Analysis
-
max time kernel
151s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
17-04-2022 16:35
Static task
static1
Behavioral task
behavioral1
Sample
71294290d7f4be76b77229c3e0cc626186843b3600634463711a04b7b69a4cd1.dll
Resource
win7-20220414-en
General
-
Target
71294290d7f4be76b77229c3e0cc626186843b3600634463711a04b7b69a4cd1.dll
-
Size
693KB
-
MD5
7c62918ed4a99483c0766db2fdafe75c
-
SHA1
2bee00c0b9ee71667da7a7ec57aac1d0cca147d0
-
SHA256
71294290d7f4be76b77229c3e0cc626186843b3600634463711a04b7b69a4cd1
-
SHA512
b76cd8d4b5a27cc6ad17ff1a17c80f2f5bc182f6594a214df7eee4ceec339ad78014fdf6afddf1f4e6be3bc78248c02344f27b0c96d86d49d86b4cd191af5cc4
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2908-130-0x0000000140000000-0x00000001400B2000-memory.dmp dridex_payload behavioral2/memory/4224-159-0x0000000140000000-0x00000001400B3000-memory.dmp dridex_payload behavioral2/memory/4588-168-0x0000000140000000-0x00000001400B4000-memory.dmp dridex_payload behavioral2/memory/3848-176-0x0000000140000000-0x00000001400B9000-memory.dmp dridex_payload -
Processes:
resource yara_rule behavioral2/memory/796-134-0x0000000000D00000-0x0000000000D01000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
psr.exemspaint.exeshrpubw.exepid process 4224 psr.exe 4588 mspaint.exe 3848 shrpubw.exe -
Loads dropped DLL 3 IoCs
Processes:
psr.exemspaint.exeshrpubw.exepid process 4224 psr.exe 4588 mspaint.exe 3848 shrpubw.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2632097139-1792035885-811742494-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Wurgjldbctt = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\WINDOW~1\\HtjA0\\mspaint.exe" -
Processes:
rundll32.exepsr.exemspaint.exeshrpubw.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA psr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mspaint.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA shrpubw.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 2908 rundll32.exe 2908 rundll32.exe 2908 rundll32.exe 2908 rundll32.exe 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 796 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 796 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 796 wrote to memory of 4208 796 psr.exe PID 796 wrote to memory of 4208 796 psr.exe PID 796 wrote to memory of 4224 796 psr.exe PID 796 wrote to memory of 4224 796 psr.exe PID 796 wrote to memory of 4624 796 mspaint.exe PID 796 wrote to memory of 4624 796 mspaint.exe PID 796 wrote to memory of 4588 796 mspaint.exe PID 796 wrote to memory of 4588 796 mspaint.exe PID 796 wrote to memory of 3192 796 shrpubw.exe PID 796 wrote to memory of 3192 796 shrpubw.exe PID 796 wrote to memory of 3848 796 shrpubw.exe PID 796 wrote to memory of 3848 796 shrpubw.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\71294290d7f4be76b77229c3e0cc626186843b3600634463711a04b7b69a4cd1.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\psr.exeC:\Windows\system32\psr.exe1⤵
-
C:\Users\Admin\AppData\Local\k2uMHW\psr.exeC:\Users\Admin\AppData\Local\k2uMHW\psr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\mspaint.exeC:\Windows\system32\mspaint.exe1⤵
-
C:\Users\Admin\AppData\Local\GkPwS\mspaint.exeC:\Users\Admin\AppData\Local\GkPwS\mspaint.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\shrpubw.exeC:\Windows\system32\shrpubw.exe1⤵
-
C:\Users\Admin\AppData\Local\y7NrNBKl\shrpubw.exeC:\Users\Admin\AppData\Local\y7NrNBKl\shrpubw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\GkPwS\WINMM.dllFilesize
698KB
MD54c82fc2dec71bff2211056c1d11d5140
SHA1cb92d60a943bfc372b4ab17a43f563184e7e4839
SHA2563846955389682be2e669c2e7a1924d17622ee6573e3d7faacc534913fb7b111f
SHA5121c8ad1556c987090edad4a1c228921627e68e254fcb7f1885d267c7d3e9c1e45e401d35ef0875c6ee2eaf219849b93e775b77fa69b58b0282206cc14b9dbe824
-
C:\Users\Admin\AppData\Local\GkPwS\WINMM.dllFilesize
698KB
MD54c82fc2dec71bff2211056c1d11d5140
SHA1cb92d60a943bfc372b4ab17a43f563184e7e4839
SHA2563846955389682be2e669c2e7a1924d17622ee6573e3d7faacc534913fb7b111f
SHA5121c8ad1556c987090edad4a1c228921627e68e254fcb7f1885d267c7d3e9c1e45e401d35ef0875c6ee2eaf219849b93e775b77fa69b58b0282206cc14b9dbe824
-
C:\Users\Admin\AppData\Local\GkPwS\mspaint.exeFilesize
965KB
MD5f221a4ccafec690101c59f726c95b646
SHA12098e4b62eaab213cbee73ba40fe4f1b8901a782
SHA25694aa32a2c9c1d2db78318d9c68262c2f834abe26b6e9a661700324b55fdd5709
SHA5128e3f4e4f68565ef09f5e762d6bb41b160711bbacac9dfcbe33edea9885fd042e6ce9a248bfcc62f9cffdb8e6bbe1b04c89bd41fcd9a373a5c8bc7bbff96dceaf
-
C:\Users\Admin\AppData\Local\GkPwS\mspaint.exeFilesize
965KB
MD5f221a4ccafec690101c59f726c95b646
SHA12098e4b62eaab213cbee73ba40fe4f1b8901a782
SHA25694aa32a2c9c1d2db78318d9c68262c2f834abe26b6e9a661700324b55fdd5709
SHA5128e3f4e4f68565ef09f5e762d6bb41b160711bbacac9dfcbe33edea9885fd042e6ce9a248bfcc62f9cffdb8e6bbe1b04c89bd41fcd9a373a5c8bc7bbff96dceaf
-
C:\Users\Admin\AppData\Local\k2uMHW\XmlLite.dllFilesize
694KB
MD5951d8d0281e6f189a0912af417b645a2
SHA1de7df8b052890b42d2d91490ddaea2d241a3845c
SHA2564c82236167c0d1191900cbd214b6003d491ee8ccb7c3f0ebcb7afc40dc0f4463
SHA5127df8995c1eebae5883eabb7332d518cf7532405e70e8c7201d9708f49e44782516601e2df9357ecb6a00f7a110ccb5814906b6308056d24f7c9fcaa7de06d281
-
C:\Users\Admin\AppData\Local\k2uMHW\XmlLite.dllFilesize
694KB
MD5951d8d0281e6f189a0912af417b645a2
SHA1de7df8b052890b42d2d91490ddaea2d241a3845c
SHA2564c82236167c0d1191900cbd214b6003d491ee8ccb7c3f0ebcb7afc40dc0f4463
SHA5127df8995c1eebae5883eabb7332d518cf7532405e70e8c7201d9708f49e44782516601e2df9357ecb6a00f7a110ccb5814906b6308056d24f7c9fcaa7de06d281
-
C:\Users\Admin\AppData\Local\k2uMHW\psr.exeFilesize
232KB
MD5ad53ead5379985081b7c3f1f357e545a
SHA16f5aa32c1d15fbf073558fadafd046d97b60184e
SHA2564f0144f0e3e721b44babbf41b513942e4117f730546105480571f9c8fce56a1f
SHA512433098bd74c34fbadfa447ef45cfa9dc076aef4cf7f2a0a6fe79d5e67f2504eebe8aa31fc1b7a4c5eeb20ede2c5485f75ad0fd77b4ecba3d68ca63313e6f6ea0
-
C:\Users\Admin\AppData\Local\y7NrNBKl\MFC42u.dllFilesize
721KB
MD502775478e9eb0d2483939ba961607260
SHA1a15816935c6f62c188f783871a122f44a06dc48e
SHA2564fc1890290df54d5e963d560ea28e05792be30a6e658f00142318bb6df81c7ff
SHA512c9fb2def7246127d6b60014903e761c2f701f764ebb96991f2ebd02903ed7cbb2f5c487e972c55557aceaed81583c636ab65b47f38cca87117b9d9f0685006ed
-
C:\Users\Admin\AppData\Local\y7NrNBKl\MFC42u.dllFilesize
721KB
MD502775478e9eb0d2483939ba961607260
SHA1a15816935c6f62c188f783871a122f44a06dc48e
SHA2564fc1890290df54d5e963d560ea28e05792be30a6e658f00142318bb6df81c7ff
SHA512c9fb2def7246127d6b60014903e761c2f701f764ebb96991f2ebd02903ed7cbb2f5c487e972c55557aceaed81583c636ab65b47f38cca87117b9d9f0685006ed
-
C:\Users\Admin\AppData\Local\y7NrNBKl\shrpubw.exeFilesize
59KB
MD59910d5c62428ec5f92b04abf9428eec9
SHA105f27d7515e8ae1fa3bc974ec65b864ec4c9ac8b
SHA2566b84e6e55d8572d7edf0b6243d00abb651fcb0cddddac8461de5f9bb80035a2e
SHA51201be043f7ff879a683e53962eec58456ba200d6787ea66581bb62669ae65d5e58a5577cdf23441165f7a535fce1dec933e3ad2465c72172b4a1488b24ce722cb
-
memory/796-140-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/796-151-0x00007FFBC2E9C000-0x00007FFBC2E9D000-memory.dmpFilesize
4KB
-
memory/796-152-0x00007FFBC2E6C000-0x00007FFBC2E6D000-memory.dmpFilesize
4KB
-
memory/796-153-0x0000000000B00000-0x0000000000B07000-memory.dmpFilesize
28KB
-
memory/796-154-0x00007FFBC2DB0000-0x00007FFBC2DC0000-memory.dmpFilesize
64KB
-
memory/796-141-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/796-142-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/796-138-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/796-137-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/796-134-0x0000000000D00000-0x0000000000D01000-memory.dmpFilesize
4KB
-
memory/796-139-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/796-135-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/796-136-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/2908-133-0x00000188DCAF0000-0x00000188DCAF7000-memory.dmpFilesize
28KB
-
memory/2908-130-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/3848-172-0x0000000000000000-mapping.dmp
-
memory/3848-176-0x0000000140000000-0x00000001400B9000-memory.dmpFilesize
740KB
-
memory/3848-179-0x0000024324160000-0x0000024324167000-memory.dmpFilesize
28KB
-
memory/4224-162-0x0000022A06390000-0x0000022A06397000-memory.dmpFilesize
28KB
-
memory/4224-159-0x0000000140000000-0x00000001400B3000-memory.dmpFilesize
716KB
-
memory/4224-155-0x0000000000000000-mapping.dmp
-
memory/4588-163-0x0000000000000000-mapping.dmp
-
memory/4588-168-0x0000000140000000-0x00000001400B4000-memory.dmpFilesize
720KB
-
memory/4588-171-0x00000166F9340000-0x00000166F9347000-memory.dmpFilesize
28KB