Analysis
-
max time kernel
150s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
17-04-2022 09:24
Static task
static1
Behavioral task
behavioral1
Sample
9dbfefd3aa7cbd264a254148e585440e404efe13db1bbc21cb462e17e85ce4b9.dll
Resource
win7-20220414-en
General
-
Target
9dbfefd3aa7cbd264a254148e585440e404efe13db1bbc21cb462e17e85ce4b9.dll
-
Size
1.1MB
-
MD5
6bd4364803953637e50005a3b7ffef39
-
SHA1
612d94d8505a4df8c1daf0b2577d63902fc48bc4
-
SHA256
9dbfefd3aa7cbd264a254148e585440e404efe13db1bbc21cb462e17e85ce4b9
-
SHA512
cc4965aa058138d81d0a034fa3b802ff830eff8475addb788116f792e1597a40fd1580a217384e1afec865f19ce1de669c5f175cd49c1a2cd095a94874334649
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1264-54-0x00000000026A0000-0x00000000026A1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
msdtc.exeSystemPropertiesHardware.exenotepad.exepid process 956 msdtc.exe 796 SystemPropertiesHardware.exe 1656 notepad.exe -
Loads dropped DLL 7 IoCs
Processes:
msdtc.exeSystemPropertiesHardware.exenotepad.exepid process 1264 956 msdtc.exe 1264 796 SystemPropertiesHardware.exe 1264 1656 notepad.exe 1264 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gcehmtlftxqmyqm = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Crypto\\RSA\\S-1-5-21-1083475884-596052423-1669053738-1000\\4t3J92\\SystemPropertiesHardware.exe" -
Processes:
rundll32.exemsdtc.exeSystemPropertiesHardware.exenotepad.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msdtc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesHardware.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA notepad.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exemsdtc.exepid process 1764 rundll32.exe 1764 rundll32.exe 1764 rundll32.exe 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 956 msdtc.exe 956 msdtc.exe 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 1264 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1264 wrote to memory of 1844 1264 msdtc.exe PID 1264 wrote to memory of 1844 1264 msdtc.exe PID 1264 wrote to memory of 1844 1264 msdtc.exe PID 1264 wrote to memory of 956 1264 msdtc.exe PID 1264 wrote to memory of 956 1264 msdtc.exe PID 1264 wrote to memory of 956 1264 msdtc.exe PID 1264 wrote to memory of 1704 1264 SystemPropertiesHardware.exe PID 1264 wrote to memory of 1704 1264 SystemPropertiesHardware.exe PID 1264 wrote to memory of 1704 1264 SystemPropertiesHardware.exe PID 1264 wrote to memory of 796 1264 SystemPropertiesHardware.exe PID 1264 wrote to memory of 796 1264 SystemPropertiesHardware.exe PID 1264 wrote to memory of 796 1264 SystemPropertiesHardware.exe PID 1264 wrote to memory of 532 1264 notepad.exe PID 1264 wrote to memory of 532 1264 notepad.exe PID 1264 wrote to memory of 532 1264 notepad.exe PID 1264 wrote to memory of 1656 1264 notepad.exe PID 1264 wrote to memory of 1656 1264 notepad.exe PID 1264 wrote to memory of 1656 1264 notepad.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9dbfefd3aa7cbd264a254148e585440e404efe13db1bbc21cb462e17e85ce4b9.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\msdtc.exeC:\Windows\system32\msdtc.exe1⤵
-
C:\Users\Admin\AppData\Local\G0r2Flb\msdtc.exeC:\Users\Admin\AppData\Local\G0r2Flb\msdtc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\SystemPropertiesHardware.exeC:\Windows\system32\SystemPropertiesHardware.exe1⤵
-
C:\Users\Admin\AppData\Local\y0Awm\SystemPropertiesHardware.exeC:\Users\Admin\AppData\Local\y0Awm\SystemPropertiesHardware.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\notepad.exeC:\Windows\system32\notepad.exe1⤵
-
C:\Users\Admin\AppData\Local\ZLqi\notepad.exeC:\Users\Admin\AppData\Local\ZLqi\notepad.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\G0r2Flb\VERSION.dllFilesize
1.1MB
MD563184a8099d2cd126ff9fc875725608f
SHA178d4bb98e12f5f254d3ecfce2af37121b73a1c7d
SHA25607895a6345c948e253b8c97d6bedd124e16670519f0d599fbda4605fd5491f5d
SHA512390ca02a0cdf6d9d82d5442c3a6b85a42f1f81da979b0c38dda9e064504b4dddb9495dc4fd7196b506be6a76e2915600d0f8302f64721481a2cb28d80bcd65af
-
C:\Users\Admin\AppData\Local\G0r2Flb\msdtc.exeFilesize
138KB
MD5de0ece52236cfa3ed2dbfc03f28253a8
SHA184bbd2495c1809fcd19b535d41114e4fb101466c
SHA2562fbbec4cacb5161f68d7c2935852a5888945ca0f107cf8a1c01f4528ce407de3
SHA51269386134667626c60c99d941c8ab52f8e5235e3897b5af76965572287afd5dcd42b8207a520587844a57a268e4decb3f3c550e5b7a06230ee677dc5e40c50bb3
-
C:\Users\Admin\AppData\Local\ZLqi\VERSION.dllFilesize
1.1MB
MD581951cd436531a5a0609d31c26868a83
SHA1a65bc42d9050ea4ed6a7714d5c80e53129008cb2
SHA256dce899bf17d3151c9b0fdf6b90bb14062bc64ca0fd6012a07adc56cff2361359
SHA512153f8a46b021037faa55135c5d36c1159a34e3ef20f9e9123b0513596fa92a292151fb2370a2322a084547c6f5857670bfb1dc3d8a3e71611e726f543d61f3da
-
C:\Users\Admin\AppData\Local\ZLqi\notepad.exeFilesize
189KB
MD5f2c7bb8acc97f92e987a2d4087d021b1
SHA17eb0139d2175739b3ccb0d1110067820be6abd29
SHA256142e1d688ef0568370c37187fd9f2351d7ddeda574f8bfa9b0fa4ef42db85aa2
SHA5122f37a2e503cffbd7c05c7d8a125b55368ce11aad5b62f17aaac7aaf3391a6886fa6a0fd73223e9f30072419bf5762a8af7958e805a52d788ba41f61eb084bfe8
-
C:\Users\Admin\AppData\Local\y0Awm\SYSDM.CPLFilesize
1.1MB
MD5071d2f88e3c04a04d35a2d1053271a85
SHA1dc8dccc8ab1e1c9718f0f9dda522b1d8c2446524
SHA256b7550a84b2051ff1727fb2404612a9a6acb7771bed6318bd259c93c708dcbf04
SHA512768b97f758e288acb48b59cb9b7a6de55e0afc4dad031ea83be951383b817c8e9ffb90a77d1a52a32784610419e430e6e2ff0ad0279beafb8a2e091098800d88
-
C:\Users\Admin\AppData\Local\y0Awm\SystemPropertiesHardware.exeFilesize
80KB
MD5c63d722641c417764247f683f9fb43be
SHA1948ec61ebf241c4d80efca3efdfc33fe746e3b98
SHA2564759296b421d60c80db0bb112a30425e04883900374602e13ed97f7c03a49df2
SHA5127223d1c81a4785ed790ec2303d5d9d7ebcae9404d7bf173b3145e51202564de9977e94ac10ab80c6fe49b5f697af3ec70dfd922a891915e8951b5a1b5841c8be
-
\Users\Admin\AppData\Local\G0r2Flb\VERSION.dllFilesize
1.1MB
MD563184a8099d2cd126ff9fc875725608f
SHA178d4bb98e12f5f254d3ecfce2af37121b73a1c7d
SHA25607895a6345c948e253b8c97d6bedd124e16670519f0d599fbda4605fd5491f5d
SHA512390ca02a0cdf6d9d82d5442c3a6b85a42f1f81da979b0c38dda9e064504b4dddb9495dc4fd7196b506be6a76e2915600d0f8302f64721481a2cb28d80bcd65af
-
\Users\Admin\AppData\Local\G0r2Flb\msdtc.exeFilesize
138KB
MD5de0ece52236cfa3ed2dbfc03f28253a8
SHA184bbd2495c1809fcd19b535d41114e4fb101466c
SHA2562fbbec4cacb5161f68d7c2935852a5888945ca0f107cf8a1c01f4528ce407de3
SHA51269386134667626c60c99d941c8ab52f8e5235e3897b5af76965572287afd5dcd42b8207a520587844a57a268e4decb3f3c550e5b7a06230ee677dc5e40c50bb3
-
\Users\Admin\AppData\Local\ZLqi\VERSION.dllFilesize
1.1MB
MD581951cd436531a5a0609d31c26868a83
SHA1a65bc42d9050ea4ed6a7714d5c80e53129008cb2
SHA256dce899bf17d3151c9b0fdf6b90bb14062bc64ca0fd6012a07adc56cff2361359
SHA512153f8a46b021037faa55135c5d36c1159a34e3ef20f9e9123b0513596fa92a292151fb2370a2322a084547c6f5857670bfb1dc3d8a3e71611e726f543d61f3da
-
\Users\Admin\AppData\Local\ZLqi\notepad.exeFilesize
189KB
MD5f2c7bb8acc97f92e987a2d4087d021b1
SHA17eb0139d2175739b3ccb0d1110067820be6abd29
SHA256142e1d688ef0568370c37187fd9f2351d7ddeda574f8bfa9b0fa4ef42db85aa2
SHA5122f37a2e503cffbd7c05c7d8a125b55368ce11aad5b62f17aaac7aaf3391a6886fa6a0fd73223e9f30072419bf5762a8af7958e805a52d788ba41f61eb084bfe8
-
\Users\Admin\AppData\Local\y0Awm\SYSDM.CPLFilesize
1.1MB
MD5071d2f88e3c04a04d35a2d1053271a85
SHA1dc8dccc8ab1e1c9718f0f9dda522b1d8c2446524
SHA256b7550a84b2051ff1727fb2404612a9a6acb7771bed6318bd259c93c708dcbf04
SHA512768b97f758e288acb48b59cb9b7a6de55e0afc4dad031ea83be951383b817c8e9ffb90a77d1a52a32784610419e430e6e2ff0ad0279beafb8a2e091098800d88
-
\Users\Admin\AppData\Local\y0Awm\SystemPropertiesHardware.exeFilesize
80KB
MD5c63d722641c417764247f683f9fb43be
SHA1948ec61ebf241c4d80efca3efdfc33fe746e3b98
SHA2564759296b421d60c80db0bb112a30425e04883900374602e13ed97f7c03a49df2
SHA5127223d1c81a4785ed790ec2303d5d9d7ebcae9404d7bf173b3145e51202564de9977e94ac10ab80c6fe49b5f697af3ec70dfd922a891915e8951b5a1b5841c8be
-
\Users\Admin\AppData\Roaming\Microsoft\Protect\S-1-5-21-1083475884-596052423-1669053738-1000\YCTp5u\notepad.exeFilesize
189KB
MD5f2c7bb8acc97f92e987a2d4087d021b1
SHA17eb0139d2175739b3ccb0d1110067820be6abd29
SHA256142e1d688ef0568370c37187fd9f2351d7ddeda574f8bfa9b0fa4ef42db85aa2
SHA5122f37a2e503cffbd7c05c7d8a125b55368ce11aad5b62f17aaac7aaf3391a6886fa6a0fd73223e9f30072419bf5762a8af7958e805a52d788ba41f61eb084bfe8
-
memory/796-74-0x0000000000000000-mapping.dmp
-
memory/956-69-0x0000000000000000-mapping.dmp
-
memory/1264-67-0x0000000077030000-0x0000000077032000-memory.dmpFilesize
8KB
-
memory/1264-63-0x0000000140000000-0x0000000140126000-memory.dmpFilesize
1.1MB
-
memory/1264-64-0x0000000140000000-0x0000000140126000-memory.dmpFilesize
1.1MB
-
memory/1264-65-0x0000000140000000-0x0000000140126000-memory.dmpFilesize
1.1MB
-
memory/1264-54-0x00000000026A0000-0x00000000026A1000-memory.dmpFilesize
4KB
-
memory/1264-61-0x0000000140000000-0x0000000140126000-memory.dmpFilesize
1.1MB
-
memory/1264-66-0x0000000140000000-0x0000000140126000-memory.dmpFilesize
1.1MB
-
memory/1264-62-0x0000000140000000-0x0000000140126000-memory.dmpFilesize
1.1MB
-
memory/1264-55-0x0000000140000000-0x0000000140126000-memory.dmpFilesize
1.1MB
-
memory/1264-58-0x0000000140000000-0x0000000140126000-memory.dmpFilesize
1.1MB
-
memory/1264-60-0x0000000140000000-0x0000000140126000-memory.dmpFilesize
1.1MB
-
memory/1264-57-0x0000000140000000-0x0000000140126000-memory.dmpFilesize
1.1MB
-
memory/1264-59-0x0000000140000000-0x0000000140126000-memory.dmpFilesize
1.1MB
-
memory/1264-56-0x0000000140000000-0x0000000140126000-memory.dmpFilesize
1.1MB
-
memory/1656-81-0x000007FEFB6D1000-0x000007FEFB6D3000-memory.dmpFilesize
8KB
-
memory/1656-79-0x0000000000000000-mapping.dmp