Analysis
-
max time kernel
170s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
17-04-2022 16:35
Static task
static1
Behavioral task
behavioral1
Sample
985a0bde29b03b987245abf186f4840538585fb6f0204e737ebc56e79d1484ea.dll
Resource
win7-20220414-en
General
-
Target
985a0bde29b03b987245abf186f4840538585fb6f0204e737ebc56e79d1484ea.dll
-
Size
1.2MB
-
MD5
dc0390d145ecd8967fa2ac796ceb7086
-
SHA1
6824dcf9398dc587524c61cf9b5eba8fc022da27
-
SHA256
985a0bde29b03b987245abf186f4840538585fb6f0204e737ebc56e79d1484ea
-
SHA512
80571cccc3c2dae5678547331a9ba3de522d4d48014d0e9359cdbaa9aeef260823875e374e945059919b885d1f307bbbd3f3ebf324e1eba1a6d2a7308c4eb2b4
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1268-59-0x00000000029D0000-0x00000000029D1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
sigverif.exeosk.exewscript.exepid process 1160 sigverif.exe 1060 osk.exe 268 wscript.exe -
Loads dropped DLL 8 IoCs
Processes:
sigverif.exeosk.exewscript.exepid process 1268 1160 sigverif.exe 1268 1060 osk.exe 1268 1268 268 wscript.exe 1268 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gcehmtlftxqmyqm = "C:\\Users\\Admin\\AppData\\Roaming\\Identities\\0xAEM\\osk.exe" -
Processes:
rundll32.exesigverif.exeosk.exewscript.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sigverif.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA osk.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wscript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exesigverif.exepid process 760 rundll32.exe 760 rundll32.exe 760 rundll32.exe 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1268 1160 sigverif.exe 1160 sigverif.exe 1268 1268 1268 1268 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1268 wrote to memory of 520 1268 sigverif.exe PID 1268 wrote to memory of 520 1268 sigverif.exe PID 1268 wrote to memory of 520 1268 sigverif.exe PID 1268 wrote to memory of 1160 1268 sigverif.exe PID 1268 wrote to memory of 1160 1268 sigverif.exe PID 1268 wrote to memory of 1160 1268 sigverif.exe PID 1268 wrote to memory of 1808 1268 osk.exe PID 1268 wrote to memory of 1808 1268 osk.exe PID 1268 wrote to memory of 1808 1268 osk.exe PID 1268 wrote to memory of 1060 1268 osk.exe PID 1268 wrote to memory of 1060 1268 osk.exe PID 1268 wrote to memory of 1060 1268 osk.exe PID 1268 wrote to memory of 972 1268 wscript.exe PID 1268 wrote to memory of 972 1268 wscript.exe PID 1268 wrote to memory of 972 1268 wscript.exe PID 1268 wrote to memory of 268 1268 wscript.exe PID 1268 wrote to memory of 268 1268 wscript.exe PID 1268 wrote to memory of 268 1268 wscript.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\985a0bde29b03b987245abf186f4840538585fb6f0204e737ebc56e79d1484ea.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\sigverif.exeC:\Windows\system32\sigverif.exe1⤵
-
C:\Users\Admin\AppData\Local\esjsE\sigverif.exeC:\Users\Admin\AppData\Local\esjsE\sigverif.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\osk.exeC:\Windows\system32\osk.exe1⤵
-
C:\Users\Admin\AppData\Local\71lSmZ\osk.exeC:\Users\Admin\AppData\Local\71lSmZ\osk.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\wscript.exeC:\Windows\system32\wscript.exe1⤵
-
C:\Users\Admin\AppData\Local\mmnd\wscript.exeC:\Users\Admin\AppData\Local\mmnd\wscript.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\71lSmZ\UxTheme.dllFilesize
1.3MB
MD5a291b75e393339e05fef626a5c65972b
SHA117b1738d792a90f0c72b11616ae40c2d2bea6458
SHA256002796f0d35bfdfc549437de74c63c11a69eaabd2f4eec1f30893904db1f3b90
SHA512623c715a474dd9a0264d1133f6cf85e04016fb48d1b7fdc8b5048c33e72851dfd02b6ebe5a8787b25b41bdbb1790ff51bd785612045f4d9a12c23ea9e4abe697
-
C:\Users\Admin\AppData\Local\71lSmZ\osk.exeFilesize
676KB
MD5b918311a8e59fb8ccf613a110024deba
SHA1a9a64a53d2d1c023d058cfe23db4c9b4fbe59d1b
SHA256e1f7612086c2d01f15f2e74f1c22bc6abeb56f18e6bda058edce8d780aebb353
SHA512e3a2480e546bf31509d6e0ffb5ce9dc5da3eb93a1a06d8e89b68165f2dd9ad520edac52af4c485c93fe6028dffaf7fcaadaafb04e524954dd117551afff87cf1
-
C:\Users\Admin\AppData\Local\esjsE\VERSION.dllFilesize
1.2MB
MD536046e2b4d39eb38410cd8ca4f77ed83
SHA1c3f1efc40a2b8485a3b49d4df25f06008043b601
SHA256a0eed8de50d675c7d8c61ca3aafd5c23f8f069643eed389f3ac25f6e462dd485
SHA512de263292b042798e9a4bc02ba90b99a1fe4a42ecac1375cd079d024db38417c5129baa8649c20cf3f4e1abc3dba9934705269bb004a7aef6902b3aad853d16b4
-
C:\Users\Admin\AppData\Local\esjsE\sigverif.exeFilesize
73KB
MD5e8e95ae5534553fc055051cee99a7f55
SHA14e0f668849fd546edd083d5981ed685d02a68df4
SHA2569e107fd99892d08b15c223ac17c49af75a4cbca41b5e939bb91c9dca9f0d0bec
SHA5125d3c32d136a264b6d2cfba4602e4d8f75e55ba0e199e0e81d7a515c34d8b9237db29647c10ab79081173010ff8e2c6a59b652c0a9cfa796433aed2d200f02da6
-
C:\Users\Admin\AppData\Local\mmnd\VERSION.dllFilesize
1.2MB
MD5de5de37c0c572345ed6c6473d5d8bccb
SHA112b9aefe27692f1436e450335626b749bd5f91d6
SHA25682b06440d0d7829cb2c702a89e46e5a2ad4efeed1554ad4dc8db68d854abe539
SHA5120af51a99c5b55c48df23d30e65167990356989b7ae053135b388014e10bbdc5089d91b9ebd61e591e0e077ab28fc1aae1bef9bb748f5d3f80318bdeff584a967
-
C:\Users\Admin\AppData\Local\mmnd\wscript.exeFilesize
165KB
MD58886e0697b0a93c521f99099ef643450
SHA1851bd390bf559e702b8323062dbeb251d9f2f6f7
SHA256d73f7ee4e6e992a618d02580bdbf4fd6ba7c683d110928001092f4073341e95f
SHA512fc4a176f49a69c5600c427af72d3d274cfeacef48612b18cda966c3b4dda0b9d59c0fe8114d5ed8e0fec780744346e2cd503d1fd15c0c908908d067214b9d837
-
\Users\Admin\AppData\Local\71lSmZ\UxTheme.dllFilesize
1.3MB
MD5a291b75e393339e05fef626a5c65972b
SHA117b1738d792a90f0c72b11616ae40c2d2bea6458
SHA256002796f0d35bfdfc549437de74c63c11a69eaabd2f4eec1f30893904db1f3b90
SHA512623c715a474dd9a0264d1133f6cf85e04016fb48d1b7fdc8b5048c33e72851dfd02b6ebe5a8787b25b41bdbb1790ff51bd785612045f4d9a12c23ea9e4abe697
-
\Users\Admin\AppData\Local\71lSmZ\osk.exeFilesize
676KB
MD5b918311a8e59fb8ccf613a110024deba
SHA1a9a64a53d2d1c023d058cfe23db4c9b4fbe59d1b
SHA256e1f7612086c2d01f15f2e74f1c22bc6abeb56f18e6bda058edce8d780aebb353
SHA512e3a2480e546bf31509d6e0ffb5ce9dc5da3eb93a1a06d8e89b68165f2dd9ad520edac52af4c485c93fe6028dffaf7fcaadaafb04e524954dd117551afff87cf1
-
\Users\Admin\AppData\Local\esjsE\VERSION.dllFilesize
1.2MB
MD536046e2b4d39eb38410cd8ca4f77ed83
SHA1c3f1efc40a2b8485a3b49d4df25f06008043b601
SHA256a0eed8de50d675c7d8c61ca3aafd5c23f8f069643eed389f3ac25f6e462dd485
SHA512de263292b042798e9a4bc02ba90b99a1fe4a42ecac1375cd079d024db38417c5129baa8649c20cf3f4e1abc3dba9934705269bb004a7aef6902b3aad853d16b4
-
\Users\Admin\AppData\Local\esjsE\sigverif.exeFilesize
73KB
MD5e8e95ae5534553fc055051cee99a7f55
SHA14e0f668849fd546edd083d5981ed685d02a68df4
SHA2569e107fd99892d08b15c223ac17c49af75a4cbca41b5e939bb91c9dca9f0d0bec
SHA5125d3c32d136a264b6d2cfba4602e4d8f75e55ba0e199e0e81d7a515c34d8b9237db29647c10ab79081173010ff8e2c6a59b652c0a9cfa796433aed2d200f02da6
-
\Users\Admin\AppData\Local\mmnd\VERSION.dllFilesize
1.2MB
MD5de5de37c0c572345ed6c6473d5d8bccb
SHA112b9aefe27692f1436e450335626b749bd5f91d6
SHA25682b06440d0d7829cb2c702a89e46e5a2ad4efeed1554ad4dc8db68d854abe539
SHA5120af51a99c5b55c48df23d30e65167990356989b7ae053135b388014e10bbdc5089d91b9ebd61e591e0e077ab28fc1aae1bef9bb748f5d3f80318bdeff584a967
-
\Users\Admin\AppData\Local\mmnd\wscript.exeFilesize
165KB
MD58886e0697b0a93c521f99099ef643450
SHA1851bd390bf559e702b8323062dbeb251d9f2f6f7
SHA256d73f7ee4e6e992a618d02580bdbf4fd6ba7c683d110928001092f4073341e95f
SHA512fc4a176f49a69c5600c427af72d3d274cfeacef48612b18cda966c3b4dda0b9d59c0fe8114d5ed8e0fec780744346e2cd503d1fd15c0c908908d067214b9d837
-
\Users\Admin\AppData\Local\mmnd\wscript.exeFilesize
165KB
MD58886e0697b0a93c521f99099ef643450
SHA1851bd390bf559e702b8323062dbeb251d9f2f6f7
SHA256d73f7ee4e6e992a618d02580bdbf4fd6ba7c683d110928001092f4073341e95f
SHA512fc4a176f49a69c5600c427af72d3d274cfeacef48612b18cda966c3b4dda0b9d59c0fe8114d5ed8e0fec780744346e2cd503d1fd15c0c908908d067214b9d837
-
\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\Certificates\wNZpZ9e94ll\wscript.exeFilesize
165KB
MD58886e0697b0a93c521f99099ef643450
SHA1851bd390bf559e702b8323062dbeb251d9f2f6f7
SHA256d73f7ee4e6e992a618d02580bdbf4fd6ba7c683d110928001092f4073341e95f
SHA512fc4a176f49a69c5600c427af72d3d274cfeacef48612b18cda966c3b4dda0b9d59c0fe8114d5ed8e0fec780744346e2cd503d1fd15c0c908908d067214b9d837
-
memory/268-110-0x00000000001E0000-0x00000000001E7000-memory.dmpFilesize
28KB
-
memory/268-106-0x0000000000000000-mapping.dmp
-
memory/760-58-0x0000000000110000-0x0000000000117000-memory.dmpFilesize
28KB
-
memory/760-54-0x000007FEF6FB0000-0x000007FEF70F7000-memory.dmpFilesize
1.3MB
-
memory/1060-99-0x000007FEF6FB0000-0x000007FEF70F8000-memory.dmpFilesize
1.3MB
-
memory/1060-103-0x00000000001C0000-0x00000000001C7000-memory.dmpFilesize
28KB
-
memory/1060-94-0x0000000000000000-mapping.dmp
-
memory/1160-92-0x0000000000120000-0x0000000000127000-memory.dmpFilesize
28KB
-
memory/1160-85-0x000007FEFC4D1000-0x000007FEFC4D3000-memory.dmpFilesize
8KB
-
memory/1160-83-0x0000000000000000-mapping.dmp
-
memory/1160-88-0x000007FEF7290000-0x000007FEF73D8000-memory.dmpFilesize
1.3MB
-
memory/1268-60-0x0000000140000000-0x0000000140147000-memory.dmpFilesize
1.3MB
-
memory/1268-63-0x0000000140000000-0x0000000140147000-memory.dmpFilesize
1.3MB
-
memory/1268-62-0x0000000140000000-0x0000000140147000-memory.dmpFilesize
1.3MB
-
memory/1268-80-0x00000000029B0000-0x00000000029B7000-memory.dmpFilesize
28KB
-
memory/1268-61-0x0000000140000000-0x0000000140147000-memory.dmpFilesize
1.3MB
-
memory/1268-72-0x0000000140000000-0x0000000140147000-memory.dmpFilesize
1.3MB
-
memory/1268-64-0x0000000140000000-0x0000000140147000-memory.dmpFilesize
1.3MB
-
memory/1268-81-0x0000000077E30000-0x0000000077E32000-memory.dmpFilesize
8KB
-
memory/1268-71-0x0000000140000000-0x0000000140147000-memory.dmpFilesize
1.3MB
-
memory/1268-66-0x0000000140000000-0x0000000140147000-memory.dmpFilesize
1.3MB
-
memory/1268-67-0x0000000140000000-0x0000000140147000-memory.dmpFilesize
1.3MB
-
memory/1268-59-0x00000000029D0000-0x00000000029D1000-memory.dmpFilesize
4KB
-
memory/1268-68-0x0000000140000000-0x0000000140147000-memory.dmpFilesize
1.3MB
-
memory/1268-69-0x0000000140000000-0x0000000140147000-memory.dmpFilesize
1.3MB
-
memory/1268-70-0x0000000140000000-0x0000000140147000-memory.dmpFilesize
1.3MB
-
memory/1268-65-0x0000000140000000-0x0000000140147000-memory.dmpFilesize
1.3MB