Analysis
-
max time kernel
150s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
17-04-2022 16:31
Static task
static1
Behavioral task
behavioral1
Sample
71ad14dfe6f748dcf5b72c9b6ce19ea03d33e5cd2a0cb649020b3e187d568eec.dll
Resource
win7-20220414-en
General
-
Target
71ad14dfe6f748dcf5b72c9b6ce19ea03d33e5cd2a0cb649020b3e187d568eec.dll
-
Size
881KB
-
MD5
46fe98c098555a5781788c232d294163
-
SHA1
f6c334c3afadb2110e4520b840fc799faa0f21f8
-
SHA256
71ad14dfe6f748dcf5b72c9b6ce19ea03d33e5cd2a0cb649020b3e187d568eec
-
SHA512
4e3e24275361bf43dd79ddc1a92170d0357f10f6d448cf8f76054fddbe9eb20fa289eb2b39c092af8fc94759fed757863723be0cb3cc12cec3e00424db315a99
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3172-130-0x0000000001360000-0x0000000001361000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
msconfig.exewscript.exemsdt.exepid process 1168 msconfig.exe 2744 wscript.exe 3332 msdt.exe -
Loads dropped DLL 3 IoCs
Processes:
msconfig.exewscript.exemsdt.exepid process 1168 msconfig.exe 2744 wscript.exe 3332 msdt.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Eqzhtortkjjc = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\QUICKL~1\\USERPI~1\\TaskBar\\JMsv\\wscript.exe" -
Processes:
msdt.exerundll32.exemsconfig.exewscript.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msdt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msconfig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wscript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1512 rundll32.exe 1512 rundll32.exe 1512 rundll32.exe 1512 rundll32.exe 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 3172 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3172 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3172 wrote to memory of 400 3172 msconfig.exe PID 3172 wrote to memory of 400 3172 msconfig.exe PID 3172 wrote to memory of 1168 3172 msconfig.exe PID 3172 wrote to memory of 1168 3172 msconfig.exe PID 3172 wrote to memory of 1996 3172 wscript.exe PID 3172 wrote to memory of 1996 3172 wscript.exe PID 3172 wrote to memory of 2744 3172 wscript.exe PID 3172 wrote to memory of 2744 3172 wscript.exe PID 3172 wrote to memory of 3464 3172 msdt.exe PID 3172 wrote to memory of 3464 3172 msdt.exe PID 3172 wrote to memory of 3332 3172 msdt.exe PID 3172 wrote to memory of 3332 3172 msdt.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\71ad14dfe6f748dcf5b72c9b6ce19ea03d33e5cd2a0cb649020b3e187d568eec.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\msconfig.exeC:\Windows\system32\msconfig.exe1⤵
-
C:\Users\Admin\AppData\Local\Ucb1\msconfig.exeC:\Users\Admin\AppData\Local\Ucb1\msconfig.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\wscript.exeC:\Windows\system32\wscript.exe1⤵
-
C:\Users\Admin\AppData\Local\HMTJ6Pq\wscript.exeC:\Users\Admin\AppData\Local\HMTJ6Pq\wscript.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\msdt.exeC:\Windows\system32\msdt.exe1⤵
-
C:\Users\Admin\AppData\Local\aXc\msdt.exeC:\Users\Admin\AppData\Local\aXc\msdt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\HMTJ6Pq\VERSION.dllFilesize
882KB
MD566cc3c6297b61791b0d4be566ace3830
SHA17acd9d657ec003d4cecb61628b630275acdd7996
SHA256967c0067dca764ee896a8c7858759161b595d3314bd2fc8090cdb1f07091e4d4
SHA5121e048ef90e730ce457a6e673c888046fc7847625baab06dca32fc9c9d7d2df23135bc68e3264d7b47111b05af356f7707222a73a4dba96472072b08f4dc96856
-
C:\Users\Admin\AppData\Local\HMTJ6Pq\VERSION.dllFilesize
882KB
MD566cc3c6297b61791b0d4be566ace3830
SHA17acd9d657ec003d4cecb61628b630275acdd7996
SHA256967c0067dca764ee896a8c7858759161b595d3314bd2fc8090cdb1f07091e4d4
SHA5121e048ef90e730ce457a6e673c888046fc7847625baab06dca32fc9c9d7d2df23135bc68e3264d7b47111b05af356f7707222a73a4dba96472072b08f4dc96856
-
C:\Users\Admin\AppData\Local\HMTJ6Pq\wscript.exeFilesize
166KB
MD5a47cbe969ea935bdd3ab568bb126bc80
SHA115f2facfd05daf46d2c63912916bf2887cebd98a
SHA25634008e2057df8842df210246995385a0441dc1e081d60ad15bd481e062e7f100
SHA512f5c81e6dc4d916944304fc85136e1ff6dee29a21e50a54fe6280a475343eccbfe094171d62475db5f38e07898c061126158c34d48b9d8f4f57f76d49e564e3fc
-
C:\Users\Admin\AppData\Local\Ucb1\VERSION.dllFilesize
882KB
MD512e6ea9e35e8a893e71150e7accfc89a
SHA13814475c9b910a549597b6c5616a9ce95c4dbb51
SHA256c11be90e23f036579ff74a2283749f111d439d5423c37b76f7f90104633e326e
SHA512f09806d4b3021f7556b75e3bca3a9df8a4b07d74417fb2d11184f341a5e3f9906bd6ecb39b5603e034ccf8fbd69c50c27ebf39bacc4d570403a9c7df66429ffb
-
C:\Users\Admin\AppData\Local\Ucb1\VERSION.dllFilesize
882KB
MD512e6ea9e35e8a893e71150e7accfc89a
SHA13814475c9b910a549597b6c5616a9ce95c4dbb51
SHA256c11be90e23f036579ff74a2283749f111d439d5423c37b76f7f90104633e326e
SHA512f09806d4b3021f7556b75e3bca3a9df8a4b07d74417fb2d11184f341a5e3f9906bd6ecb39b5603e034ccf8fbd69c50c27ebf39bacc4d570403a9c7df66429ffb
-
C:\Users\Admin\AppData\Local\Ucb1\msconfig.exeFilesize
193KB
MD539009536cafe30c6ef2501fe46c9df5e
SHA16ff7b4d30f31186de899665c704a105227704b72
SHA25693d2604f7fdf7f014ac5bef63ab177b6107f3cfc26da6cbd9a7ab50c96564a04
SHA51295c9a8bc61c79108634f5578825544323e3d980ae97a105a325c58bc0e44b1d500637459969602f08d6d23d346baec6acd07d8351803981000c797190d48f03a
-
C:\Users\Admin\AppData\Local\aXc\DUI70.dllFilesize
1.1MB
MD5779296fdbb2e1b0c3badac2e5f3a0342
SHA16589d90d519fe426175be4b501015e6ceefb877b
SHA256aceca50b46beb18f391847043749962784b021f16d015fb902bae99edc4f8ba4
SHA5127c1838afe81f4c82a72df20a1d6d160ec4ab75f83965322d9b4b5ab2964a17f54739a2a483f4b2896712623df863676a98a84cbef256fcb0a2eb165f34e52006
-
C:\Users\Admin\AppData\Local\aXc\DUI70.dllFilesize
1.1MB
MD5779296fdbb2e1b0c3badac2e5f3a0342
SHA16589d90d519fe426175be4b501015e6ceefb877b
SHA256aceca50b46beb18f391847043749962784b021f16d015fb902bae99edc4f8ba4
SHA5127c1838afe81f4c82a72df20a1d6d160ec4ab75f83965322d9b4b5ab2964a17f54739a2a483f4b2896712623df863676a98a84cbef256fcb0a2eb165f34e52006
-
C:\Users\Admin\AppData\Local\aXc\msdt.exeFilesize
421KB
MD5992c3f0cc8180f2f51156671e027ae75
SHA1942ec8c2ccfcacd75a1cd86cbe8873aee5115e29
SHA2566859d1b5d1beaa2985b298f3fcee67f0aac747687a9dec2b4376585e99e9756f
SHA5121f1b8d39e29274cfc87a9ef1510adb9c530086a421c121523376731c8933c6e234e9146310d3767ce888a8dce7a5713221f4d25e5b7b6398d06ae2be2b99eadf
-
memory/1168-144-0x0000000000000000-mapping.dmp
-
memory/2744-148-0x0000000000000000-mapping.dmp
-
memory/3172-138-0x0000000140000000-0x00000001400DF000-memory.dmpFilesize
892KB
-
memory/3172-137-0x0000000140000000-0x00000001400DF000-memory.dmpFilesize
892KB
-
memory/3172-143-0x00007FFC3B4F0000-0x00007FFC3B500000-memory.dmpFilesize
64KB
-
memory/3172-134-0x0000000140000000-0x00000001400DF000-memory.dmpFilesize
892KB
-
memory/3172-135-0x0000000140000000-0x00000001400DF000-memory.dmpFilesize
892KB
-
memory/3172-136-0x0000000140000000-0x00000001400DF000-memory.dmpFilesize
892KB
-
memory/3172-142-0x00007FFC3B5AC000-0x00007FFC3B5AD000-memory.dmpFilesize
4KB
-
memory/3172-133-0x0000000140000000-0x00000001400DF000-memory.dmpFilesize
892KB
-
memory/3172-130-0x0000000001360000-0x0000000001361000-memory.dmpFilesize
4KB
-
memory/3172-141-0x00007FFC3B5DC000-0x00007FFC3B5DD000-memory.dmpFilesize
4KB
-
memory/3172-139-0x0000000140000000-0x00000001400DF000-memory.dmpFilesize
892KB
-
memory/3172-132-0x0000000140000000-0x00000001400DF000-memory.dmpFilesize
892KB
-
memory/3172-140-0x0000000140000000-0x00000001400DF000-memory.dmpFilesize
892KB
-
memory/3172-131-0x0000000140000000-0x00000001400DF000-memory.dmpFilesize
892KB
-
memory/3332-152-0x0000000000000000-mapping.dmp