Analysis
-
max time kernel
151s -
max time network
74s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
17-04-2022 07:08
Static task
static1
Behavioral task
behavioral1
Sample
e123d54b17c5dba50509d3d0abdd61cf01d27eaf82e7d810351c550f018636ff.dll
Resource
win7-20220414-en
General
-
Target
e123d54b17c5dba50509d3d0abdd61cf01d27eaf82e7d810351c550f018636ff.dll
-
Size
881KB
-
MD5
ef39ac4244c3fc0ee69d71563bcdb993
-
SHA1
bb3f3706cced11a8140015d587654640cbeb99bb
-
SHA256
e123d54b17c5dba50509d3d0abdd61cf01d27eaf82e7d810351c550f018636ff
-
SHA512
11cc5fa8bc6f479bcbaa11332dbf6c47b5bc3d742bfaca8ec52aa929c8857db9bd2de99148006c89695c37b13601ba2e712f48f5d57deff95d36c99ed7fac33e
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3180-130-0x00000000014D0000-0x00000000014D1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
Utilman.exerdpinit.exeWindowsActionDialog.exepid process 2256 Utilman.exe 2424 rdpinit.exe 2772 WindowsActionDialog.exe -
Loads dropped DLL 3 IoCs
Processes:
Utilman.exerdpinit.exeWindowsActionDialog.exepid process 2256 Utilman.exe 2424 rdpinit.exe 2772 WindowsActionDialog.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Eqzhtortkjjc = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\ACCESS~2\\JXPJGU~1\\rdpinit.exe" -
Processes:
WindowsActionDialog.exerundll32.exeUtilman.exerdpinit.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WindowsActionDialog.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Utilman.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpinit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 4104 rundll32.exe 4104 rundll32.exe 4104 rundll32.exe 4104 rundll32.exe 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 3180 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3180 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3180 wrote to memory of 2660 3180 Utilman.exe PID 3180 wrote to memory of 2660 3180 Utilman.exe PID 3180 wrote to memory of 2256 3180 Utilman.exe PID 3180 wrote to memory of 2256 3180 Utilman.exe PID 3180 wrote to memory of 1196 3180 rdpinit.exe PID 3180 wrote to memory of 1196 3180 rdpinit.exe PID 3180 wrote to memory of 2424 3180 rdpinit.exe PID 3180 wrote to memory of 2424 3180 rdpinit.exe PID 3180 wrote to memory of 2252 3180 WindowsActionDialog.exe PID 3180 wrote to memory of 2252 3180 WindowsActionDialog.exe PID 3180 wrote to memory of 2772 3180 WindowsActionDialog.exe PID 3180 wrote to memory of 2772 3180 WindowsActionDialog.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e123d54b17c5dba50509d3d0abdd61cf01d27eaf82e7d810351c550f018636ff.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Ye3ThZ\Utilman.exeC:\Users\Admin\AppData\Local\Ye3ThZ\Utilman.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\Utilman.exeC:\Windows\system32\Utilman.exe1⤵
-
C:\Users\Admin\AppData\Local\7c8O1A\rdpinit.exeC:\Users\Admin\AppData\Local\7c8O1A\rdpinit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\rdpinit.exeC:\Windows\system32\rdpinit.exe1⤵
-
C:\Windows\system32\WindowsActionDialog.exeC:\Windows\system32\WindowsActionDialog.exe1⤵
-
C:\Users\Admin\AppData\Local\Jai0png\WindowsActionDialog.exeC:\Users\Admin\AppData\Local\Jai0png\WindowsActionDialog.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\7c8O1A\WTSAPI32.dllFilesize
883KB
MD5ce54f3c4b23f550231e24680916a750e
SHA13053920c4253869b71c8137f4e3c4dbacf1c365e
SHA2568c2944a97d309b771054ccaf3d639d56bf3cf51d14c991f2505cd8dbf1b3235c
SHA512fc7eb32c1b01b241fbc71d69dce523ccffda7037ab4f9c48ca1a5c1a9d71af2f31b4ab1fa48c6a95a3df61e19ee151a872abb9cf9ca52bf8389bc4eff1903b53
-
C:\Users\Admin\AppData\Local\7c8O1A\WTSAPI32.dllFilesize
883KB
MD5ce54f3c4b23f550231e24680916a750e
SHA13053920c4253869b71c8137f4e3c4dbacf1c365e
SHA2568c2944a97d309b771054ccaf3d639d56bf3cf51d14c991f2505cd8dbf1b3235c
SHA512fc7eb32c1b01b241fbc71d69dce523ccffda7037ab4f9c48ca1a5c1a9d71af2f31b4ab1fa48c6a95a3df61e19ee151a872abb9cf9ca52bf8389bc4eff1903b53
-
C:\Users\Admin\AppData\Local\7c8O1A\rdpinit.exeFilesize
343KB
MD5b0ecd76d99c5f5134aeb52460add6f80
SHA151462078092c9d6b7fa2b9544ffe0a49eb258106
SHA25651251863097f7c80ef59606152ec59e7522881c8e3886c194c43f56bcab92e1b
SHA51216855c7db48b26297c78d37d52ad03f6af0f5a58e333e17ad83b34f5e8b200c5517c6481043af0ecf1b962af2378f38600bd968592f4e1018b5a1b9400adb367
-
C:\Users\Admin\AppData\Local\Jai0png\DUI70.dllFilesize
1.1MB
MD54cadc1106061817a8fda38ff0682545a
SHA17e73dbcb8b29e7aa9459a7af7e283ca73329a7bd
SHA256182146f5b38b507e14d20fc273c02b3e25d7feffcbecf99cdc2b89fcc65a6c1b
SHA51225ce86162d8334f32efd27320f74b87ff89889329d0be36e2f1f6b50f264cb45445cd6ee3e6eeda9b598e837a71d8146dab08610a030d4e879f5d88381ac6e52
-
C:\Users\Admin\AppData\Local\Jai0png\DUI70.dllFilesize
1.1MB
MD54cadc1106061817a8fda38ff0682545a
SHA17e73dbcb8b29e7aa9459a7af7e283ca73329a7bd
SHA256182146f5b38b507e14d20fc273c02b3e25d7feffcbecf99cdc2b89fcc65a6c1b
SHA51225ce86162d8334f32efd27320f74b87ff89889329d0be36e2f1f6b50f264cb45445cd6ee3e6eeda9b598e837a71d8146dab08610a030d4e879f5d88381ac6e52
-
C:\Users\Admin\AppData\Local\Jai0png\WindowsActionDialog.exeFilesize
61KB
MD573c523b6556f2dc7eefc662338d66f8d
SHA11e6f9a1d885efa4d76f1e7a8be2e974f2b65cea5
SHA2560c6397bfbcd7b1fcefb6de01a506578e36651725a61078c69708f1f92c41ea31
SHA51269d0f23d1abaad657dd4672532936ef35f0e9d443caf9e19898017656a66ed46e75e7e05261c7e7636799c58feccd01dc93975d6a598cbb73242ddb48c6ec912
-
C:\Users\Admin\AppData\Local\Ye3ThZ\OLEACC.dllFilesize
882KB
MD519066abd07af5e74394efe405829afac
SHA1ac65c2eb6e135bb311fdeaa3e1d8198ddcc71aee
SHA2567c7b4978682ca8f67605e64ac53cc43ad36f2c49acc07867468f972a1cf86ed4
SHA5129ae1ea97b2f92e89baf4eb7b5867e3d0c6361bf62bea34c6bdc0303e21b68d21963a762c2642251de7f232a75a7958b9843b16ddeb44a1b10e1be8a957b767b4
-
C:\Users\Admin\AppData\Local\Ye3ThZ\OLEACC.dllFilesize
882KB
MD519066abd07af5e74394efe405829afac
SHA1ac65c2eb6e135bb311fdeaa3e1d8198ddcc71aee
SHA2567c7b4978682ca8f67605e64ac53cc43ad36f2c49acc07867468f972a1cf86ed4
SHA5129ae1ea97b2f92e89baf4eb7b5867e3d0c6361bf62bea34c6bdc0303e21b68d21963a762c2642251de7f232a75a7958b9843b16ddeb44a1b10e1be8a957b767b4
-
C:\Users\Admin\AppData\Local\Ye3ThZ\Utilman.exeFilesize
123KB
MD5a117edc0e74ab4770acf7f7e86e573f7
SHA15ceffb1a5e05e52aafcbc2d44e1e8445440706f3
SHA256b5bc4fce58403ea554691db678e6c8c448310fe59990990f0e37cd4357567d37
SHA51272883f794ff585fe7e86e818d4d8c54fa9781cab6c3fac6f6956f58a016a91f676e70d14691cbe054ae7b7469c6b4783152fbb694e92b940d9e3595fe3f41d97
-
memory/2256-144-0x0000000000000000-mapping.dmp
-
memory/2424-148-0x0000000000000000-mapping.dmp
-
memory/2772-152-0x0000000000000000-mapping.dmp
-
memory/3180-141-0x00007FF92069C000-0x00007FF92069D000-memory.dmpFilesize
4KB
-
memory/3180-138-0x0000000140000000-0x00000001400DF000-memory.dmpFilesize
892KB
-
memory/3180-133-0x0000000140000000-0x00000001400DF000-memory.dmpFilesize
892KB
-
memory/3180-143-0x00007FF9205B0000-0x00007FF9205C0000-memory.dmpFilesize
64KB
-
memory/3180-134-0x0000000140000000-0x00000001400DF000-memory.dmpFilesize
892KB
-
memory/3180-135-0x0000000140000000-0x00000001400DF000-memory.dmpFilesize
892KB
-
memory/3180-136-0x0000000140000000-0x00000001400DF000-memory.dmpFilesize
892KB
-
memory/3180-132-0x0000000140000000-0x00000001400DF000-memory.dmpFilesize
892KB
-
memory/3180-130-0x00000000014D0000-0x00000000014D1000-memory.dmpFilesize
4KB
-
memory/3180-142-0x00007FF92066C000-0x00007FF92066D000-memory.dmpFilesize
4KB
-
memory/3180-140-0x0000000140000000-0x00000001400DF000-memory.dmpFilesize
892KB
-
memory/3180-139-0x0000000140000000-0x00000001400DF000-memory.dmpFilesize
892KB
-
memory/3180-137-0x0000000140000000-0x00000001400DF000-memory.dmpFilesize
892KB
-
memory/3180-131-0x0000000140000000-0x00000001400DF000-memory.dmpFilesize
892KB