Analysis
-
max time kernel
148s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
17-04-2022 16:35
Static task
static1
Behavioral task
behavioral1
Sample
7a13e5d9c436191ec91643ba7c5a67be2e509abf4261e1ad00e3795d532bfe7b.dll
Resource
win7-20220414-en
General
-
Target
7a13e5d9c436191ec91643ba7c5a67be2e509abf4261e1ad00e3795d532bfe7b.dll
-
Size
689KB
-
MD5
7dfb4ba2bd6af9d1d873f7570227c944
-
SHA1
a4ba8288d9ce7f64dc7af457222783131ccbb120
-
SHA256
7a13e5d9c436191ec91643ba7c5a67be2e509abf4261e1ad00e3795d532bfe7b
-
SHA512
bbef51d5be2ac929e525e9a096480c1e76b5e59475730dbaa84de2d3efeb24e29fd66910149ae2a5e408a513e303a1886de7052d642d59d89e4ccf3d175d0244
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/732-54-0x0000000140000000-0x00000001400B1000-memory.dmp dridex_payload behavioral1/memory/1804-83-0x0000000140000000-0x00000001400B2000-memory.dmp dridex_payload behavioral1/memory/1736-102-0x0000000140000000-0x00000001400B8000-memory.dmp dridex_payload -
Processes:
resource yara_rule behavioral1/memory/1260-58-0x0000000002260000-0x0000000002261000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 4 IoCs
Processes:
lpksetup.exerekeywiz.exemmc.exeRDVGHelper.exepid process 1804 lpksetup.exe 976 rekeywiz.exe 1736 mmc.exe 1980 RDVGHelper.exe -
Loads dropped DLL 9 IoCs
Processes:
lpksetup.exerekeywiz.exemmc.exeRDVGHelper.exepid process 1260 1804 lpksetup.exe 1260 976 rekeywiz.exe 1260 1736 mmc.exe 1260 1980 RDVGHelper.exe 1260 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gcehmtlftxqmyqm = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\QUICKL~1\\USERPI~1\\QG6d\\rekeywiz.exe" -
Processes:
rundll32.exelpksetup.exerekeywiz.exemmc.exeRDVGHelper.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA lpksetup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rekeywiz.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mmc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RDVGHelper.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exelpksetup.exerekeywiz.exepid process 732 rundll32.exe 732 rundll32.exe 732 rundll32.exe 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1804 lpksetup.exe 1804 lpksetup.exe 1260 1260 1260 1260 1260 1260 1260 1260 976 rekeywiz.exe 976 rekeywiz.exe 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 1260 -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
description pid process target process PID 1260 wrote to memory of 1868 1260 lpksetup.exe PID 1260 wrote to memory of 1868 1260 lpksetup.exe PID 1260 wrote to memory of 1868 1260 lpksetup.exe PID 1260 wrote to memory of 1804 1260 lpksetup.exe PID 1260 wrote to memory of 1804 1260 lpksetup.exe PID 1260 wrote to memory of 1804 1260 lpksetup.exe PID 1260 wrote to memory of 896 1260 rekeywiz.exe PID 1260 wrote to memory of 896 1260 rekeywiz.exe PID 1260 wrote to memory of 896 1260 rekeywiz.exe PID 1260 wrote to memory of 976 1260 rekeywiz.exe PID 1260 wrote to memory of 976 1260 rekeywiz.exe PID 1260 wrote to memory of 976 1260 rekeywiz.exe PID 1260 wrote to memory of 1224 1260 mmc.exe PID 1260 wrote to memory of 1224 1260 mmc.exe PID 1260 wrote to memory of 1224 1260 mmc.exe PID 1260 wrote to memory of 1736 1260 mmc.exe PID 1260 wrote to memory of 1736 1260 mmc.exe PID 1260 wrote to memory of 1736 1260 mmc.exe PID 1260 wrote to memory of 1444 1260 RDVGHelper.exe PID 1260 wrote to memory of 1444 1260 RDVGHelper.exe PID 1260 wrote to memory of 1444 1260 RDVGHelper.exe PID 1260 wrote to memory of 1980 1260 RDVGHelper.exe PID 1260 wrote to memory of 1980 1260 RDVGHelper.exe PID 1260 wrote to memory of 1980 1260 RDVGHelper.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7a13e5d9c436191ec91643ba7c5a67be2e509abf4261e1ad00e3795d532bfe7b.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\lpksetup.exeC:\Windows\system32\lpksetup.exe1⤵
-
C:\Users\Admin\AppData\Local\kiSBTuo\lpksetup.exeC:\Users\Admin\AppData\Local\kiSBTuo\lpksetup.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\rekeywiz.exeC:\Windows\system32\rekeywiz.exe1⤵
-
C:\Users\Admin\AppData\Local\S5h\rekeywiz.exeC:\Users\Admin\AppData\Local\S5h\rekeywiz.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\mmc.exeC:\Windows\system32\mmc.exe1⤵
-
C:\Users\Admin\AppData\Local\UQdH\mmc.exeC:\Users\Admin\AppData\Local\UQdH\mmc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\RDVGHelper.exeC:\Windows\system32\RDVGHelper.exe1⤵
-
C:\Users\Admin\AppData\Local\sf1xg\RDVGHelper.exeC:\Users\Admin\AppData\Local\sf1xg\RDVGHelper.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\S5h\rekeywiz.exeFilesize
67KB
MD5767c75767b00ccfd41a547bb7b2adfff
SHA191890853a5476def402910e6507417d400c0d3cb
SHA256bd70e504871a2ac1c883d19b87970c8d1b8b251c784bf777ba77ed764f5f2395
SHA512f096043452a1aa213a5e4d62638de3ee4b0b3ad3d12b7ee0372d8c79e00e2e13b4fd0ebc4206bbdb5124bed292dd5b30ef1641288046ef835f89c332985154f9
-
C:\Users\Admin\AppData\Local\S5h\slc.dllFilesize
691KB
MD5e2a52ab57a1154e624d9ad198c8a88b1
SHA1bafaff1fb88b85fd9d6d88cfc1f2d5330d14830a
SHA256774f4f055ff85c2eb4be516eed898d35ffa2aac83204cfe2507479225cf37a09
SHA51278f80a21122424f31ecb1e3ad98351a7cfaebd55a95e76b318d1152f5a5d2a49eda77b54868feb23193a8152d2cf01b3df907e11e9d2270dcbf6bd6a5e425781
-
C:\Users\Admin\AppData\Local\UQdH\MFC42u.dllFilesize
717KB
MD51384ac6af536e58e50ab56a43b5c86bc
SHA10e5a044db80c0e2cb7cda1d9fc39d890eda9c070
SHA256df399077ad4a674ddbf5a42919dfb2e38715db21a5a2603972b8804cbde88801
SHA512d6abcbdb11a5c3b3d826efca7b05684df0200eacd911a8c713af1a2b03187f60e91fc79dca7088213c77dfbdd6377ebbcede15a3e57a652133fd84949766674c
-
C:\Users\Admin\AppData\Local\UQdH\mmc.exeFilesize
2.0MB
MD59fea051a9585f2a303d55745b4bf63aa
SHA1f5dc12d658402900a2b01af2f018d113619b96b8
SHA256b212e59e4c7fe77f6f189138d9d8b151e50eb83a35d6eadfb1e4bb0b4262c484
SHA512beba79f0b6710929871fbdf378d3c0a41f230ac30cbfa87173f7b77c35e06425f48db42ed3b16d5d9bcb7ef0098dffcd0d2947da8fb7ec1136ea62205f1afc76
-
C:\Users\Admin\AppData\Local\kiSBTuo\lpksetup.exeFilesize
638KB
MD550d28f3f8b7c17056520c80a29efe17c
SHA11b1e62be0a0bdc9aec2e91842c35381297d8f01e
SHA25671613ea48467d1a0b00f8bcaed270b7527fc5771f540a8eb0515b3a5fdc8604f
SHA51292bc60402aacf1a62e47335adf8696a5c0d31637e624628d82b6ec1f17e1ee65ae8edf7e8dcd10933f59c892a4a74d8e461945df0991b706a4a53927c5fd3861
-
C:\Users\Admin\AppData\Local\kiSBTuo\slc.dllFilesize
691KB
MD5c84ae3030bb5f89fa8430e55c31632a7
SHA14a53904e85a01791b1d9f5195f671b7e36f21e15
SHA2566c2a56cd49d6a7c113eecec7c8b1b3b82bd79bf926ffe3a46436f0e417ffc349
SHA512257ab0f3b83f7387fe0e4a671236a97e83134c3a0700ad623140f096029935e4db611d8144d688a40145b2f4b5247c7359a8923e08f0688d18016702d62006eb
-
C:\Users\Admin\AppData\Local\sf1xg\RDVGHelper.exeFilesize
93KB
MD553fda4af81e7c4895357a50e848b7cfe
SHA101fb2d0210f1c47aaf684e31a9fb78f89bba9c0f
SHA25662ab8c2c5b5bd84fd07e96b6a3b87a4ea56946107ed9b7f8076580ae1fefd038
SHA512dbbda90a57d27160c5a3a5e4e94cfc43b1663fcbfe424fdec851e52356f61492bdcf677c46be8aa4e8ccc8be7c389b6aa7bbbce8447e1fae32f03e5e409f4051
-
C:\Users\Admin\AppData\Local\sf1xg\WTSAPI32.dllFilesize
692KB
MD55712a8cdc1da715b72d692568dd0501e
SHA115cba7c8b17715c8c53f5c5cdddc9dee06394400
SHA256581b7c4e726d6ec45ad5f38c2bb2828ccf30d3be45fd68d8749d2f655a7b4fc2
SHA512932f65ec51a4a0c76bde5b8bf57c9c837b8518c1a2417f215d73cc2e292544477503adc00c2fb275b64725cb01fb04b6b35b19c2c9cc34b9d5ac4175b53aee5d
-
\Users\Admin\AppData\Local\S5h\rekeywiz.exeFilesize
67KB
MD5767c75767b00ccfd41a547bb7b2adfff
SHA191890853a5476def402910e6507417d400c0d3cb
SHA256bd70e504871a2ac1c883d19b87970c8d1b8b251c784bf777ba77ed764f5f2395
SHA512f096043452a1aa213a5e4d62638de3ee4b0b3ad3d12b7ee0372d8c79e00e2e13b4fd0ebc4206bbdb5124bed292dd5b30ef1641288046ef835f89c332985154f9
-
\Users\Admin\AppData\Local\S5h\slc.dllFilesize
691KB
MD5e2a52ab57a1154e624d9ad198c8a88b1
SHA1bafaff1fb88b85fd9d6d88cfc1f2d5330d14830a
SHA256774f4f055ff85c2eb4be516eed898d35ffa2aac83204cfe2507479225cf37a09
SHA51278f80a21122424f31ecb1e3ad98351a7cfaebd55a95e76b318d1152f5a5d2a49eda77b54868feb23193a8152d2cf01b3df907e11e9d2270dcbf6bd6a5e425781
-
\Users\Admin\AppData\Local\UQdH\MFC42u.dllFilesize
717KB
MD51384ac6af536e58e50ab56a43b5c86bc
SHA10e5a044db80c0e2cb7cda1d9fc39d890eda9c070
SHA256df399077ad4a674ddbf5a42919dfb2e38715db21a5a2603972b8804cbde88801
SHA512d6abcbdb11a5c3b3d826efca7b05684df0200eacd911a8c713af1a2b03187f60e91fc79dca7088213c77dfbdd6377ebbcede15a3e57a652133fd84949766674c
-
\Users\Admin\AppData\Local\UQdH\mmc.exeFilesize
2.0MB
MD59fea051a9585f2a303d55745b4bf63aa
SHA1f5dc12d658402900a2b01af2f018d113619b96b8
SHA256b212e59e4c7fe77f6f189138d9d8b151e50eb83a35d6eadfb1e4bb0b4262c484
SHA512beba79f0b6710929871fbdf378d3c0a41f230ac30cbfa87173f7b77c35e06425f48db42ed3b16d5d9bcb7ef0098dffcd0d2947da8fb7ec1136ea62205f1afc76
-
\Users\Admin\AppData\Local\kiSBTuo\lpksetup.exeFilesize
638KB
MD550d28f3f8b7c17056520c80a29efe17c
SHA11b1e62be0a0bdc9aec2e91842c35381297d8f01e
SHA25671613ea48467d1a0b00f8bcaed270b7527fc5771f540a8eb0515b3a5fdc8604f
SHA51292bc60402aacf1a62e47335adf8696a5c0d31637e624628d82b6ec1f17e1ee65ae8edf7e8dcd10933f59c892a4a74d8e461945df0991b706a4a53927c5fd3861
-
\Users\Admin\AppData\Local\kiSBTuo\slc.dllFilesize
691KB
MD5c84ae3030bb5f89fa8430e55c31632a7
SHA14a53904e85a01791b1d9f5195f671b7e36f21e15
SHA2566c2a56cd49d6a7c113eecec7c8b1b3b82bd79bf926ffe3a46436f0e417ffc349
SHA512257ab0f3b83f7387fe0e4a671236a97e83134c3a0700ad623140f096029935e4db611d8144d688a40145b2f4b5247c7359a8923e08f0688d18016702d62006eb
-
\Users\Admin\AppData\Local\sf1xg\RDVGHelper.exeFilesize
93KB
MD553fda4af81e7c4895357a50e848b7cfe
SHA101fb2d0210f1c47aaf684e31a9fb78f89bba9c0f
SHA25662ab8c2c5b5bd84fd07e96b6a3b87a4ea56946107ed9b7f8076580ae1fefd038
SHA512dbbda90a57d27160c5a3a5e4e94cfc43b1663fcbfe424fdec851e52356f61492bdcf677c46be8aa4e8ccc8be7c389b6aa7bbbce8447e1fae32f03e5e409f4051
-
\Users\Admin\AppData\Local\sf1xg\WTSAPI32.dllFilesize
692KB
MD55712a8cdc1da715b72d692568dd0501e
SHA115cba7c8b17715c8c53f5c5cdddc9dee06394400
SHA256581b7c4e726d6ec45ad5f38c2bb2828ccf30d3be45fd68d8749d2f655a7b4fc2
SHA512932f65ec51a4a0c76bde5b8bf57c9c837b8518c1a2417f215d73cc2e292544477503adc00c2fb275b64725cb01fb04b6b35b19c2c9cc34b9d5ac4175b53aee5d
-
\Users\Admin\AppData\Roaming\Adobe\Acrobat\mNPIJrmWvWE\RDVGHelper.exeFilesize
93KB
MD553fda4af81e7c4895357a50e848b7cfe
SHA101fb2d0210f1c47aaf684e31a9fb78f89bba9c0f
SHA25662ab8c2c5b5bd84fd07e96b6a3b87a4ea56946107ed9b7f8076580ae1fefd038
SHA512dbbda90a57d27160c5a3a5e4e94cfc43b1663fcbfe424fdec851e52356f61492bdcf677c46be8aa4e8ccc8be7c389b6aa7bbbce8447e1fae32f03e5e409f4051
-
memory/732-54-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/732-57-0x00000000000A0000-0x00000000000A7000-memory.dmpFilesize
28KB
-
memory/976-96-0x0000000001CA0000-0x0000000001CA7000-memory.dmpFilesize
28KB
-
memory/976-88-0x0000000000000000-mapping.dmp
-
memory/1260-66-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1260-60-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1260-58-0x0000000002260000-0x0000000002261000-memory.dmpFilesize
4KB
-
memory/1260-65-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1260-64-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1260-75-0x0000000002240000-0x0000000002247000-memory.dmpFilesize
28KB
-
memory/1260-76-0x0000000077570000-0x0000000077572000-memory.dmpFilesize
8KB
-
memory/1260-63-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1260-59-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1260-62-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1260-61-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1736-102-0x0000000140000000-0x00000001400B8000-memory.dmpFilesize
736KB
-
memory/1736-105-0x0000000000170000-0x0000000000177000-memory.dmpFilesize
28KB
-
memory/1736-98-0x0000000000000000-mapping.dmp
-
memory/1804-86-0x0000000000090000-0x0000000000097000-memory.dmpFilesize
28KB
-
memory/1804-78-0x0000000000000000-mapping.dmp
-
memory/1804-80-0x000007FEFBC11000-0x000007FEFBC13000-memory.dmpFilesize
8KB
-
memory/1804-83-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/1980-107-0x0000000000000000-mapping.dmp
-
memory/1980-114-0x00000000000F0000-0x00000000000F7000-memory.dmpFilesize
28KB