Analysis
-
max time kernel
153s -
max time network
92s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
17-04-2022 16:34
Static task
static1
Behavioral task
behavioral1
Sample
668f015f2009a05024a99c756f684e3f1056c9b5a49e241379934daa27f031ed.dll
Resource
win7-20220414-en
General
-
Target
668f015f2009a05024a99c756f684e3f1056c9b5a49e241379934daa27f031ed.dll
-
Size
1003KB
-
MD5
218d477824d47647d4b594fba6c72d16
-
SHA1
e1321bb45459d5a414d8816eb354a55ac4dd7610
-
SHA256
668f015f2009a05024a99c756f684e3f1056c9b5a49e241379934daa27f031ed
-
SHA512
96674362aff08b3de475809fddf3a918d23da6ed34202975e6c268b417bacd98c097fe9455aa45443296f20e1ca16095bf47a8d36e90d53eb48fb427dfe30503
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3276-135-0x00000000011B0000-0x00000000011B1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
InfDefaultInstall.exeDeviceEnroller.exeGamePanel.exepid process 2656 InfDefaultInstall.exe 3700 DeviceEnroller.exe 4324 GamePanel.exe -
Loads dropped DLL 4 IoCs
Processes:
InfDefaultInstall.exeDeviceEnroller.exeGamePanel.exepid process 2656 InfDefaultInstall.exe 3700 DeviceEnroller.exe 4324 GamePanel.exe 4324 GamePanel.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Eqzhtortkjjc = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Crypto\\RSA\\S-1-5-21-3751123196-3323558407-1869646069-1000\\W8D3PNop\\DeviceEnroller.exe" -
Processes:
rundll32.exeInfDefaultInstall.exeDeviceEnroller.exeGamePanel.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA InfDefaultInstall.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DeviceEnroller.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA GamePanel.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 568 rundll32.exe 568 rundll32.exe 568 rundll32.exe 568 rundll32.exe 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 3276 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3276 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3276 wrote to memory of 1616 3276 InfDefaultInstall.exe PID 3276 wrote to memory of 1616 3276 InfDefaultInstall.exe PID 3276 wrote to memory of 2656 3276 InfDefaultInstall.exe PID 3276 wrote to memory of 2656 3276 InfDefaultInstall.exe PID 3276 wrote to memory of 5020 3276 DeviceEnroller.exe PID 3276 wrote to memory of 5020 3276 DeviceEnroller.exe PID 3276 wrote to memory of 3700 3276 DeviceEnroller.exe PID 3276 wrote to memory of 3700 3276 DeviceEnroller.exe PID 3276 wrote to memory of 3736 3276 GamePanel.exe PID 3276 wrote to memory of 3736 3276 GamePanel.exe PID 3276 wrote to memory of 4324 3276 GamePanel.exe PID 3276 wrote to memory of 4324 3276 GamePanel.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\668f015f2009a05024a99c756f684e3f1056c9b5a49e241379934daa27f031ed.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\InfDefaultInstall.exeC:\Windows\system32\InfDefaultInstall.exe1⤵
-
C:\Users\Admin\AppData\Local\bC1\InfDefaultInstall.exeC:\Users\Admin\AppData\Local\bC1\InfDefaultInstall.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\DeviceEnroller.exeC:\Windows\system32\DeviceEnroller.exe1⤵
-
C:\Users\Admin\AppData\Local\rJZI8YK\DeviceEnroller.exeC:\Users\Admin\AppData\Local\rJZI8YK\DeviceEnroller.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\GamePanel.exeC:\Windows\system32\GamePanel.exe1⤵
-
C:\Users\Admin\AppData\Local\vILbe1w\GamePanel.exeC:\Users\Admin\AppData\Local\vILbe1w\GamePanel.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\bC1\InfDefaultInstall.exeFilesize
13KB
MD5ee18876c1e5de583de7547075975120e
SHA1f7fcb3d77da74deee25de9296a7c7335916504e3
SHA256e59127b5fe82714956c7a1f10392a8673086a8e1f609e059935c7da1fa015a5d
SHA51208bc4d28b8f528582c58175a74871dd33ac97955c3709c991779fc34b5ba4b2ba6ff40476d9f59345b61b0153fd932b0ea539431a67ff5012cb2ac8ab392f73c
-
C:\Users\Admin\AppData\Local\bC1\newdev.dllFilesize
1005KB
MD5c945743e98bdec9eea3be42eeed955be
SHA1df3ecea11e7d20f731ae2026ff02d67dea4bea0d
SHA256278054d2d846deeb309a0f59217d5ce4952490f70027dc474777cfbadb0ba53a
SHA512c491262942adf3d411f285b12a73f6b1e75d26d1c2e48e2fb7304804cc03fbfa515ec9ac6fb6ad60cb9107ffa51a18f101fee2fade0814c38f8f476d7cea225a
-
C:\Users\Admin\AppData\Local\bC1\newdev.dllFilesize
1005KB
MD5c945743e98bdec9eea3be42eeed955be
SHA1df3ecea11e7d20f731ae2026ff02d67dea4bea0d
SHA256278054d2d846deeb309a0f59217d5ce4952490f70027dc474777cfbadb0ba53a
SHA512c491262942adf3d411f285b12a73f6b1e75d26d1c2e48e2fb7304804cc03fbfa515ec9ac6fb6ad60cb9107ffa51a18f101fee2fade0814c38f8f476d7cea225a
-
C:\Users\Admin\AppData\Local\rJZI8YK\DeviceEnroller.exeFilesize
448KB
MD5946d9474533f58d2613078fd14ca7473
SHA1c2620ac9522fa3702a6a03299b930d6044aa5e49
SHA256cf5f5fe084f172e9c435615c1dc6ae7d3bd8c5ec8ea290caa0627c2f392760cb
SHA5123653d41a0553ee63a43490f682c9b528651a6336f28adafc333d4d148577351122db8279ff83ee59bb0a9c17bb384e9f6c9c78677c8c5ed671a42036dec1f8c1
-
C:\Users\Admin\AppData\Local\rJZI8YK\XmlLite.dllFilesize
1004KB
MD577a6bb3a88552b0a8317604e5e1290da
SHA1c214e7576b92155eb8d0fa6636dafaf0da66f341
SHA2564484171e4a27510a222f966aa5ddad066af311e19de94fb4dc367b86b20f55fb
SHA512ab6d7f50346f614790ea10936f994d7782297817765b908d4af292ba1c0d0d41ccecc26543cdaa23af95fdcb38ad57e36241a17540045dce1b9a83f7e6691478
-
C:\Users\Admin\AppData\Local\rJZI8YK\XmlLite.dllFilesize
1004KB
MD577a6bb3a88552b0a8317604e5e1290da
SHA1c214e7576b92155eb8d0fa6636dafaf0da66f341
SHA2564484171e4a27510a222f966aa5ddad066af311e19de94fb4dc367b86b20f55fb
SHA512ab6d7f50346f614790ea10936f994d7782297817765b908d4af292ba1c0d0d41ccecc26543cdaa23af95fdcb38ad57e36241a17540045dce1b9a83f7e6691478
-
C:\Users\Admin\AppData\Local\vILbe1w\GamePanel.exeFilesize
1.2MB
MD5266f6a62c16f6a889218800762b137be
SHA131b9bd85a37bf0cbb38a1c30147b83671458fa72
SHA25671f8f11f26f3a7c1498373f20f0f4cc960513d0383fe24906eeb1bc9678beecd
SHA512b21d9b0656ab6bd3b158922722a332f07096ddd4215c802776c5807c9cf6ece40082dd986ea6867bdc8d22878ce035a5c8dfcc26cfae94aeee059701b6bf1e68
-
C:\Users\Admin\AppData\Local\vILbe1w\dxgi.dllFilesize
1005KB
MD521dd1cba4e8fabee97163bac12b95cb9
SHA1bbf21dbbabe4730b64ff3fac08d20e9d3b3a430b
SHA25601ea9653db3edbc7e2782b74251c7091907cc20150607b1bc97036163b60b6a6
SHA51248e4cca0865be17680f96dc17780344b6a51ab45ad16556221da0032db786d86f51bfe91d2127463d92a648ab6729f98681bd48cca9eca3fafb9df143b94c86f
-
C:\Users\Admin\AppData\Local\vILbe1w\dxgi.dllFilesize
1005KB
MD521dd1cba4e8fabee97163bac12b95cb9
SHA1bbf21dbbabe4730b64ff3fac08d20e9d3b3a430b
SHA25601ea9653db3edbc7e2782b74251c7091907cc20150607b1bc97036163b60b6a6
SHA51248e4cca0865be17680f96dc17780344b6a51ab45ad16556221da0032db786d86f51bfe91d2127463d92a648ab6729f98681bd48cca9eca3fafb9df143b94c86f
-
C:\Users\Admin\AppData\Local\vILbe1w\dxgi.dllFilesize
1005KB
MD521dd1cba4e8fabee97163bac12b95cb9
SHA1bbf21dbbabe4730b64ff3fac08d20e9d3b3a430b
SHA25601ea9653db3edbc7e2782b74251c7091907cc20150607b1bc97036163b60b6a6
SHA51248e4cca0865be17680f96dc17780344b6a51ab45ad16556221da0032db786d86f51bfe91d2127463d92a648ab6729f98681bd48cca9eca3fafb9df143b94c86f
-
memory/568-130-0x0000000140000000-0x0000000140102000-memory.dmpFilesize
1.0MB
-
memory/568-134-0x0000025636FB0000-0x0000025636FB7000-memory.dmpFilesize
28KB
-
memory/2656-167-0x0000025BA2EF0000-0x0000025BA2EF7000-memory.dmpFilesize
28KB
-
memory/2656-163-0x0000000140000000-0x0000000140103000-memory.dmpFilesize
1.0MB
-
memory/2656-159-0x0000000000000000-mapping.dmp
-
memory/3276-157-0x00007FF8DED4C000-0x00007FF8DED4D000-memory.dmpFilesize
4KB
-
memory/3276-144-0x0000000140000000-0x0000000140102000-memory.dmpFilesize
1.0MB
-
memory/3276-158-0x00007FF8DEC90000-0x00007FF8DECA0000-memory.dmpFilesize
64KB
-
memory/3276-147-0x0000000001180000-0x0000000001187000-memory.dmpFilesize
28KB
-
memory/3276-146-0x0000000140000000-0x0000000140102000-memory.dmpFilesize
1.0MB
-
memory/3276-136-0x0000000140000000-0x0000000140102000-memory.dmpFilesize
1.0MB
-
memory/3276-145-0x0000000140000000-0x0000000140102000-memory.dmpFilesize
1.0MB
-
memory/3276-138-0x0000000140000000-0x0000000140102000-memory.dmpFilesize
1.0MB
-
memory/3276-143-0x0000000140000000-0x0000000140102000-memory.dmpFilesize
1.0MB
-
memory/3276-156-0x00007FF8DED7C000-0x00007FF8DED7D000-memory.dmpFilesize
4KB
-
memory/3276-142-0x0000000140000000-0x0000000140102000-memory.dmpFilesize
1.0MB
-
memory/3276-141-0x0000000140000000-0x0000000140102000-memory.dmpFilesize
1.0MB
-
memory/3276-140-0x0000000140000000-0x0000000140102000-memory.dmpFilesize
1.0MB
-
memory/3276-135-0x00000000011B0000-0x00000000011B1000-memory.dmpFilesize
4KB
-
memory/3276-137-0x0000000140000000-0x0000000140102000-memory.dmpFilesize
1.0MB
-
memory/3276-139-0x0000000140000000-0x0000000140102000-memory.dmpFilesize
1.0MB
-
memory/3700-168-0x0000000000000000-mapping.dmp
-
memory/3700-176-0x000001CE2E1A0000-0x000001CE2E1A7000-memory.dmpFilesize
28KB
-
memory/4324-177-0x0000000000000000-mapping.dmp
-
memory/4324-186-0x00000291F3E70000-0x00000291F3E77000-memory.dmpFilesize
28KB