Analysis
-
max time kernel
153s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
17-04-2022 16:34
Static task
static1
Behavioral task
behavioral1
Sample
d61a3625e48b64d363dd0285df0b62ceff9447ab6ed4db4699408486ec96fb7b.dll
Resource
win7-20220414-en
General
-
Target
d61a3625e48b64d363dd0285df0b62ceff9447ab6ed4db4699408486ec96fb7b.dll
-
Size
693KB
-
MD5
128568f4bf11bb59f95e87f5057f1987
-
SHA1
5099331e75b4a77cfe1cd00da93f7ceb21cebfcf
-
SHA256
d61a3625e48b64d363dd0285df0b62ceff9447ab6ed4db4699408486ec96fb7b
-
SHA512
1ace10e8851bcae7ba8347c14016fe6b198d2e30aa399f919e5cdb1aceba2e3fd70dad3cd5b19f08ad97d5d7986668b884808a890607916d7ff31acb02ad86d8
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/1856-130-0x0000000140000000-0x00000001400B2000-memory.dmp dridex_payload behavioral2/memory/4256-159-0x0000000140000000-0x00000001400B3000-memory.dmp dridex_payload behavioral2/memory/2660-175-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload -
Processes:
resource yara_rule behavioral2/memory/3144-134-0x0000000000860000-0x0000000000861000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
wbengine.exeSystemPropertiesRemote.exetcmsetup.exepid process 4256 wbengine.exe 5064 SystemPropertiesRemote.exe 2660 tcmsetup.exe -
Loads dropped DLL 3 IoCs
Processes:
wbengine.exeSystemPropertiesRemote.exetcmsetup.exepid process 4256 wbengine.exe 5064 SystemPropertiesRemote.exe 2660 tcmsetup.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Eqzhtortkjjc = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Word\\Rul1bJH0U\\SystemPropertiesRemote.exe" -
Processes:
SystemPropertiesRemote.exetcmsetup.exerundll32.exewbengine.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesRemote.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tcmsetup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wbengine.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1856 rundll32.exe 1856 rundll32.exe 1856 rundll32.exe 1856 rundll32.exe 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 3144 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3144 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3144 wrote to memory of 2840 3144 wbengine.exe PID 3144 wrote to memory of 2840 3144 wbengine.exe PID 3144 wrote to memory of 4256 3144 wbengine.exe PID 3144 wrote to memory of 4256 3144 wbengine.exe PID 3144 wrote to memory of 4708 3144 SystemPropertiesRemote.exe PID 3144 wrote to memory of 4708 3144 SystemPropertiesRemote.exe PID 3144 wrote to memory of 5064 3144 SystemPropertiesRemote.exe PID 3144 wrote to memory of 5064 3144 SystemPropertiesRemote.exe PID 3144 wrote to memory of 2680 3144 tcmsetup.exe PID 3144 wrote to memory of 2680 3144 tcmsetup.exe PID 3144 wrote to memory of 2660 3144 tcmsetup.exe PID 3144 wrote to memory of 2660 3144 tcmsetup.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\d61a3625e48b64d363dd0285df0b62ceff9447ab6ed4db4699408486ec96fb7b.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\wbengine.exeC:\Windows\system32\wbengine.exe1⤵
-
C:\Users\Admin\AppData\Local\kkc9RL\wbengine.exeC:\Users\Admin\AppData\Local\kkc9RL\wbengine.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\SystemPropertiesRemote.exeC:\Windows\system32\SystemPropertiesRemote.exe1⤵
-
C:\Users\Admin\AppData\Local\zmD7l\SystemPropertiesRemote.exeC:\Users\Admin\AppData\Local\zmD7l\SystemPropertiesRemote.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\tcmsetup.exeC:\Windows\system32\tcmsetup.exe1⤵
-
C:\Users\Admin\AppData\Local\sByIT84i\tcmsetup.exeC:\Users\Admin\AppData\Local\sByIT84i\tcmsetup.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\kkc9RL\SPP.dllFilesize
694KB
MD5849adc3100f81deb315c225c9c7ff350
SHA14cc76c2a8e545fcde93f07850696ac34e29a71f9
SHA256e701046fa9c29121d890b09333906f95d2eecdacbc632dc5e298bb46aaeb2120
SHA512df8830a7d0169226457d2b086641e2fbb3da1d4687a42154948f596fc08729df37683f5445816fb14832a4d6e5bd62e4f835d3c71a5785db7634ba36d03c0bff
-
C:\Users\Admin\AppData\Local\kkc9RL\SPP.dllFilesize
694KB
MD5849adc3100f81deb315c225c9c7ff350
SHA14cc76c2a8e545fcde93f07850696ac34e29a71f9
SHA256e701046fa9c29121d890b09333906f95d2eecdacbc632dc5e298bb46aaeb2120
SHA512df8830a7d0169226457d2b086641e2fbb3da1d4687a42154948f596fc08729df37683f5445816fb14832a4d6e5bd62e4f835d3c71a5785db7634ba36d03c0bff
-
C:\Users\Admin\AppData\Local\kkc9RL\wbengine.exeFilesize
1.5MB
MD517270a354a66590953c4aac1cf54e507
SHA1715babcc8e46b02ac498f4f06df7937904d9798d
SHA2569954394b43783061f9290706320cc65597c29176d5b8e7a26fa1d6b3536832b4
SHA5126be0ba6be84d01ab47f5a4ca98a6b940c43bd2d1e1a273d41c3e88aca47da11d932024b007716d1a6ffe6cee396b0e3e6971ab2afc293e72472f2e61c17b2a89
-
C:\Users\Admin\AppData\Local\sByIT84i\TAPI32.dllFilesize
701KB
MD5731f4c1ff1347d28dba3eaf4d3b21c54
SHA116d2f577188b7369d8fbc381e1fc4e5fb5df5bc2
SHA2560d8af03326793ed0066873f0a2050b1770bee2ce88d74abaead24f22d70cd286
SHA51203c7e56d994da81fce7c5a67c836f801c2840c49044148e410a95e08a5bb2aa559caf502862f1d461b11198668f2aba20d09a33a90121bc8ea3e1d4e7663d376
-
C:\Users\Admin\AppData\Local\sByIT84i\TAPI32.dllFilesize
701KB
MD5731f4c1ff1347d28dba3eaf4d3b21c54
SHA116d2f577188b7369d8fbc381e1fc4e5fb5df5bc2
SHA2560d8af03326793ed0066873f0a2050b1770bee2ce88d74abaead24f22d70cd286
SHA51203c7e56d994da81fce7c5a67c836f801c2840c49044148e410a95e08a5bb2aa559caf502862f1d461b11198668f2aba20d09a33a90121bc8ea3e1d4e7663d376
-
C:\Users\Admin\AppData\Local\sByIT84i\tcmsetup.exeFilesize
16KB
MD558f3b915b9ae7d63431772c2616b0945
SHA16346e837da3b0f551becb7cac6d160e3063696e9
SHA256e243501ba2ef7a6f04f51410bb916faffe0ec23450a4d030ce6bfe747e544b39
SHA5127b09192af460c502d1a94989a0d06191c8c7a058ce3a4541e3f45960a1e12529d0cdaff9da3d5bacfdceed57aeb6dc9a159c6c0a95675c438f99bf7e418c6dc5
-
C:\Users\Admin\AppData\Local\zmD7l\SYSDM.CPLFilesize
694KB
MD5bdfe567639b824093d6c98811a5d3d59
SHA1f2077ef89ae7618f021392eca1c79ebce31080ce
SHA256f0001168ed539e3b238cffab8e4e49522994990866aa7598b8a17a095510e03a
SHA5128f5db57c6f9dbcbb752d8f70be5faaca61f35d4ae38ac87c56c20efba6fe8bc916d81c6a9611d329834536ff4e2a8074012d39dabd49114d5a2cf0c78f8547de
-
C:\Users\Admin\AppData\Local\zmD7l\SYSDM.CPLFilesize
694KB
MD5bdfe567639b824093d6c98811a5d3d59
SHA1f2077ef89ae7618f021392eca1c79ebce31080ce
SHA256f0001168ed539e3b238cffab8e4e49522994990866aa7598b8a17a095510e03a
SHA5128f5db57c6f9dbcbb752d8f70be5faaca61f35d4ae38ac87c56c20efba6fe8bc916d81c6a9611d329834536ff4e2a8074012d39dabd49114d5a2cf0c78f8547de
-
C:\Users\Admin\AppData\Local\zmD7l\SystemPropertiesRemote.exeFilesize
82KB
MD5cdce1ee7f316f249a3c20cc7a0197da9
SHA1dadb23af07827758005ec0235ac1573ffcea0da6
SHA2567984e2bff295c8dbcbd3cd296d0741e3a6844b8db9f962abdbc8d333e9a83932
SHA512f1dc529ebfed814adcf3e68041243ee02ba33b56c356a63eba5ef2cb6ede1eda192e03349f6a200d34dfab67263df79cf295be3706f4197b9008ccdc53410c26
-
memory/1856-133-0x0000020272930000-0x0000020272937000-memory.dmpFilesize
28KB
-
memory/1856-130-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/2660-178-0x000002D492E40000-0x000002D492E47000-memory.dmpFilesize
28KB
-
memory/2660-175-0x0000000140000000-0x00000001400B4000-memory.dmpFilesize
720KB
-
memory/2660-171-0x0000000000000000-mapping.dmp
-
memory/3144-154-0x00007FF8C1510000-0x00007FF8C1520000-memory.dmpFilesize
64KB
-
memory/3144-136-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/3144-135-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/3144-139-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/3144-138-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/3144-142-0x0000000000830000-0x0000000000837000-memory.dmpFilesize
28KB
-
memory/3144-143-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/3144-141-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/3144-140-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/3144-137-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/3144-153-0x00007FF8C15CC000-0x00007FF8C15CD000-memory.dmpFilesize
4KB
-
memory/3144-134-0x0000000000860000-0x0000000000861000-memory.dmpFilesize
4KB
-
memory/3144-152-0x00007FF8C15FC000-0x00007FF8C15FD000-memory.dmpFilesize
4KB
-
memory/4256-155-0x0000000000000000-mapping.dmp
-
memory/4256-162-0x00000255C43E0000-0x00000255C43E7000-memory.dmpFilesize
28KB
-
memory/4256-159-0x0000000140000000-0x00000001400B3000-memory.dmpFilesize
716KB
-
memory/5064-170-0x000001EE10300000-0x000001EE10307000-memory.dmpFilesize
28KB
-
memory/5064-163-0x0000000000000000-mapping.dmp