Analysis
-
max time kernel
171s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
17-04-2022 09:24
Static task
static1
Behavioral task
behavioral1
Sample
c1b3d542437bf99e35a80e4e3c76f96bbd606ff4ad3d776dac0b669349a21f46.dll
Resource
win7-20220414-en
General
-
Target
c1b3d542437bf99e35a80e4e3c76f96bbd606ff4ad3d776dac0b669349a21f46.dll
-
Size
879KB
-
MD5
345fe9bed1a1c1abe86be54d6e986731
-
SHA1
c45e7d3942fbd00268937c9d638c580565a1a2ec
-
SHA256
c1b3d542437bf99e35a80e4e3c76f96bbd606ff4ad3d776dac0b669349a21f46
-
SHA512
3c130b65cbeebc6dc9e724df377a75d3a0780cce19d32f085b6b8b4aac01d881f63bb5cdc2b696943bc7f18b6802289ee4fd12203126f732b15dfb260aca55e7
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1308-54-0x0000000002200000-0x0000000002201000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
Netplwiz.exeshrpubw.exemfpmp.exepid process 332 Netplwiz.exe 1224 shrpubw.exe 1548 mfpmp.exe -
Loads dropped DLL 7 IoCs
Processes:
Netplwiz.exeshrpubw.exemfpmp.exepid process 1308 332 Netplwiz.exe 1308 1224 shrpubw.exe 1308 1548 mfpmp.exe 1308 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\Evgmngveltmlhb = "C:\\Users\\Admin\\AppData\\Roaming\\Macromedia\\EqLyzJCZCL\\shrpubw.exe" -
Processes:
rundll32.exeNetplwiz.exeshrpubw.exemfpmp.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Netplwiz.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA shrpubw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mfpmp.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exeNetplwiz.exepid process 1636 rundll32.exe 1636 rundll32.exe 1636 rundll32.exe 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 1308 332 Netplwiz.exe 332 Netplwiz.exe 1308 1308 1308 1308 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1308 wrote to memory of 1796 1308 Netplwiz.exe PID 1308 wrote to memory of 1796 1308 Netplwiz.exe PID 1308 wrote to memory of 1796 1308 Netplwiz.exe PID 1308 wrote to memory of 332 1308 Netplwiz.exe PID 1308 wrote to memory of 332 1308 Netplwiz.exe PID 1308 wrote to memory of 332 1308 Netplwiz.exe PID 1308 wrote to memory of 544 1308 shrpubw.exe PID 1308 wrote to memory of 544 1308 shrpubw.exe PID 1308 wrote to memory of 544 1308 shrpubw.exe PID 1308 wrote to memory of 1224 1308 shrpubw.exe PID 1308 wrote to memory of 1224 1308 shrpubw.exe PID 1308 wrote to memory of 1224 1308 shrpubw.exe PID 1308 wrote to memory of 1572 1308 mfpmp.exe PID 1308 wrote to memory of 1572 1308 mfpmp.exe PID 1308 wrote to memory of 1572 1308 mfpmp.exe PID 1308 wrote to memory of 1548 1308 mfpmp.exe PID 1308 wrote to memory of 1548 1308 mfpmp.exe PID 1308 wrote to memory of 1548 1308 mfpmp.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c1b3d542437bf99e35a80e4e3c76f96bbd606ff4ad3d776dac0b669349a21f46.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\Netplwiz.exeC:\Windows\system32\Netplwiz.exe1⤵
-
C:\Users\Admin\AppData\Local\V95Sm\Netplwiz.exeC:\Users\Admin\AppData\Local\V95Sm\Netplwiz.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\shrpubw.exeC:\Windows\system32\shrpubw.exe1⤵
-
C:\Users\Admin\AppData\Local\kzZ\shrpubw.exeC:\Users\Admin\AppData\Local\kzZ\shrpubw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\mfpmp.exeC:\Windows\system32\mfpmp.exe1⤵
-
C:\Users\Admin\AppData\Local\O8Kmhnni\mfpmp.exeC:\Users\Admin\AppData\Local\O8Kmhnni\mfpmp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\O8Kmhnni\MFPlat.DLLFilesize
884KB
MD5fdd17e7eed4d1dea92c45d4236e2f87f
SHA14317b99ca117abf0a8c8fb7ff84a120d29166b32
SHA256fa3e1ce987f4a2b5fc19eab1a1c95ea5e9a58e39103b9ef34a72bf6a48a6849f
SHA512a2f07beb8c2793f3fb9f41b761c6e8b3460d1c2c079ac5e55fafd2d992c37a57730f3f4e587960dc4b64215cc2e470ef16889f5083bd2a48b71a5864cf04114c
-
C:\Users\Admin\AppData\Local\O8Kmhnni\mfpmp.exeFilesize
24KB
MD52d8600b94de72a9d771cbb56b9f9c331
SHA1a0e2ac409159546183aa45875497844c4adb5aac
SHA2567d8d8918761b8b6c95758375a6e7cf7fb8e43abfdd3846476219883ef3f8c185
SHA5123aaa6619f29434c294b9b197c3b86fdc5d88b0254c8f35f010c9b5f254fd47fbc3272412907e2a5a4f490bda2acfbbd7a90f968e25067abf921b934d2616eafc
-
C:\Users\Admin\AppData\Local\V95Sm\NETPLWIZ.dllFilesize
879KB
MD5026c693dd740dc06b16774a34cd12311
SHA1d00c04cc3a5b8a3fec20bed7a1c47dc28e26a45a
SHA25688fa678bd3c7b77240807fa29f33a630912733161b2271fcad66862071f4f448
SHA512a39232373a8e974a08afe76a98c6dda6200db5828b4ee9364d96bea1d2805c6bb6754e6428528a23fe0e3b54b8e3770ace07e16c7bbf9f2423dfe04c1577afa0
-
C:\Users\Admin\AppData\Local\V95Sm\Netplwiz.exeFilesize
26KB
MD5e43ec3c800d4c0716613392e81fba1d9
SHA137de6a235e978ecf3bb0fc2c864016c5b0134348
SHA256636606415a85a16a7e6c5c8fcbdf35494991bce1c37dfc19c75ecb7ce12dc65c
SHA512176c6d8b87bc5a9ca06698e2542ff34d474bcbbf21278390127981366eda89769bd9dd712f3b34f4dd8332a0b40ee0e609276400f16b51999471c8ff24522a08
-
C:\Users\Admin\AppData\Local\kzZ\ACLUI.dllFilesize
879KB
MD5720214b40e5f9b3f02ff9dab23b591ad
SHA1d54c03e59ed410076e8790033e5787fe734072e6
SHA2568cce79726e71084d9a6572130dda144d7d27c88c24855eb679800652b38740aa
SHA512edc4b1d5e53479660a180e78dc7532910efe7e2639422ee4f4e833d0dea9dd07eb57b9b310f14dadc0dd49688c136b755f5484ff35eee9556d53ad9e90d129bc
-
C:\Users\Admin\AppData\Local\kzZ\shrpubw.exeFilesize
398KB
MD529e6d0016611c8f948db5ea71372f76c
SHA101d007a01020370709cd6580717f9ace049647e8
SHA25653c868882ebc9e0d4f703afeccb172043069ccc0b5b6f7cac1d2aad9c4640930
SHA512300216ab47ee44b8f68d4835bf26641f949039522b680af00fb602f57d31c38812428dc624461bc2cc7d6384cad396bc033718e41e11a65f7dd0eeb36ed924e4
-
\Users\Admin\AppData\Local\O8Kmhnni\MFPlat.DLLFilesize
884KB
MD5fdd17e7eed4d1dea92c45d4236e2f87f
SHA14317b99ca117abf0a8c8fb7ff84a120d29166b32
SHA256fa3e1ce987f4a2b5fc19eab1a1c95ea5e9a58e39103b9ef34a72bf6a48a6849f
SHA512a2f07beb8c2793f3fb9f41b761c6e8b3460d1c2c079ac5e55fafd2d992c37a57730f3f4e587960dc4b64215cc2e470ef16889f5083bd2a48b71a5864cf04114c
-
\Users\Admin\AppData\Local\O8Kmhnni\mfpmp.exeFilesize
24KB
MD52d8600b94de72a9d771cbb56b9f9c331
SHA1a0e2ac409159546183aa45875497844c4adb5aac
SHA2567d8d8918761b8b6c95758375a6e7cf7fb8e43abfdd3846476219883ef3f8c185
SHA5123aaa6619f29434c294b9b197c3b86fdc5d88b0254c8f35f010c9b5f254fd47fbc3272412907e2a5a4f490bda2acfbbd7a90f968e25067abf921b934d2616eafc
-
\Users\Admin\AppData\Local\V95Sm\NETPLWIZ.dllFilesize
879KB
MD5026c693dd740dc06b16774a34cd12311
SHA1d00c04cc3a5b8a3fec20bed7a1c47dc28e26a45a
SHA25688fa678bd3c7b77240807fa29f33a630912733161b2271fcad66862071f4f448
SHA512a39232373a8e974a08afe76a98c6dda6200db5828b4ee9364d96bea1d2805c6bb6754e6428528a23fe0e3b54b8e3770ace07e16c7bbf9f2423dfe04c1577afa0
-
\Users\Admin\AppData\Local\V95Sm\Netplwiz.exeFilesize
26KB
MD5e43ec3c800d4c0716613392e81fba1d9
SHA137de6a235e978ecf3bb0fc2c864016c5b0134348
SHA256636606415a85a16a7e6c5c8fcbdf35494991bce1c37dfc19c75ecb7ce12dc65c
SHA512176c6d8b87bc5a9ca06698e2542ff34d474bcbbf21278390127981366eda89769bd9dd712f3b34f4dd8332a0b40ee0e609276400f16b51999471c8ff24522a08
-
\Users\Admin\AppData\Local\kzZ\ACLUI.dllFilesize
879KB
MD5720214b40e5f9b3f02ff9dab23b591ad
SHA1d54c03e59ed410076e8790033e5787fe734072e6
SHA2568cce79726e71084d9a6572130dda144d7d27c88c24855eb679800652b38740aa
SHA512edc4b1d5e53479660a180e78dc7532910efe7e2639422ee4f4e833d0dea9dd07eb57b9b310f14dadc0dd49688c136b755f5484ff35eee9556d53ad9e90d129bc
-
\Users\Admin\AppData\Local\kzZ\shrpubw.exeFilesize
398KB
MD529e6d0016611c8f948db5ea71372f76c
SHA101d007a01020370709cd6580717f9ace049647e8
SHA25653c868882ebc9e0d4f703afeccb172043069ccc0b5b6f7cac1d2aad9c4640930
SHA512300216ab47ee44b8f68d4835bf26641f949039522b680af00fb602f57d31c38812428dc624461bc2cc7d6384cad396bc033718e41e11a65f7dd0eeb36ed924e4
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\8W\mfpmp.exeFilesize
24KB
MD52d8600b94de72a9d771cbb56b9f9c331
SHA1a0e2ac409159546183aa45875497844c4adb5aac
SHA2567d8d8918761b8b6c95758375a6e7cf7fb8e43abfdd3846476219883ef3f8c185
SHA5123aaa6619f29434c294b9b197c3b86fdc5d88b0254c8f35f010c9b5f254fd47fbc3272412907e2a5a4f490bda2acfbbd7a90f968e25067abf921b934d2616eafc
-
memory/332-67-0x0000000000000000-mapping.dmp
-
memory/1224-74-0x000007FEFBD41000-0x000007FEFBD43000-memory.dmpFilesize
8KB
-
memory/1224-72-0x0000000000000000-mapping.dmp
-
memory/1308-65-0x00000000776A0000-0x00000000776A2000-memory.dmpFilesize
8KB
-
memory/1308-63-0x0000000140000000-0x00000001400DF000-memory.dmpFilesize
892KB
-
memory/1308-64-0x0000000140000000-0x00000001400DF000-memory.dmpFilesize
892KB
-
memory/1308-61-0x0000000140000000-0x00000001400DF000-memory.dmpFilesize
892KB
-
memory/1308-55-0x0000000140000000-0x00000001400DF000-memory.dmpFilesize
892KB
-
memory/1308-54-0x0000000002200000-0x0000000002201000-memory.dmpFilesize
4KB
-
memory/1308-57-0x0000000140000000-0x00000001400DF000-memory.dmpFilesize
892KB
-
memory/1308-58-0x0000000140000000-0x00000001400DF000-memory.dmpFilesize
892KB
-
memory/1308-62-0x0000000140000000-0x00000001400DF000-memory.dmpFilesize
892KB
-
memory/1308-56-0x0000000140000000-0x00000001400DF000-memory.dmpFilesize
892KB
-
memory/1308-59-0x0000000140000000-0x00000001400DF000-memory.dmpFilesize
892KB
-
memory/1308-60-0x0000000140000000-0x00000001400DF000-memory.dmpFilesize
892KB
-
memory/1548-78-0x0000000000000000-mapping.dmp