Analysis
-
max time kernel
152s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
17-04-2022 16:34
Static task
static1
Behavioral task
behavioral1
Sample
d95eec365ca1737b4a967ec123f3d2fc0115c92672aa08a8f7b153dd05d6569b.dll
Resource
win7-20220414-en
General
-
Target
d95eec365ca1737b4a967ec123f3d2fc0115c92672aa08a8f7b153dd05d6569b.dll
-
Size
689KB
-
MD5
b1cdb53b8ab59c27a81d06855ba5b6bd
-
SHA1
1725f3f1f6a59e2349846136291da89e568d0286
-
SHA256
d95eec365ca1737b4a967ec123f3d2fc0115c92672aa08a8f7b153dd05d6569b
-
SHA512
31b62bfac64df1f534e44466d896bd80c46fed15f4ea7c0db6d65a6727ffb21d9ab47ee573d8878cbb8c11fe173aefa12261b502bf6279dc653348b27f39be8a
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/972-54-0x0000000140000000-0x00000001400B1000-memory.dmp dridex_payload behavioral1/memory/680-83-0x0000000140000000-0x00000001400B2000-memory.dmp dridex_payload -
Processes:
resource yara_rule behavioral1/memory/1260-58-0x0000000002990000-0x0000000002991000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
psr.exemsdtc.exeDeviceDisplayObjectProvider.exepid process 680 psr.exe 1044 msdtc.exe 560 DeviceDisplayObjectProvider.exe -
Loads dropped DLL 7 IoCs
Processes:
psr.exemsdtc.exeDeviceDisplayObjectProvider.exepid process 1260 680 psr.exe 1260 1044 msdtc.exe 1260 560 DeviceDisplayObjectProvider.exe 1260 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\Evgmngveltmlhb = "C:\\Users\\Admin\\AppData\\Roaming\\MACROM~1\\FLASHP~1\\iVbnf\\msdtc.exe" -
Processes:
msdtc.exeDeviceDisplayObjectProvider.exerundll32.exepsr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msdtc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DeviceDisplayObjectProvider.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA psr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepsr.exemsdtc.exepid process 972 rundll32.exe 972 rundll32.exe 972 rundll32.exe 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 680 psr.exe 680 psr.exe 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1044 msdtc.exe 1044 msdtc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 1260 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1260 wrote to memory of 784 1260 psr.exe PID 1260 wrote to memory of 784 1260 psr.exe PID 1260 wrote to memory of 784 1260 psr.exe PID 1260 wrote to memory of 680 1260 psr.exe PID 1260 wrote to memory of 680 1260 psr.exe PID 1260 wrote to memory of 680 1260 psr.exe PID 1260 wrote to memory of 848 1260 msdtc.exe PID 1260 wrote to memory of 848 1260 msdtc.exe PID 1260 wrote to memory of 848 1260 msdtc.exe PID 1260 wrote to memory of 1044 1260 msdtc.exe PID 1260 wrote to memory of 1044 1260 msdtc.exe PID 1260 wrote to memory of 1044 1260 msdtc.exe PID 1260 wrote to memory of 1640 1260 DeviceDisplayObjectProvider.exe PID 1260 wrote to memory of 1640 1260 DeviceDisplayObjectProvider.exe PID 1260 wrote to memory of 1640 1260 DeviceDisplayObjectProvider.exe PID 1260 wrote to memory of 560 1260 DeviceDisplayObjectProvider.exe PID 1260 wrote to memory of 560 1260 DeviceDisplayObjectProvider.exe PID 1260 wrote to memory of 560 1260 DeviceDisplayObjectProvider.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d95eec365ca1737b4a967ec123f3d2fc0115c92672aa08a8f7b153dd05d6569b.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\psr.exeC:\Windows\system32\psr.exe1⤵
-
C:\Users\Admin\AppData\Local\ZZgCv\psr.exeC:\Users\Admin\AppData\Local\ZZgCv\psr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\msdtc.exeC:\Windows\system32\msdtc.exe1⤵
-
C:\Users\Admin\AppData\Local\T6X5W4t\msdtc.exeC:\Users\Admin\AppData\Local\T6X5W4t\msdtc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\DeviceDisplayObjectProvider.exeC:\Windows\system32\DeviceDisplayObjectProvider.exe1⤵
-
C:\Users\Admin\AppData\Local\yTg3SYS\DeviceDisplayObjectProvider.exeC:\Users\Admin\AppData\Local\yTg3SYS\DeviceDisplayObjectProvider.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\T6X5W4t\VERSION.dllFilesize
690KB
MD5b0a89d5e71522ee6d4c2dbc09f98fe79
SHA1dfc8007d44efcb24524d3bba31feba19474604f4
SHA2568ddcc0092996a498ff22ca5617a607950a99b8758ced448c66cd8477ccf45c68
SHA512ed545a19ea5b7ce289dff287154a8a135b0787a1f990d014787970b1a26eb4209f504b8bf7896696fc13c0c391d36e817fce49d0b466e1c1685030d327ba6e8c
-
C:\Users\Admin\AppData\Local\T6X5W4t\msdtc.exeFilesize
138KB
MD5de0ece52236cfa3ed2dbfc03f28253a8
SHA184bbd2495c1809fcd19b535d41114e4fb101466c
SHA2562fbbec4cacb5161f68d7c2935852a5888945ca0f107cf8a1c01f4528ce407de3
SHA51269386134667626c60c99d941c8ab52f8e5235e3897b5af76965572287afd5dcd42b8207a520587844a57a268e4decb3f3c550e5b7a06230ee677dc5e40c50bb3
-
C:\Users\Admin\AppData\Local\ZZgCv\VERSION.dllFilesize
690KB
MD55b764114333430cf2c5bfdee8474d0f3
SHA14e59df2ac893478aabc413d4065dd84c661c743d
SHA2569c0c1864cb020a62046e70a9622bb0eac54b9561068c4fc8c0b71182e98cf956
SHA512ac39013cd3c10b4b3e2698fbfc9405d777ba16ff90dc56556b5bcee95f26e1e193e17916cc8cb12da29e5468227d885c0196d0830b0089dc38f69b0d77d261a7
-
C:\Users\Admin\AppData\Local\ZZgCv\psr.exeFilesize
715KB
MD5a80527109d75cba125d940b007eea151
SHA1facf32a9ede6abfaa09368bfdfcfec8554107272
SHA25668910f8aae867e938b6a3b76cdf176898ba275d9ade85b4ce00b03232de4c495
SHA51277b86a597c33af8d3fbd9711f4abe6e0ca33b86279b1d28a25dcf3545a34b221be1ad7d11004d016203809cead1ebfd4b7e889ee9df2efc100eabf77963c1774
-
C:\Users\Admin\AppData\Local\yTg3SYS\DeviceDisplayObjectProvider.exeFilesize
109KB
MD57e2eb3a4ae11190ef4c8a9b9a9123234
SHA172e98687a8d28614e2131c300403c2822856e865
SHA2568481a8ec19cb656ce328c877d5817d317203ba34424a2e9d169ddce5bf2cd2b0
SHA51218b1a0637f48929972a463d441182307725ebf1410dd461a1966bd040ac5dcced138155b7c713bfc924ea2f7b39527a084a08b44fa24c3eb9c654871f99caabf
-
C:\Users\Admin\AppData\Local\yTg3SYS\XmlLite.dllFilesize
690KB
MD5613172cff3b5bc749bc3d32e49c9808f
SHA16c82b6536413506f56005b51490f8c9c5e162e96
SHA256007007af6dc0b721d6ca35533fcac94fd81af911777079b244d73dcef3b7a612
SHA512eb1dfe4e1f21fda7edfde490b618c2677bf6a11f4994169ad981b09528d5eed2faafbc2a083e3dac3eeaa1d8c948e51419fa457b6f0dbc0f7a2dff2dc2ed45aa
-
\Users\Admin\AppData\Local\T6X5W4t\VERSION.dllFilesize
690KB
MD5b0a89d5e71522ee6d4c2dbc09f98fe79
SHA1dfc8007d44efcb24524d3bba31feba19474604f4
SHA2568ddcc0092996a498ff22ca5617a607950a99b8758ced448c66cd8477ccf45c68
SHA512ed545a19ea5b7ce289dff287154a8a135b0787a1f990d014787970b1a26eb4209f504b8bf7896696fc13c0c391d36e817fce49d0b466e1c1685030d327ba6e8c
-
\Users\Admin\AppData\Local\T6X5W4t\msdtc.exeFilesize
138KB
MD5de0ece52236cfa3ed2dbfc03f28253a8
SHA184bbd2495c1809fcd19b535d41114e4fb101466c
SHA2562fbbec4cacb5161f68d7c2935852a5888945ca0f107cf8a1c01f4528ce407de3
SHA51269386134667626c60c99d941c8ab52f8e5235e3897b5af76965572287afd5dcd42b8207a520587844a57a268e4decb3f3c550e5b7a06230ee677dc5e40c50bb3
-
\Users\Admin\AppData\Local\ZZgCv\VERSION.dllFilesize
690KB
MD55b764114333430cf2c5bfdee8474d0f3
SHA14e59df2ac893478aabc413d4065dd84c661c743d
SHA2569c0c1864cb020a62046e70a9622bb0eac54b9561068c4fc8c0b71182e98cf956
SHA512ac39013cd3c10b4b3e2698fbfc9405d777ba16ff90dc56556b5bcee95f26e1e193e17916cc8cb12da29e5468227d885c0196d0830b0089dc38f69b0d77d261a7
-
\Users\Admin\AppData\Local\ZZgCv\psr.exeFilesize
715KB
MD5a80527109d75cba125d940b007eea151
SHA1facf32a9ede6abfaa09368bfdfcfec8554107272
SHA25668910f8aae867e938b6a3b76cdf176898ba275d9ade85b4ce00b03232de4c495
SHA51277b86a597c33af8d3fbd9711f4abe6e0ca33b86279b1d28a25dcf3545a34b221be1ad7d11004d016203809cead1ebfd4b7e889ee9df2efc100eabf77963c1774
-
\Users\Admin\AppData\Local\yTg3SYS\DeviceDisplayObjectProvider.exeFilesize
109KB
MD57e2eb3a4ae11190ef4c8a9b9a9123234
SHA172e98687a8d28614e2131c300403c2822856e865
SHA2568481a8ec19cb656ce328c877d5817d317203ba34424a2e9d169ddce5bf2cd2b0
SHA51218b1a0637f48929972a463d441182307725ebf1410dd461a1966bd040ac5dcced138155b7c713bfc924ea2f7b39527a084a08b44fa24c3eb9c654871f99caabf
-
\Users\Admin\AppData\Local\yTg3SYS\XmlLite.dllFilesize
690KB
MD5613172cff3b5bc749bc3d32e49c9808f
SHA16c82b6536413506f56005b51490f8c9c5e162e96
SHA256007007af6dc0b721d6ca35533fcac94fd81af911777079b244d73dcef3b7a612
SHA512eb1dfe4e1f21fda7edfde490b618c2677bf6a11f4994169ad981b09528d5eed2faafbc2a083e3dac3eeaa1d8c948e51419fa457b6f0dbc0f7a2dff2dc2ed45aa
-
\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\AxlsaqbMe\DeviceDisplayObjectProvider.exeFilesize
109KB
MD57e2eb3a4ae11190ef4c8a9b9a9123234
SHA172e98687a8d28614e2131c300403c2822856e865
SHA2568481a8ec19cb656ce328c877d5817d317203ba34424a2e9d169ddce5bf2cd2b0
SHA51218b1a0637f48929972a463d441182307725ebf1410dd461a1966bd040ac5dcced138155b7c713bfc924ea2f7b39527a084a08b44fa24c3eb9c654871f99caabf
-
memory/560-97-0x0000000000000000-mapping.dmp
-
memory/560-104-0x0000000000170000-0x0000000000177000-memory.dmpFilesize
28KB
-
memory/680-80-0x000007FEFBDA1000-0x000007FEFBDA3000-memory.dmpFilesize
8KB
-
memory/680-78-0x0000000000000000-mapping.dmp
-
memory/680-83-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/680-86-0x0000000000190000-0x0000000000197000-memory.dmpFilesize
28KB
-
memory/972-54-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/972-57-0x0000000000220000-0x0000000000227000-memory.dmpFilesize
28KB
-
memory/1044-88-0x0000000000000000-mapping.dmp
-
memory/1044-95-0x00000000000F0000-0x00000000000F7000-memory.dmpFilesize
28KB
-
memory/1260-59-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1260-60-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1260-61-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1260-76-0x0000000077700000-0x0000000077702000-memory.dmpFilesize
8KB
-
memory/1260-62-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1260-63-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1260-64-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1260-65-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1260-66-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1260-58-0x0000000002990000-0x0000000002991000-memory.dmpFilesize
4KB
-
memory/1260-75-0x0000000002940000-0x0000000002947000-memory.dmpFilesize
28KB