Analysis
-
max time kernel
152s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
17-04-2022 16:35
Static task
static1
Behavioral task
behavioral1
Sample
7a13e5d9c436191ec91643ba7c5a67be2e509abf4261e1ad00e3795d532bfe7b.dll
Resource
win7-20220414-en
General
-
Target
7a13e5d9c436191ec91643ba7c5a67be2e509abf4261e1ad00e3795d532bfe7b.dll
-
Size
689KB
-
MD5
7dfb4ba2bd6af9d1d873f7570227c944
-
SHA1
a4ba8288d9ce7f64dc7af457222783131ccbb120
-
SHA256
7a13e5d9c436191ec91643ba7c5a67be2e509abf4261e1ad00e3795d532bfe7b
-
SHA512
bbef51d5be2ac929e525e9a096480c1e76b5e59475730dbaa84de2d3efeb24e29fd66910149ae2a5e408a513e303a1886de7052d642d59d89e4ccf3d175d0244
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3292-130-0x0000000140000000-0x00000001400B1000-memory.dmp dridex_payload behavioral2/memory/5048-161-0x0000000140000000-0x00000001400B2000-memory.dmp dridex_payload -
Processes:
resource yara_rule behavioral2/memory/3252-134-0x0000000000A60000-0x0000000000A61000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 4 IoCs
Processes:
consent.exeiexpress.exeBitLockerWizardElev.exeraserver.exepid process 1856 consent.exe 5048 iexpress.exe 1392 BitLockerWizardElev.exe 3712 raserver.exe -
Loads dropped DLL 3 IoCs
Processes:
iexpress.exeBitLockerWizardElev.exeraserver.exepid process 5048 iexpress.exe 1392 BitLockerWizardElev.exe 3712 raserver.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Eqzhtortkjjc = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Crypto\\pFt2D\\BitLockerWizardElev.exe" -
Processes:
rundll32.exeiexpress.exeBitLockerWizardElev.exeraserver.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexpress.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizardElev.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA raserver.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 3292 rundll32.exe 3292 rundll32.exe 3292 rundll32.exe 3292 rundll32.exe 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 3252 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3252 -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
description pid process target process PID 3252 wrote to memory of 1704 3252 consent.exe PID 3252 wrote to memory of 1704 3252 consent.exe PID 3252 wrote to memory of 1856 3252 consent.exe PID 3252 wrote to memory of 1856 3252 consent.exe PID 3252 wrote to memory of 3396 3252 iexpress.exe PID 3252 wrote to memory of 3396 3252 iexpress.exe PID 3252 wrote to memory of 5048 3252 iexpress.exe PID 3252 wrote to memory of 5048 3252 iexpress.exe PID 3252 wrote to memory of 3788 3252 BitLockerWizardElev.exe PID 3252 wrote to memory of 3788 3252 BitLockerWizardElev.exe PID 3252 wrote to memory of 1392 3252 BitLockerWizardElev.exe PID 3252 wrote to memory of 1392 3252 BitLockerWizardElev.exe PID 3252 wrote to memory of 3708 3252 raserver.exe PID 3252 wrote to memory of 3708 3252 raserver.exe PID 3252 wrote to memory of 3712 3252 raserver.exe PID 3252 wrote to memory of 3712 3252 raserver.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7a13e5d9c436191ec91643ba7c5a67be2e509abf4261e1ad00e3795d532bfe7b.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\consent.exeC:\Windows\system32\consent.exe1⤵
-
C:\Users\Admin\AppData\Local\cu21NxyCF\consent.exeC:\Users\Admin\AppData\Local\cu21NxyCF\consent.exe1⤵
- Executes dropped EXE
-
C:\Windows\system32\iexpress.exeC:\Windows\system32\iexpress.exe1⤵
-
C:\Users\Admin\AppData\Local\Jkmt\iexpress.exeC:\Users\Admin\AppData\Local\Jkmt\iexpress.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Users\Admin\AppData\Local\UX5xvOVKA\BitLockerWizardElev.exeC:\Users\Admin\AppData\Local\UX5xvOVKA\BitLockerWizardElev.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\BitLockerWizardElev.exeC:\Windows\system32\BitLockerWizardElev.exe1⤵
-
C:\Windows\system32\raserver.exeC:\Windows\system32\raserver.exe1⤵
-
C:\Users\Admin\AppData\Local\e4ET4Fkoo\raserver.exeC:\Users\Admin\AppData\Local\e4ET4Fkoo\raserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Jkmt\VERSION.dllFilesize
691KB
MD502300982ce9f34f490afe91d79719616
SHA11546e927a3bec9f6d4eee01502fa1e31ea55d465
SHA256c0b7706a5879dc46b4ebc1d73b0f299e13d0404cd56033c5b0005ad4125660cd
SHA5124d84344613e22599ee0a7e0787fdcbc709fef5139bbcbf124e0c104e50c24aa6a2bfc97419db1d28fe51b4a1b71bbf1b3945cd52ad2a897debde1e6cdcf7705a
-
C:\Users\Admin\AppData\Local\Jkmt\VERSION.dllFilesize
691KB
MD502300982ce9f34f490afe91d79719616
SHA11546e927a3bec9f6d4eee01502fa1e31ea55d465
SHA256c0b7706a5879dc46b4ebc1d73b0f299e13d0404cd56033c5b0005ad4125660cd
SHA5124d84344613e22599ee0a7e0787fdcbc709fef5139bbcbf124e0c104e50c24aa6a2bfc97419db1d28fe51b4a1b71bbf1b3945cd52ad2a897debde1e6cdcf7705a
-
C:\Users\Admin\AppData\Local\Jkmt\iexpress.exeFilesize
166KB
MD517b93a43e25d821d01af40ba6babcc8c
SHA197c978d78056d995f751dfef1388d7cce4cc404a
SHA256d070b79fa254c528babb73d607a7a8fd53db89795d751f42fc0a283b61a76fd3
SHA5126b5743b37a3be8ae9ee2ab84e0749c32c60544298a7cce396470aa40bbd13f2e838d5d98159f21d500d20817c51ebce4b1d2f554e3e05f6c7fc97bc9d70ea391
-
C:\Users\Admin\AppData\Local\UX5xvOVKA\BitLockerWizardElev.exeFilesize
100KB
MD58ac5a3a20cf18ae2308c64fd707eeb81
SHA131f2f0bdc2eb3e0d2a6cd626ea8ed71262865544
SHA256803eb37617d450704766cb167dc9766e82102a94940a26a988ad26ab8be3f2f5
SHA51285d0e28e4bffec709f26b2f0d20eb76373134af43bcaa70b97a03efa273b77dd4fbd4f6ee026774ce4029ab5a983aea057111efcd234ab1686a9bd0f7202748b
-
C:\Users\Admin\AppData\Local\UX5xvOVKA\FVEWIZ.dllFilesize
692KB
MD52b0541ee3512227c66806058b666c5cb
SHA1e4556f5028b25c379a1e3e2b047b18bebccf1d9f
SHA256edceda2638bd422f8a42f6c2b7c43616a5ffb4538d93ca521e6f6cf91295e0e7
SHA512c024f93e9303dddcf00b6430d193ebe9a4d9c81b5824e287c0e248e48542af6c5894cc787ebebad48850770b48e839a30050fcc24acdc112b549793885beee39
-
C:\Users\Admin\AppData\Local\UX5xvOVKA\FVEWIZ.dllFilesize
692KB
MD52b0541ee3512227c66806058b666c5cb
SHA1e4556f5028b25c379a1e3e2b047b18bebccf1d9f
SHA256edceda2638bd422f8a42f6c2b7c43616a5ffb4538d93ca521e6f6cf91295e0e7
SHA512c024f93e9303dddcf00b6430d193ebe9a4d9c81b5824e287c0e248e48542af6c5894cc787ebebad48850770b48e839a30050fcc24acdc112b549793885beee39
-
C:\Users\Admin\AppData\Local\cu21NxyCF\consent.exeFilesize
162KB
MD56646631ce4ad7128762352da81f3b030
SHA11095bd4b63360fc2968d75622aa745e5523428ab
SHA25656b2d516376328129132b815e22379ae8e7176825f059c9374a33cc844482e64
SHA5121c00ed5d8568f6ebd119524b61573cfe71ca828bd8fbdd150158ec8b5db65fa066908d120d201fce6222707bcb78e0c1151b82fdc1dccf3ada867cb810feb6da
-
C:\Users\Admin\AppData\Local\e4ET4Fkoo\WTSAPI32.dllFilesize
692KB
MD5da9dcfbf82cfccc960a99192055725fb
SHA18c7b189dc188431e7e75dfc0c3a2c603ba0e7386
SHA256343a191d3b082dbc04a1d97ffbe13d32bc55743298ac1927e07b88b0cc90e4b7
SHA51268da0ec9fdf1962a29ebe844e4bbe3c75fa8bb2e0e305f01bd958a4c5cd1524246434b2eb94360129bb383f5d23537cc95d4c8d7ecd18e8f7e782e651f07b4ae
-
C:\Users\Admin\AppData\Local\e4ET4Fkoo\WTSAPI32.dllFilesize
692KB
MD5da9dcfbf82cfccc960a99192055725fb
SHA18c7b189dc188431e7e75dfc0c3a2c603ba0e7386
SHA256343a191d3b082dbc04a1d97ffbe13d32bc55743298ac1927e07b88b0cc90e4b7
SHA51268da0ec9fdf1962a29ebe844e4bbe3c75fa8bb2e0e305f01bd958a4c5cd1524246434b2eb94360129bb383f5d23537cc95d4c8d7ecd18e8f7e782e651f07b4ae
-
C:\Users\Admin\AppData\Local\e4ET4Fkoo\raserver.exeFilesize
132KB
MD5d1841c6ee4ea45794ced131d4b68b60e
SHA14be6d2116060d7c723ac2d0b5504efe23198ea01
SHA25638732626242988cc5b8f97fe8d3b030d483046ef66ea90d7ea3607f1adc0600d
SHA512d8bad215872c5956c6e8acac1cd3ad19b85f72b224b068fb71cfd1493705bc7d3390853ba923a1aa461140294f8793247df018484a378e4f026c2a12cb3fa5c9
-
memory/1392-165-0x0000000000000000-mapping.dmp
-
memory/1856-155-0x0000000000000000-mapping.dmp
-
memory/3252-135-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/3252-139-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/3252-154-0x00007FFE26F90000-0x00007FFE26FA0000-memory.dmpFilesize
64KB
-
memory/3252-152-0x00007FFE2704C000-0x00007FFE2704D000-memory.dmpFilesize
4KB
-
memory/3252-142-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/3252-153-0x0000000000A50000-0x0000000000A57000-memory.dmpFilesize
28KB
-
memory/3252-138-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/3252-140-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/3252-137-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/3252-151-0x00007FFE2707C000-0x00007FFE2707D000-memory.dmpFilesize
4KB
-
memory/3252-141-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/3252-136-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/3252-134-0x0000000000A60000-0x0000000000A61000-memory.dmpFilesize
4KB
-
memory/3292-133-0x000001DF15E10000-0x000001DF15E17000-memory.dmpFilesize
28KB
-
memory/3292-130-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/3712-179-0x0000026062990000-0x0000026062997000-memory.dmpFilesize
28KB
-
memory/3712-172-0x0000000000000000-mapping.dmp
-
memory/5048-157-0x0000000000000000-mapping.dmp
-
memory/5048-164-0x00000271C2070000-0x00000271C2077000-memory.dmpFilesize
28KB
-
memory/5048-161-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB