Analysis
-
max time kernel
186s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
17-04-2022 16:35
Static task
static1
Behavioral task
behavioral1
Sample
7589df6fc73705e680ebb569b62e9ac1517ed7f50ce4131e7fde26cdbacc9db2.dll
Resource
win7-20220414-en
General
-
Target
7589df6fc73705e680ebb569b62e9ac1517ed7f50ce4131e7fde26cdbacc9db2.dll
-
Size
693KB
-
MD5
08a19101e1128428702d7dd9f509bebd
-
SHA1
0d69fcb18412ad3216ce0ba4d8a3fdf36510d5c7
-
SHA256
7589df6fc73705e680ebb569b62e9ac1517ed7f50ce4131e7fde26cdbacc9db2
-
SHA512
12a9fe8a62323b65a9c0a85f29fb05eaba22c557b5e7bbc246c3092ea17f5bd4be7a61596d3b597c447ac33d3dd6b649c40b462571c2e825d990ffdbd0d8cb28
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1912-54-0x0000000140000000-0x00000001400B2000-memory.dmp dridex_payload behavioral1/memory/608-82-0x0000000140000000-0x00000001400B3000-memory.dmp dridex_payload behavioral1/memory/1268-92-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload -
Processes:
resource yara_rule behavioral1/memory/1292-58-0x00000000021D0000-0x00000000021D1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
rdpinit.exemspaint.exeunregmp2.exepid process 608 rdpinit.exe 1268 mspaint.exe 1472 unregmp2.exe -
Loads dropped DLL 7 IoCs
Processes:
rdpinit.exemspaint.exeunregmp2.exepid process 1292 608 rdpinit.exe 1292 1268 mspaint.exe 1292 1472 unregmp2.exe 1292 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\Evgmngveltmlhb = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\ACCESS~1\\Qade6F\\mspaint.exe" -
Processes:
rundll32.exerdpinit.exemspaint.exeunregmp2.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpinit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mspaint.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA unregmp2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exerdpinit.exemspaint.exeunregmp2.exepid process 1912 rundll32.exe 1912 rundll32.exe 1912 rundll32.exe 1292 1292 1292 1292 1292 1292 1292 1292 1292 1292 1292 1292 1292 1292 1292 1292 1292 1292 1292 1292 1292 608 rdpinit.exe 608 rdpinit.exe 1292 1292 1292 1292 1292 1292 1292 1292 1292 1292 1292 1292 1292 1292 1292 1292 1292 1292 1292 1292 1268 mspaint.exe 1268 mspaint.exe 1292 1292 1292 1292 1292 1292 1292 1292 1292 1472 unregmp2.exe 1472 unregmp2.exe 1292 1292 1292 1292 1292 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 1292 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1292 wrote to memory of 1700 1292 rdpinit.exe PID 1292 wrote to memory of 1700 1292 rdpinit.exe PID 1292 wrote to memory of 1700 1292 rdpinit.exe PID 1292 wrote to memory of 608 1292 rdpinit.exe PID 1292 wrote to memory of 608 1292 rdpinit.exe PID 1292 wrote to memory of 608 1292 rdpinit.exe PID 1292 wrote to memory of 1648 1292 mspaint.exe PID 1292 wrote to memory of 1648 1292 mspaint.exe PID 1292 wrote to memory of 1648 1292 mspaint.exe PID 1292 wrote to memory of 1268 1292 mspaint.exe PID 1292 wrote to memory of 1268 1292 mspaint.exe PID 1292 wrote to memory of 1268 1292 mspaint.exe PID 1292 wrote to memory of 1752 1292 unregmp2.exe PID 1292 wrote to memory of 1752 1292 unregmp2.exe PID 1292 wrote to memory of 1752 1292 unregmp2.exe PID 1292 wrote to memory of 1472 1292 unregmp2.exe PID 1292 wrote to memory of 1472 1292 unregmp2.exe PID 1292 wrote to memory of 1472 1292 unregmp2.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7589df6fc73705e680ebb569b62e9ac1517ed7f50ce4131e7fde26cdbacc9db2.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\rdpinit.exeC:\Windows\system32\rdpinit.exe1⤵
-
C:\Users\Admin\AppData\Local\qp5Uptb\rdpinit.exeC:\Users\Admin\AppData\Local\qp5Uptb\rdpinit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\mspaint.exeC:\Windows\system32\mspaint.exe1⤵
-
C:\Users\Admin\AppData\Local\kv4A6fK\mspaint.exeC:\Users\Admin\AppData\Local\kv4A6fK\mspaint.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\unregmp2.exeC:\Windows\system32\unregmp2.exe1⤵
-
C:\Users\Admin\AppData\Local\dfpg8\unregmp2.exeC:\Users\Admin\AppData\Local\dfpg8\unregmp2.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\dfpg8\slc.dllFilesize
695KB
MD5b35bfa28aa2ff25d3e151160bfcb5369
SHA1ac5f132d3018aa98259dc3ea1ddb05509305c2b8
SHA256cb89dab3026cfa1c29f2a26f571c3d1ab041ddf485abd4cb2de065d0c5275bb7
SHA512b32ac849b3f22c1ff0c8b98fa7c7c3f30b85380eeb2524116940ea93f71bc51f53be165fb93c97a94c848ec73888ffe678de6fe8873cbc5b472bfe0bf3d8197d
-
C:\Users\Admin\AppData\Local\dfpg8\unregmp2.exeFilesize
316KB
MD564b328d52dfc8cda123093e3f6e4c37c
SHA1f68f45b21b911906f3aa982e64504e662a92e5ab
SHA2567d6be433ba7dd4a2b8f8b79d7b87055da8daafa3e0404432d40469c39c2040e1
SHA512e29fc068532df36f39c86b79392b5c6191de6f69b7beaba28f9ac96a26089b341b770ff29556eca14f57afd1de59a6f3726818482d6861bdd8ac556ae768df00
-
C:\Users\Admin\AppData\Local\kv4A6fK\WINMM.dllFilesize
699KB
MD5f7a65c44f491621d64b8749209483f6c
SHA1bba374105f6bb0cf56e876369cc238c8121cedff
SHA2560070f92d65fa1817a7335d614521533bf2b7018c3759ccc2212813450a9f3552
SHA512e5d73014f9bd27934d1744433432541711b176c63c69eeda81fcae0a5497efdab16a5f0c3c71bd95b902a0cd9fe005a9ee223878c48110071525e0ef079211a3
-
C:\Users\Admin\AppData\Local\kv4A6fK\mspaint.exeFilesize
6.4MB
MD5458f4590f80563eb2a0a72709bfc2bd9
SHA13f97dc3bd1467c710c6a8d26b97bb6cf47deb4c6
SHA256ff923c051ae380bf30d749ebe9cf310ccab6572d84eb81b76fb1012bcbdf557f
SHA512e34500658dbe105a704fff6988b75d13aa9931adfd585b8ce1f023c61abd573d58067ee1f43e80076729ba99c9a00c17eb8cfcfac9c3d271d76bd251ccab1681
-
C:\Users\Admin\AppData\Local\qp5Uptb\WTSAPI32.dllFilesize
696KB
MD51412831643187cee9926e95e3d14c1fd
SHA10c662f819f4803caaa5262c17fd4fa24beada925
SHA256a1a8b0ebf30bc1e6e41438348148e2b6918cd0d806033a2699dd8ae329f7d4f3
SHA5127f1526a648a9f0b4f062ca6051d365be296259c514ee37caec71add3630e1b7b8a42ebd421af06cdeb649cd3417de8d7d5a4e3d30d263131b3bb38ac910d7d42
-
C:\Users\Admin\AppData\Local\qp5Uptb\rdpinit.exeFilesize
174KB
MD5664e12e0ea009cc98c2b578ff4983c62
SHA127b302c0108851ac6cc37e56590dd9074b09c3c9
SHA25600bd9c3c941a5a9b4fc8594d7b985f5f1ac48f0ba7495a728b8fa42b4b48a332
SHA512f5eee4e924dcc3cf5e82eff36543e9d0e9c17dc2272b403cf30f8d2da42312821f5566249a98a952f5441b1f0d6d61a86b5c5198bc598d65ea9d4fb35822505d
-
\Users\Admin\AppData\Local\dfpg8\slc.dllFilesize
695KB
MD5b35bfa28aa2ff25d3e151160bfcb5369
SHA1ac5f132d3018aa98259dc3ea1ddb05509305c2b8
SHA256cb89dab3026cfa1c29f2a26f571c3d1ab041ddf485abd4cb2de065d0c5275bb7
SHA512b32ac849b3f22c1ff0c8b98fa7c7c3f30b85380eeb2524116940ea93f71bc51f53be165fb93c97a94c848ec73888ffe678de6fe8873cbc5b472bfe0bf3d8197d
-
\Users\Admin\AppData\Local\dfpg8\unregmp2.exeFilesize
316KB
MD564b328d52dfc8cda123093e3f6e4c37c
SHA1f68f45b21b911906f3aa982e64504e662a92e5ab
SHA2567d6be433ba7dd4a2b8f8b79d7b87055da8daafa3e0404432d40469c39c2040e1
SHA512e29fc068532df36f39c86b79392b5c6191de6f69b7beaba28f9ac96a26089b341b770ff29556eca14f57afd1de59a6f3726818482d6861bdd8ac556ae768df00
-
\Users\Admin\AppData\Local\kv4A6fK\WINMM.dllFilesize
699KB
MD5f7a65c44f491621d64b8749209483f6c
SHA1bba374105f6bb0cf56e876369cc238c8121cedff
SHA2560070f92d65fa1817a7335d614521533bf2b7018c3759ccc2212813450a9f3552
SHA512e5d73014f9bd27934d1744433432541711b176c63c69eeda81fcae0a5497efdab16a5f0c3c71bd95b902a0cd9fe005a9ee223878c48110071525e0ef079211a3
-
\Users\Admin\AppData\Local\kv4A6fK\mspaint.exeFilesize
6.4MB
MD5458f4590f80563eb2a0a72709bfc2bd9
SHA13f97dc3bd1467c710c6a8d26b97bb6cf47deb4c6
SHA256ff923c051ae380bf30d749ebe9cf310ccab6572d84eb81b76fb1012bcbdf557f
SHA512e34500658dbe105a704fff6988b75d13aa9931adfd585b8ce1f023c61abd573d58067ee1f43e80076729ba99c9a00c17eb8cfcfac9c3d271d76bd251ccab1681
-
\Users\Admin\AppData\Local\qp5Uptb\WTSAPI32.dllFilesize
696KB
MD51412831643187cee9926e95e3d14c1fd
SHA10c662f819f4803caaa5262c17fd4fa24beada925
SHA256a1a8b0ebf30bc1e6e41438348148e2b6918cd0d806033a2699dd8ae329f7d4f3
SHA5127f1526a648a9f0b4f062ca6051d365be296259c514ee37caec71add3630e1b7b8a42ebd421af06cdeb649cd3417de8d7d5a4e3d30d263131b3bb38ac910d7d42
-
\Users\Admin\AppData\Local\qp5Uptb\rdpinit.exeFilesize
174KB
MD5664e12e0ea009cc98c2b578ff4983c62
SHA127b302c0108851ac6cc37e56590dd9074b09c3c9
SHA25600bd9c3c941a5a9b4fc8594d7b985f5f1ac48f0ba7495a728b8fa42b4b48a332
SHA512f5eee4e924dcc3cf5e82eff36543e9d0e9c17dc2272b403cf30f8d2da42312821f5566249a98a952f5441b1f0d6d61a86b5c5198bc598d65ea9d4fb35822505d
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\fIo36Bf78Kd\unregmp2.exeFilesize
316KB
MD564b328d52dfc8cda123093e3f6e4c37c
SHA1f68f45b21b911906f3aa982e64504e662a92e5ab
SHA2567d6be433ba7dd4a2b8f8b79d7b87055da8daafa3e0404432d40469c39c2040e1
SHA512e29fc068532df36f39c86b79392b5c6191de6f69b7beaba28f9ac96a26089b341b770ff29556eca14f57afd1de59a6f3726818482d6861bdd8ac556ae768df00
-
memory/608-85-0x0000000000170000-0x0000000000177000-memory.dmpFilesize
28KB
-
memory/608-82-0x0000000140000000-0x00000001400B3000-memory.dmpFilesize
716KB
-
memory/608-78-0x0000000000000000-mapping.dmp
-
memory/1268-92-0x0000000140000000-0x00000001400B4000-memory.dmpFilesize
720KB
-
memory/1268-87-0x0000000000000000-mapping.dmp
-
memory/1268-95-0x0000000000120000-0x0000000000127000-memory.dmpFilesize
28KB
-
memory/1268-89-0x000007FEFBF21000-0x000007FEFBF23000-memory.dmpFilesize
8KB
-
memory/1292-65-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/1292-75-0x00000000021B0000-0x00000000021B7000-memory.dmpFilesize
28KB
-
memory/1292-60-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/1292-76-0x0000000077880000-0x0000000077882000-memory.dmpFilesize
8KB
-
memory/1292-59-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/1292-62-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/1292-61-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/1292-66-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/1292-64-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/1292-63-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/1292-58-0x00000000021D0000-0x00000000021D1000-memory.dmpFilesize
4KB
-
memory/1472-97-0x0000000000000000-mapping.dmp
-
memory/1472-104-0x00000000000F0000-0x00000000000F7000-memory.dmpFilesize
28KB
-
memory/1912-57-0x0000000000290000-0x0000000000297000-memory.dmpFilesize
28KB
-
memory/1912-54-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB