtc.exe 1340 dccw.exe -
Loads dropped DLL 7 IoCs
Processes:
dvdupgrd.exemsdtc.exedccw.exepid process 1272 804 dvdupgrd.exe 1272 2040 msdtc.exe 1272 1340 dccw.exe 1272 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\Evgmngveltmlhb = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\QUICKL~1\\DLA3SC~1\\msdtc.exe" -
Processes:
msdtc.exedccw.exerundll32.exedvdupgrd.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msdtc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dccw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dvdupgrd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 956 rundll32.exe 956 rundll32.exe 956 rundll32.exe 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 1272 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 1272 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1272 wrote to memory of 300 1272 dvdupgrd.exe PID 1272 wrote to memory of 300 1272 dvdupgrd.exe PID 1272 wrote to memory of 300 1272 dvdupgrd.exe PID 1272 wrote to memory of 804 1272 dvdupgrd.exe PID 1272 wrote to memory of 804 1272 dvdupgrd.exe PID 1272 wrote to memory of 804 1272 dvdupgrd.exe PID 1272 wrote to memory of 700 1272 msdtc.exe PID 1272 wrote to memory of 700 1272 msdtc.exe PID 1272 wrote to memory of 700 1272 msdtc.exe PID 1272 wrote to memory of 2040 1272 msdtc.exe PID 1272 wrote to memory of 2040 1272 msdtc.exe PID 1272 wrote to memory of 2040 1272 msdtc.exe PID 1272 wrote to memory of 1308 1272 dccw.exe PID 1272 wrote to memory of 1308 1272 dccw.exe PID 1272 wrote to memory of 1308 1272 dccw.exe PID 1272 wrote to memory of 1340 1272 dccw.exe PID 1272 wrote to memory of 1340 1272 dccw.exe PID 1272 wrote to memory of 1340 1272 dccw.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0731ec1f9527f2a2c35d1aaee97f959cb02e795821987aaff927d97daa42478d.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\dvdupgrd.exeC:\Windows\system32\dvdupgrd.exe1⤵
-
C:\Users\Admin\AppData\Local\sv90wUB\dvdupgrd.exeC:\Users\Admin\AppData\Local\sv90wUB\dvdupgrd.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\msdtc.exeC:\Windows\system32\msdtc.exe1⤵
-
C:\Users\Admin\AppData\Local\MjyRa\msdtc.exeC:\Users\Admin\AppData\Local\MjyRa\msdtc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\dccw.exeC:\Windows\system32\dccw.exe1⤵
-
C:\Users\Admin\AppData\Local\weI\dccw.exeC:\Users\Admin\AppData\Local\weI\dccw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\MjyRa\VERSION.dllFilesize
884KB
MD5db36e99780c3e876b14d37f41ab00c93
SHA18bd95751422e113bcf54e1373b44f799917662a4
SHA256913ea5a115335b0083fd232ca802b8d625a0df671bc81da5b10ce19b97c30b71
SHA5120e0168877cee89019ba86cb562030c9a45938c022045ca4bf1ffbd0398c04dcd61894776e3439e48d818c952c2423d640f437847dc09416c79b7ee2e97dbc471
-
C:\Users\Admin\AppData\Local\MjyRa\msdtc.exeFilesize
138KB
MD5de0ece52236cfa3ed2dbfc03f28253a8
SHA184bbd2495c1809fcd19b535d41114e4fb101466c
SHA2562fbbec4cacb5161f68d7c2935852a5888945ca0f107cf8a1c01f4528ce407de3
SHA51269386134667626c60c99d941c8ab52f8e5235e3897b5af76965572287afd5dcd42b8207a520587844a57a268e4decb3f3c550e5b7a06230ee677dc5e40c50bb3
-
C:\Users\Admin\AppData\Local\sv90wUB\VERSION.dllFilesize
884KB
MD519f949c835da62fdc0ccb8147c59cc80
SHA19962e3a4983a486e4a034b57a90fde8aa32c9435
SHA2565e0d8fed8e9f675883a36463b3666cf1d574bc464b74a63fd09192eaef4b5bf0
SHA512809e19130764f8e796c4793840bf71a7133bf9d4c5e3efa936a5e87fbb2f236213e2061d9159412b6abb61e348ab69266eedddb126d87604ac770b0d555bd187
-
C:\Users\Admin\AppData\Local\sv90wUB\dvdupgrd.exeFilesize
25KB
MD575a9b4172eac01d9648c6d2133af952f
SHA163c7e1af762d2b584e9cc841e8b0100f2a482b81
SHA25618f9f520c7157023b0e7dfe7433a63c4dedd47b04d24aac4038b795893050736
SHA5125a7a2c7f184efd9c84256a1a0a5e7aeb95432d63a567196be54e7a9437a5ada9b922983c5fc0cafb16eab4493665d8e56e2f646f9f6a2d6179986925ffcdf769
-
C:\Users\Admin\AppData\Local\weI\dccw.exeFilesize
861KB
MD5a46cee731351eb4146db8e8a63a5c520
SHA18ea441e4a77642e12987ac842b36034230edd731
SHA256283526a98a83524d21ff23f9109754c6587380b67f74cc02a9a4cd56fdb720d5
SHA5123573c0ae21406db0c6fdda7c065fabde03235bde7f5589910822500bdfa37144f59f6e58e753e7347b899998db1dcb28050ac5a4e2c611558ae5fa405fbbc5cc
-
C:\Users\Admin\AppData\Local\weI\mscms.dllFilesize
888KB
MD5bc30c4e7727f0e245678e7fbc144eba6
SHA15e83d3714d94b27b72c0f8ea02973a9d976c3202
SHA256d09406348668d1d7c9f68fe13a8a90d159d063925dbf7cb645d602d7242b01bf
SHA51223b91ca35dce7e91890d7fef3b22aa56896e36bb3ead199fc7977f507d67d4f700936cc29cd0a0f02d558f114a5bf3132ae3e417b0690635b248b75829f42460
-
\Users\Admin\AppData\Local\MjyRa\VERSION.dllFilesize
884KB
MD5db36e99780c3e876b14d37f41ab00c93
SHA18bd95751422e113bcf54e1373b44f799917662a4
SHA256913ea5a115335b0083fd232ca802b8d625a0df671bc81da5b10ce19b97c30b71
SHA5120e0168877cee89019ba86cb562030c9a45938c022045ca4bf1ffbd0398c04dcd61894776e3439e48d818c952c2423d640f437847dc09416c79b7ee2e97dbc471
-
\Users\Admin\AppData\Local\MjyRa\msdtc.exeFilesize
138KB
MD5de0ece52236cfa3ed2dbfc03f28253a8
SHA184bbd2495c1809fcd19b535d41114e4fb101466c
SHA2562fbbec4cacb5161f68d7c2935852a5888945ca0f107cf8a1c01f4528ce407de3
SHA51269386134667626c60c99d941c8ab52f8e5235e3897b5af76965572287afd5dcd42b8207a520587844a57a268e4decb3f3c550e5b7a06230ee677dc5e40c50bb3
-
\Users\Admin\AppData\Local\sv90wUB\VERSION.dllFilesize
884KB
MD519f949c835da62fdc0ccb8147c59cc80
SHA19962e3a4983a486e4a034b57a90fde8aa32c9435
SHA2565e0d8fed8e9f675883a36463b3666cf1d574bc464b74a63fd09192eaef4b5bf0
SHA512809e19130764f8e796c4793840bf71a7133bf9d4c5e3efa936a5e87fbb2f236213e2061d9159412b6abb61e348ab69266eedddb126d87604ac770b0d555bd187
-
\Users\Admin\AppData\Local\sv90wUB\dvdupgrd.exeFilesize
25KB
MD575a9b4172eac01d9648c6d2133af952f
SHA163c7e1af762d2b584e9cc841e8b0100f2a482b81
SHA25618f9f520c7157023b0e7dfe7433a63c4dedd47b04d24aac4038b795893050736
SHA5125a7a2c7f184efd9c84256a1a0a5e7aeb95432d63a567196be54e7a9437a5ada9b922983c5fc0cafb16eab4493665d8e56e2f646f9f6a2d6179986925ffcdf769
-
\Users\Admin\AppData\Local\weI\dccw.exeFilesize
861KB
MD5a46cee731351eb4146db8e8a63a5c520
SHA18ea441e4a77642e12987ac842b36034230edd731
SHA256283526a98a83524d21ff23f9109754c6587380b67f74cc02a9a4cd56fdb720d5
SHA5123573c0ae21406db0c6fdda7c065fabde03235bde7f5589910822500bdfa37144f59f6e58e753e7347b899998db1dcb28050ac5a4e2c611558ae5fa405fbbc5cc
-
\Users\Admin\AppData\Local\weI\mscms.dllFilesize
888KB
MD5bc30c4e7727f0e245678e7fbc144eba6
SHA15e83d3714d94b27b72c0f8ea02973a9d976c3202
SHA256d09406348668d1d7c9f68fe13a8a90d159d063925dbf7cb645d602d7242b01bf
SHA51223b91ca35dce7e91890d7fef3b22aa56896e36bb3ead199fc7977f507d67d4f700936cc29cd0a0f02d558f114a5bf3132ae3e417b0690635b248b75829f42460
-
\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\vd8y93ppv\dccw.exeFilesize
861KB
MD5a46cee731351eb4146db8e8a63a5c520
SHA18ea441e4a77642e12987ac842b36034230edd731
SHA256283526a98a83524d21ff23f9109754c6587380b67f74cc02a9a4cd56fdb720d5
SHA5123573c0ae21406db0c6fdda7c065fabde03235bde7f5589910822500bdfa37144f59f6e58e753e7347b899998db1dcb28050ac5a4e2c611558ae5fa405fbbc5cc
-
memory/804-69-0x0000000000000000-mapping.dmp
-
memory/1272-62-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1272-63-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1272-58-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1272-59-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1272-61-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1272-56-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1272-57-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1272-55-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1272-64-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1272-65-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1272-67-0x00000000773C0000-0x00000000773C2000-memory.dmpFilesize
8KB
-
memory/1272-66-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1272-60-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1272-54-0x0000000002A00000-0x0000000002A01000-memory.dmpFilesize
4KB
-
memory/1340-83-0x000007FEFBA61000-0x000007FEFBA63000-memory.dmpFilesize
8KB
-
memory/1340-79-0x0000000000000000-mapping.dmp
-
memory/2040-74-0x0000000000000000-mapping.dmp