Analysis
-
max time kernel
156s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
17-04-2022 16:34
Static task
static1
Behavioral task
behavioral1
Sample
9896a4f7a5d74708af6fdfc7bde7995dd9242b6c18a6239943c963ed60eeb7b8.dll
Resource
win7-20220414-en
General
-
Target
9896a4f7a5d74708af6fdfc7bde7995dd9242b6c18a6239943c963ed60eeb7b8.dll
-
Size
998KB
-
MD5
c6b8a03ce5ec402adf6a7e40d960b306
-
SHA1
bdbb9fbe24914344c69086ceeaed355c7715bdfd
-
SHA256
9896a4f7a5d74708af6fdfc7bde7995dd9242b6c18a6239943c963ed60eeb7b8
-
SHA512
3bb10b255f3ecc49fcd5cf743857af83b638c923c02c6814649cf3f64c310baa577430c278aac370765fe87bcf497a35141c7fc408c9906c3cba837def16e39f
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2148-135-0x00000000009E0000-0x00000000009E1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 5 IoCs
Processes:
upfc.exewermgr.exeDWWIN.EXEie4uinit.exedialer.exepid process 1596 upfc.exe 4884 wermgr.exe 1112 DWWIN.EXE 1100 ie4uinit.exe 2540 dialer.exe -
Loads dropped DLL 6 IoCs
Processes:
upfc.exeDWWIN.EXEie4uinit.exedialer.exepid process 1596 upfc.exe 1112 DWWIN.EXE 1100 ie4uinit.exe 1100 ie4uinit.exe 1100 ie4uinit.exe 2540 dialer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wurgjldbctt = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Crypto\\RSA\\lPZCcxCo\\DWWIN.EXE" -
Processes:
rundll32.exeupfc.exeDWWIN.EXEdialer.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA upfc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DWWIN.EXE Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dialer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 5056 rundll32.exe 5056 rundll32.exe 5056 rundll32.exe 5056 rundll32.exe 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 2148 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2148 -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
description pid process target process PID 2148 wrote to memory of 4428 2148 upfc.exe PID 2148 wrote to memory of 4428 2148 upfc.exe PID 2148 wrote to memory of 1596 2148 upfc.exe PID 2148 wrote to memory of 1596 2148 upfc.exe PID 2148 wrote to memory of 4312 2148 wermgr.exe PID 2148 wrote to memory of 4312 2148 wermgr.exe PID 2148 wrote to memory of 4884 2148 wermgr.exe PID 2148 wrote to memory of 4884 2148 wermgr.exe PID 2148 wrote to memory of 636 2148 DWWIN.EXE PID 2148 wrote to memory of 636 2148 DWWIN.EXE PID 2148 wrote to memory of 1112 2148 DWWIN.EXE PID 2148 wrote to memory of 1112 2148 DWWIN.EXE PID 2148 wrote to memory of 3736 2148 ie4uinit.exe PID 2148 wrote to memory of 3736 2148 ie4uinit.exe PID 2148 wrote to memory of 1100 2148 ie4uinit.exe PID 2148 wrote to memory of 1100 2148 ie4uinit.exe PID 2148 wrote to memory of 3060 2148 dialer.exe PID 2148 wrote to memory of 3060 2148 dialer.exe PID 2148 wrote to memory of 2540 2148 dialer.exe PID 2148 wrote to memory of 2540 2148 dialer.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\9896a4f7a5d74708af6fdfc7bde7995dd9242b6c18a6239943c963ed60eeb7b8.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\upfc.exeC:\Windows\system32\upfc.exe1⤵
-
C:\Users\Admin\AppData\Local\CuCF\upfc.exeC:\Users\Admin\AppData\Local\CuCF\upfc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe1⤵
-
C:\Users\Admin\AppData\Local\Pj18\wermgr.exeC:\Users\Admin\AppData\Local\Pj18\wermgr.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\DWWIN.EXEC:\Windows\system32\DWWIN.EXE1⤵
-
C:\Users\Admin\AppData\Local\sgbCOcVwy\DWWIN.EXEC:\Users\Admin\AppData\Local\sgbCOcVwy\DWWIN.EXE1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\ie4uinit.exeC:\Windows\system32\ie4uinit.exe1⤵
-
C:\Users\Admin\AppData\Local\ctaV2JXc\ie4uinit.exeC:\Users\Admin\AppData\Local\ctaV2JXc\ie4uinit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\system32\dialer.exeC:\Windows\system32\dialer.exe1⤵
-
C:\Users\Admin\AppData\Local\vKJIc\dialer.exeC:\Users\Admin\AppData\Local\vKJIc\dialer.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\CuCF\XmlLite.dllFilesize
999KB
MD5a1ef0185e5d052b0b5a56debb5d6ac7b
SHA15802685a92533cdf2de06171ad67b0e620d97059
SHA256d8343f6ec96986298f9425de886c8ce815b09037da18ff990e31ca543782ef28
SHA51258b33a4896b84d72ee6e76cca0cb2f050d2621dada688ea2ba42770ea7bc3d8c354967e6b6a95b3187289cea91d629064f22eb08d743186ae64bc0fecb12f421
-
C:\Users\Admin\AppData\Local\CuCF\XmlLite.dllFilesize
999KB
MD5a1ef0185e5d052b0b5a56debb5d6ac7b
SHA15802685a92533cdf2de06171ad67b0e620d97059
SHA256d8343f6ec96986298f9425de886c8ce815b09037da18ff990e31ca543782ef28
SHA51258b33a4896b84d72ee6e76cca0cb2f050d2621dada688ea2ba42770ea7bc3d8c354967e6b6a95b3187289cea91d629064f22eb08d743186ae64bc0fecb12f421
-
C:\Users\Admin\AppData\Local\CuCF\upfc.exeFilesize
118KB
MD5299ea296575ccb9d2c1a779062535d5c
SHA12497169c13b0ba46a6be8a1fe493b250094079b7
SHA256ee44fe14df89c4e5eaf8398f8fb4823fd910c5a94d913653d6b9e831254f6cc2
SHA51202fc2b25167ebd7dfcc7b8aa74613e7004fdf33dfccccba6c3427434cca981c2eb50f4a801969b3a40c495a9bb0eac8176f4f2ec9091916cf3509a7f909b30fa
-
C:\Users\Admin\AppData\Local\Pj18\wermgr.exeFilesize
223KB
MD5f7991343cf02ed92cb59f394e8b89f1f
SHA1573ad9af63a6a0ab9b209ece518fd582b54cfef5
SHA2561c09759dcd31fdc81bcd6685438d7efb34e0229f1096bfd57d41ecfe614d07dc
SHA512fa3cf314100f5340c7d0f6a70632a308fcadb4b48785753310a053a510169979a89637b8b4fedf4d3690db6b8b55146e323cad70d704c4e2ede4edff5284237d
-
C:\Users\Admin\AppData\Local\ctaV2JXc\VERSION.dllFilesize
1000KB
MD518dd9edf4356e25d2651e01f793cc4d5
SHA169476823a59c57e8e5e5f0ab88ebd4537a1c42a0
SHA256868e74b04b0d0f6ae0516e00ddc58e441906e0282f29bdc87f1411dcf9012c2f
SHA5127edd1ab87ab79fc0c0d2a917c4fc473397a40d85dc4ef99e08b19b90f7e6a7359fa1f11ff189827ce91dd35ec82fb9d25feadaabb0638230f325b67057382365
-
C:\Users\Admin\AppData\Local\ctaV2JXc\VERSION.dllFilesize
1000KB
MD518dd9edf4356e25d2651e01f793cc4d5
SHA169476823a59c57e8e5e5f0ab88ebd4537a1c42a0
SHA256868e74b04b0d0f6ae0516e00ddc58e441906e0282f29bdc87f1411dcf9012c2f
SHA5127edd1ab87ab79fc0c0d2a917c4fc473397a40d85dc4ef99e08b19b90f7e6a7359fa1f11ff189827ce91dd35ec82fb9d25feadaabb0638230f325b67057382365
-
C:\Users\Admin\AppData\Local\ctaV2JXc\VERSION.dllFilesize
1000KB
MD518dd9edf4356e25d2651e01f793cc4d5
SHA169476823a59c57e8e5e5f0ab88ebd4537a1c42a0
SHA256868e74b04b0d0f6ae0516e00ddc58e441906e0282f29bdc87f1411dcf9012c2f
SHA5127edd1ab87ab79fc0c0d2a917c4fc473397a40d85dc4ef99e08b19b90f7e6a7359fa1f11ff189827ce91dd35ec82fb9d25feadaabb0638230f325b67057382365
-
C:\Users\Admin\AppData\Local\ctaV2JXc\VERSION.dllFilesize
1000KB
MD518dd9edf4356e25d2651e01f793cc4d5
SHA169476823a59c57e8e5e5f0ab88ebd4537a1c42a0
SHA256868e74b04b0d0f6ae0516e00ddc58e441906e0282f29bdc87f1411dcf9012c2f
SHA5127edd1ab87ab79fc0c0d2a917c4fc473397a40d85dc4ef99e08b19b90f7e6a7359fa1f11ff189827ce91dd35ec82fb9d25feadaabb0638230f325b67057382365
-
C:\Users\Admin\AppData\Local\ctaV2JXc\ie4uinit.exeFilesize
262KB
MD5a2f0104edd80ca2c24c24356d5eacc4f
SHA18269b9fd9231f04ed47419bd565c69dc677fab56
SHA2565d85c4d62cc26996826b9d96a9153f7e05a2260342bd913b3730610a1809203c
SHA512e7bb87f9f6c82cb945b95f62695be98b3fa827a24fa8c4187fe836d4e7d3e7ae3b95101edd3c41d65f6cb684910f5954a67307d450072acd8d475212db094390
-
C:\Users\Admin\AppData\Local\sgbCOcVwy\DWWIN.EXEFilesize
229KB
MD5444cc4d3422a0fdd45c1b78070026c60
SHA197162ff341fff1ec54b827ec02f8b86fd2d41a97
SHA2564b3f620272e709ce3e01ae5b19ef0300bd476f2da6412637f703bbaded2821f0
SHA51221742d330a6a5763ea41a8fed4d71b98e4a1b4c685675c4cfeb7253033c3a208c23902caf0efdf470a85e0770cb8fac8af0eb6d3a8511445b0570054b42d5553
-
C:\Users\Admin\AppData\Local\sgbCOcVwy\VERSION.dllFilesize
1000KB
MD506fe002f2572b59965997e79584abcfe
SHA181ea99ec51ba103c6d6e2f753aaf10c4ecab1882
SHA25691e3568df69af2bd6a2707350d82f6f210a6c65da0231d179324d7d1811821dd
SHA5120d120bb9e9061692ed503faa6adc9552f9b235884ec772da7aa3bb3b6b3cc1070f473cf784ed2b0e55b4c04f5fa39b4e734a62f73bff17117156acd654a97feb
-
C:\Users\Admin\AppData\Local\sgbCOcVwy\VERSION.dllFilesize
1000KB
MD506fe002f2572b59965997e79584abcfe
SHA181ea99ec51ba103c6d6e2f753aaf10c4ecab1882
SHA25691e3568df69af2bd6a2707350d82f6f210a6c65da0231d179324d7d1811821dd
SHA5120d120bb9e9061692ed503faa6adc9552f9b235884ec772da7aa3bb3b6b3cc1070f473cf784ed2b0e55b4c04f5fa39b4e734a62f73bff17117156acd654a97feb
-
C:\Users\Admin\AppData\Local\vKJIc\TAPI32.dllFilesize
1007KB
MD5cf5e3ee027cdc037e2a5f96efe394c02
SHA1f3cc127339da83f8f01d50e7a84a5066b45d195f
SHA256fdce0b84e2af34afaeb13d70e115431ef7463602ea0adffb5488a4391e74c1d1
SHA512c6e43b51be0dc33abeea89961e743d77d58fc6e65276abf4810fcda79abc1ad679d5bc29a84d3fe5b0f5d5f54219aece16000191f1e50777cd482b0c52760cec
-
C:\Users\Admin\AppData\Local\vKJIc\TAPI32.dllFilesize
1007KB
MD5cf5e3ee027cdc037e2a5f96efe394c02
SHA1f3cc127339da83f8f01d50e7a84a5066b45d195f
SHA256fdce0b84e2af34afaeb13d70e115431ef7463602ea0adffb5488a4391e74c1d1
SHA512c6e43b51be0dc33abeea89961e743d77d58fc6e65276abf4810fcda79abc1ad679d5bc29a84d3fe5b0f5d5f54219aece16000191f1e50777cd482b0c52760cec
-
C:\Users\Admin\AppData\Local\vKJIc\dialer.exeFilesize
39KB
MD5b2626bdcf079c6516fc016ac5646df93
SHA1838268205bd97d62a31094d53643c356ea7848a6
SHA256e3ac5e6196f3a98c1946d85c653866c318bb2a86dd865deffa7b52f665d699bb
SHA512615cfe1f91b895513c687906bf3439ca352afcadd3b73f950af0a3b5fb1b358168a7a25a6796407b212fde5f803dd880bcdc350d8bac7e7594090d37ce259971
-
memory/1100-179-0x0000000000000000-mapping.dmp
-
memory/1112-178-0x000001FCBF470000-0x000001FCBF477000-memory.dmpFilesize
28KB
-
memory/1112-170-0x0000000000000000-mapping.dmp
-
memory/1596-163-0x0000000140000000-0x0000000140102000-memory.dmpFilesize
1.0MB
-
memory/1596-159-0x0000000000000000-mapping.dmp
-
memory/1596-167-0x000001D4448C0000-0x000001D4448C7000-memory.dmpFilesize
28KB
-
memory/2148-144-0x0000000140000000-0x0000000140101000-memory.dmpFilesize
1.0MB
-
memory/2148-142-0x0000000140000000-0x0000000140101000-memory.dmpFilesize
1.0MB
-
memory/2148-156-0x00007FFAD951C000-0x00007FFAD951D000-memory.dmpFilesize
4KB
-
memory/2148-146-0x0000000140000000-0x0000000140101000-memory.dmpFilesize
1.0MB
-
memory/2148-135-0x00000000009E0000-0x00000000009E1000-memory.dmpFilesize
4KB
-
memory/2148-136-0x0000000140000000-0x0000000140101000-memory.dmpFilesize
1.0MB
-
memory/2148-145-0x0000000140000000-0x0000000140101000-memory.dmpFilesize
1.0MB
-
memory/2148-155-0x00000000009B0000-0x00000000009B7000-memory.dmpFilesize
28KB
-
memory/2148-158-0x00007FFAD9430000-0x00007FFAD9440000-memory.dmpFilesize
64KB
-
memory/2148-137-0x0000000140000000-0x0000000140101000-memory.dmpFilesize
1.0MB
-
memory/2148-143-0x0000000140000000-0x0000000140101000-memory.dmpFilesize
1.0MB
-
memory/2148-157-0x00007FFAD94EC000-0x00007FFAD94ED000-memory.dmpFilesize
4KB
-
memory/2148-141-0x0000000140000000-0x0000000140101000-memory.dmpFilesize
1.0MB
-
memory/2148-140-0x0000000140000000-0x0000000140101000-memory.dmpFilesize
1.0MB
-
memory/2148-139-0x0000000140000000-0x0000000140101000-memory.dmpFilesize
1.0MB
-
memory/2148-138-0x0000000140000000-0x0000000140101000-memory.dmpFilesize
1.0MB
-
memory/2540-185-0x0000000000000000-mapping.dmp
-
memory/2540-189-0x0000000140000000-0x0000000140103000-memory.dmpFilesize
1.0MB
-
memory/2540-193-0x0000028417540000-0x0000028417547000-memory.dmpFilesize
28KB
-
memory/4884-168-0x0000000000000000-mapping.dmp
-
memory/5056-130-0x0000000140000000-0x0000000140101000-memory.dmpFilesize
1.0MB
-
memory/5056-134-0x000001C0124D0000-0x000001C0124D7000-memory.dmpFilesize
28KB