Analysis
-
max time kernel
149s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
17-04-2022 16:31
Static task
static1
Behavioral task
behavioral1
Sample
185136e00027380a18296643ebd7215ee9abe09c5226253b6cc37fe2faef2939.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
185136e00027380a18296643ebd7215ee9abe09c5226253b6cc37fe2faef2939.dll
Resource
win10v2004-20220414-en
General
-
Target
185136e00027380a18296643ebd7215ee9abe09c5226253b6cc37fe2faef2939.dll
-
Size
884KB
-
MD5
616512e689f5521ae81c623cdecc8a7d
-
SHA1
5b1dd3be9bf23f930ada499f2d3a3ee18c42dc38
-
SHA256
185136e00027380a18296643ebd7215ee9abe09c5226253b6cc37fe2faef2939
-
SHA512
91999c6fe02316568a1ac4a69ae08b72558d2ee7c9bc286b7d06e7204785e2f21b939588001dc9a71f0039455b16b6d433bab020b73ebc9f3af2fb228125ed94
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1384-54-0x0000000002170000-0x0000000002171000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
Dxpserver.exerdpclip.execonsent.exepid process 1916 Dxpserver.exe 544 rdpclip.exe 1716 consent.exe -
Loads dropped DLL 7 IoCs
Processes:
Dxpserver.exerdpclip.execonsent.exepid process 1384 1916 Dxpserver.exe 1384 544 rdpclip.exe 1384 1716 consent.exe 1384 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gcehmtlftxqmyqm = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Acrobat\\9.0\\dp\\rdpclip.exe" -
Processes:
rundll32.exeDxpserver.exerdpclip.execonsent.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dxpserver.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpclip.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA consent.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exeDxpserver.exerdpclip.exepid process 1120 rundll32.exe 1120 rundll32.exe 1120 rundll32.exe 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1916 Dxpserver.exe 1916 Dxpserver.exe 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 1384 544 rdpclip.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1384 wrote to memory of 844 1384 Dxpserver.exe PID 1384 wrote to memory of 844 1384 Dxpserver.exe PID 1384 wrote to memory of 844 1384 Dxpserver.exe PID 1384 wrote to memory of 1916 1384 Dxpserver.exe PID 1384 wrote to memory of 1916 1384 Dxpserver.exe PID 1384 wrote to memory of 1916 1384 Dxpserver.exe PID 1384 wrote to memory of 1824 1384 rdpclip.exe PID 1384 wrote to memory of 1824 1384 rdpclip.exe PID 1384 wrote to memory of 1824 1384 rdpclip.exe PID 1384 wrote to memory of 544 1384 rdpclip.exe PID 1384 wrote to memory of 544 1384 rdpclip.exe PID 1384 wrote to memory of 544 1384 rdpclip.exe PID 1384 wrote to memory of 1296 1384 consent.exe PID 1384 wrote to memory of 1296 1384 consent.exe PID 1384 wrote to memory of 1296 1384 consent.exe PID 1384 wrote to memory of 1716 1384 consent.exe PID 1384 wrote to memory of 1716 1384 consent.exe PID 1384 wrote to memory of 1716 1384 consent.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\185136e00027380a18296643ebd7215ee9abe09c5226253b6cc37fe2faef2939.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\Dxpserver.exeC:\Windows\system32\Dxpserver.exe1⤵
-
C:\Users\Admin\AppData\Local\vNL\Dxpserver.exeC:\Users\Admin\AppData\Local\vNL\Dxpserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\rdpclip.exeC:\Windows\system32\rdpclip.exe1⤵
-
C:\Users\Admin\AppData\Local\jnoMO\rdpclip.exeC:\Users\Admin\AppData\Local\jnoMO\rdpclip.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\consent.exeC:\Windows\system32\consent.exe1⤵
-
C:\Users\Admin\AppData\Local\iq8A\consent.exeC:\Users\Admin\AppData\Local\iq8A\consent.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\iq8A\WINMM.dllFilesize
889KB
MD51789974191e8b52faf8cae5192810aa4
SHA1e25e9650cb9e9f2cef7802e0d1c4b905803e61ef
SHA256891ecbad115091ed099ea1d382141b8d0c8889703b2424667ef0135981e979e1
SHA512de87ca2bca934a1a1deece43658d6152d16072320dce9db1f729f2f3e7c1ba18f313863107efa81177feceedc94fe8667919bc757cf07f7ecea918b989467e4e
-
C:\Users\Admin\AppData\Local\iq8A\consent.exeFilesize
109KB
MD50b5511674394666e9d221f8681b2c2e6
SHA16e4e720dfc424a12383f0b8194e4477e3bc346dc
SHA256ccad775decb5aec98118b381eeccc6d540928035cfb955abcb4ad3ded390b79b
SHA51200d28a00fd3ceaeae42ba6882ffb42aa4cc8b92b07a10f28df8e1931df4b806aebdcfab1976bf8d5ce0b98c64da19d4ee06a6315734fa5f885ecd1f6e1ff16a7
-
C:\Users\Admin\AppData\Local\jnoMO\WTSAPI32.dllFilesize
886KB
MD5671319ce5303d84eb585f253a0ad8500
SHA13a9539fbb05654d3fc9da000568dfa7d173d9023
SHA2565ea9b2c272543aa1e3867154ad5873ca29d2e3107aa2439fcfbff61887d22081
SHA5127b067427b74335a52364a99cd71e3c57d5a84b6fbfe9b79b85f1ff96f7e55c0b84317034a133c0044245e0f4694f50a14676e23e55c2bb0bd3f11eeda351d250
-
C:\Users\Admin\AppData\Local\jnoMO\rdpclip.exeFilesize
206KB
MD525d284eb2f12254c001afe9a82575a81
SHA1cf131801fdd5ec92278f9e0ae62050e31c6670a5
SHA256837e0d864c474956c0d9d4e7ae5f884007f19b7f420db9afcf0d266aefa6608b
SHA5127b4f208fa1681a0a139577ebc974e7acfc85e3c906a674e111223783460585eb989cb6b38f215d79f89e747a0e9224d90e1aa43e091d2042edb8bac7b27b968b
-
C:\Users\Admin\AppData\Local\vNL\Dxpserver.exeFilesize
259KB
MD54d38389fb92e43c77a524fd96dbafd21
SHA108014e52f6894cad4f1d1e6fc1a703732e9acd19
SHA256070bc95c486c15d2edc3548ba416dc9565ead401cb03a0472f719fb55ac94e73
SHA51202d8d130cff2b8de15139d309e1cd74a2148bb786fd749e5f22775d45e193b0f75adf40274375cabce33576480ff20456f25172d29a034cd134b8084d40a67ba
-
C:\Users\Admin\AppData\Local\vNL\dwmapi.dllFilesize
886KB
MD5e33ad60f7dfe749118d66244ce557c7e
SHA1f06214af720ae78b389c93991a5c16987dc0c817
SHA256410a374a4b3753f539db22c4cd7ae02f75c5e8c69f8876197eaf843df8ea12c2
SHA512413b73ed27b37389ca580fb69ab11fbe0a09402fac2160cdc2b58e46e90318c7c1f48f8e11d04300eccef1db48eb2219a1be0e909b6c65680ff585ab8a0a37db
-
\Users\Admin\AppData\Local\iq8A\WINMM.dllFilesize
889KB
MD51789974191e8b52faf8cae5192810aa4
SHA1e25e9650cb9e9f2cef7802e0d1c4b905803e61ef
SHA256891ecbad115091ed099ea1d382141b8d0c8889703b2424667ef0135981e979e1
SHA512de87ca2bca934a1a1deece43658d6152d16072320dce9db1f729f2f3e7c1ba18f313863107efa81177feceedc94fe8667919bc757cf07f7ecea918b989467e4e
-
\Users\Admin\AppData\Local\iq8A\consent.exeFilesize
109KB
MD50b5511674394666e9d221f8681b2c2e6
SHA16e4e720dfc424a12383f0b8194e4477e3bc346dc
SHA256ccad775decb5aec98118b381eeccc6d540928035cfb955abcb4ad3ded390b79b
SHA51200d28a00fd3ceaeae42ba6882ffb42aa4cc8b92b07a10f28df8e1931df4b806aebdcfab1976bf8d5ce0b98c64da19d4ee06a6315734fa5f885ecd1f6e1ff16a7
-
\Users\Admin\AppData\Local\jnoMO\WTSAPI32.dllFilesize
886KB
MD5671319ce5303d84eb585f253a0ad8500
SHA13a9539fbb05654d3fc9da000568dfa7d173d9023
SHA2565ea9b2c272543aa1e3867154ad5873ca29d2e3107aa2439fcfbff61887d22081
SHA5127b067427b74335a52364a99cd71e3c57d5a84b6fbfe9b79b85f1ff96f7e55c0b84317034a133c0044245e0f4694f50a14676e23e55c2bb0bd3f11eeda351d250
-
\Users\Admin\AppData\Local\jnoMO\rdpclip.exeFilesize
206KB
MD525d284eb2f12254c001afe9a82575a81
SHA1cf131801fdd5ec92278f9e0ae62050e31c6670a5
SHA256837e0d864c474956c0d9d4e7ae5f884007f19b7f420db9afcf0d266aefa6608b
SHA5127b4f208fa1681a0a139577ebc974e7acfc85e3c906a674e111223783460585eb989cb6b38f215d79f89e747a0e9224d90e1aa43e091d2042edb8bac7b27b968b
-
\Users\Admin\AppData\Local\vNL\Dxpserver.exeFilesize
259KB
MD54d38389fb92e43c77a524fd96dbafd21
SHA108014e52f6894cad4f1d1e6fc1a703732e9acd19
SHA256070bc95c486c15d2edc3548ba416dc9565ead401cb03a0472f719fb55ac94e73
SHA51202d8d130cff2b8de15139d309e1cd74a2148bb786fd749e5f22775d45e193b0f75adf40274375cabce33576480ff20456f25172d29a034cd134b8084d40a67ba
-
\Users\Admin\AppData\Local\vNL\dwmapi.dllFilesize
886KB
MD5e33ad60f7dfe749118d66244ce557c7e
SHA1f06214af720ae78b389c93991a5c16987dc0c817
SHA256410a374a4b3753f539db22c4cd7ae02f75c5e8c69f8876197eaf843df8ea12c2
SHA512413b73ed27b37389ca580fb69ab11fbe0a09402fac2160cdc2b58e46e90318c7c1f48f8e11d04300eccef1db48eb2219a1be0e909b6c65680ff585ab8a0a37db
-
\Users\Admin\AppData\Roaming\Adobe\Flash Player\AssetCache\8X1i\consent.exeFilesize
109KB
MD50b5511674394666e9d221f8681b2c2e6
SHA16e4e720dfc424a12383f0b8194e4477e3bc346dc
SHA256ccad775decb5aec98118b381eeccc6d540928035cfb955abcb4ad3ded390b79b
SHA51200d28a00fd3ceaeae42ba6882ffb42aa4cc8b92b07a10f28df8e1931df4b806aebdcfab1976bf8d5ce0b98c64da19d4ee06a6315734fa5f885ecd1f6e1ff16a7
-
memory/544-74-0x0000000000000000-mapping.dmp
-
memory/1384-58-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1384-59-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1384-66-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1384-54-0x0000000002170000-0x0000000002171000-memory.dmpFilesize
4KB
-
memory/1384-63-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1384-62-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1384-67-0x0000000077400000-0x0000000077402000-memory.dmpFilesize
8KB
-
memory/1384-61-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1384-60-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1384-64-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1384-57-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1384-55-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1384-65-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1384-56-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1716-79-0x0000000000000000-mapping.dmp
-
memory/1716-83-0x000007FEFBAA1000-0x000007FEFBAA3000-memory.dmpFilesize
8KB
-
memory/1916-69-0x0000000000000000-mapping.dmp