Analysis
-
max time kernel
150s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
17-04-2022 16:35
Static task
static1
Behavioral task
behavioral1
Sample
310fd238e3d99b5a9baf0c0be09026caa8c720076c2af2438ac534146506d7d3.dll
Resource
win7-20220414-en
General
-
Target
310fd238e3d99b5a9baf0c0be09026caa8c720076c2af2438ac534146506d7d3.dll
-
Size
689KB
-
MD5
dd97fd4acc0e239912f4bc617c5ed95e
-
SHA1
daf31e92ca109a223f1e73377cd9e5cc65e8a6bf
-
SHA256
310fd238e3d99b5a9baf0c0be09026caa8c720076c2af2438ac534146506d7d3
-
SHA512
69c8f2f00800b59125496a5801450405d54d932d9094bb05fdc22d2f3e03af2efbfc1e630eb4b2d6e309cb9efac0e33bacfcb6f1ddba289f2da28c9ff98217dc
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1868-54-0x0000000140000000-0x00000001400B1000-memory.dmp dridex_payload behavioral1/memory/1692-80-0x0000000140000000-0x00000001400B2000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
BitLockerWizardElev.exemsdt.exeraserver.exepid process 1692 BitLockerWizardElev.exe 1656 msdt.exe 2012 raserver.exe -
Loads dropped DLL 7 IoCs
Processes:
BitLockerWizardElev.exemsdt.exeraserver.exepid process 1208 1692 BitLockerWizardElev.exe 1208 1656 msdt.exe 1208 2012 raserver.exe 1208 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-790309383-526510583-3802439154-1000\Software\Microsoft\Windows\CurrentVersion\Run\Lwausnzctoco = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\QUICKL~1\\USERPI~1\\GVPlRAh\\msdt.exe" -
Processes:
BitLockerWizardElev.exemsdt.exeraserver.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BitLockerWizardElev.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msdt.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA raserver.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exeBitLockerWizardElev.exemsdt.exeraserver.exepid process 1868 rundll32.exe 1868 rundll32.exe 1868 rundll32.exe 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1692 BitLockerWizardElev.exe 1692 BitLockerWizardElev.exe 1208 1208 1208 1208 1208 1208 1208 1208 1656 msdt.exe 1656 msdt.exe 1208 1208 1208 1208 1208 2012 raserver.exe 2012 raserver.exe 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 1208 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1208 wrote to memory of 976 1208 BitLockerWizardElev.exe PID 1208 wrote to memory of 976 1208 BitLockerWizardElev.exe PID 1208 wrote to memory of 976 1208 BitLockerWizardElev.exe PID 1208 wrote to memory of 1692 1208 BitLockerWizardElev.exe PID 1208 wrote to memory of 1692 1208 BitLockerWizardElev.exe PID 1208 wrote to memory of 1692 1208 BitLockerWizardElev.exe PID 1208 wrote to memory of 1004 1208 msdt.exe PID 1208 wrote to memory of 1004 1208 msdt.exe PID 1208 wrote to memory of 1004 1208 msdt.exe PID 1208 wrote to memory of 1656 1208 msdt.exe PID 1208 wrote to memory of 1656 1208 msdt.exe PID 1208 wrote to memory of 1656 1208 msdt.exe PID 1208 wrote to memory of 828 1208 raserver.exe PID 1208 wrote to memory of 828 1208 raserver.exe PID 1208 wrote to memory of 828 1208 raserver.exe PID 1208 wrote to memory of 2012 1208 raserver.exe PID 1208 wrote to memory of 2012 1208 raserver.exe PID 1208 wrote to memory of 2012 1208 raserver.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\310fd238e3d99b5a9baf0c0be09026caa8c720076c2af2438ac534146506d7d3.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\BitLockerWizardElev.exeC:\Windows\system32\BitLockerWizardElev.exe1⤵
-
C:\Users\Admin\AppData\Local\t2EZ8\BitLockerWizardElev.exeC:\Users\Admin\AppData\Local\t2EZ8\BitLockerWizardElev.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\msdt.exeC:\Windows\system32\msdt.exe1⤵
-
C:\Users\Admin\AppData\Local\zGBumj9L\msdt.exeC:\Users\Admin\AppData\Local\zGBumj9L\msdt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\raserver.exeC:\Windows\system32\raserver.exe1⤵
-
C:\Users\Admin\AppData\Local\fxBM3Lv9\raserver.exeC:\Users\Admin\AppData\Local\fxBM3Lv9\raserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\fxBM3Lv9\WTSAPI32.dllFilesize
691KB
MD575fd3d496696f334a292833634d88bd7
SHA1f88342db2363ee31a74fd3d089737e7e02995710
SHA256076d9753820bee4585530f354978bb01f9c6a398901f352e50004ffe7567f270
SHA5120e63b19877c263348700186bfeb2fcfd83144353a4bcaa8fe664b53596628a55d0adfaf97f73b6561bc9d1cd4ce0908806752ef05866a7debccdb8e3d551a31d
-
C:\Users\Admin\AppData\Local\fxBM3Lv9\raserver.exeFilesize
123KB
MD5cd0bc0b6b8d219808aea3ecd4e889b19
SHA19f8f4071ce2484008e36fdfd963378f4ebad703f
SHA25616abc530c0367df1ad631f09e14c565cf99561949aa14acc533cd54bf8a5e22c
SHA51284291ea3fafb38ef96817d5fe4a972475ef8ea24a4353568029e892fa8e15cf8e8f6ef4ff567813cd3b38092f0db4577d9dccb22be755eebdd4f77e623dc80ac
-
C:\Users\Admin\AppData\Local\t2EZ8\BitLockerWizardElev.exeFilesize
98KB
MD573f13d791e36d3486743244f16875239
SHA1ed5ec55dbc6b3bda505f0a4c699c257c90c02020
SHA2562483d2f0ad481005cca081a86a07be9060bc6d4769c4570f92ad96fa325be9b8
SHA512911a7b532312d50cc5e7f6a046d46ab5b322aa17ce59a40477173ea50f000a95db45f169f4ea3574e3e00ae4234b9f8363ac79329d683c14ebee1d423e6e43af
-
C:\Users\Admin\AppData\Local\t2EZ8\FVEWIZ.dllFilesize
691KB
MD5636e3eb28c8fdab2aca6ef63ca916502
SHA183be35af1672b3b3a48718b9bb694e4bf5656386
SHA256ab5193e17cf43df42874b94a3b0c6b53d932f3749ad7da4e975e40cfc499f749
SHA512eb51cb8ebe9af17c8ebdd2db15ba7b2eb3f0460cb6232f1d35f9b122406dd35ba17958a9313a34fbbbfeda60b9f35dcd72b6ba78483b7050c75665527c4b5fce
-
C:\Users\Admin\AppData\Local\zGBumj9L\Secur32.dllFilesize
693KB
MD59b5576cefb97dbdd1a6f0dcbad1aa8c1
SHA1120fa74039053cb2181969493a6b34979cac5545
SHA256eed41a156f0012e3596e35bbe55c5c970045e0eeb4781cee135c728480243f78
SHA5127a00c85053093eb63cc912af83f38b368bc3fd87ed43614c84dc011b7b7cfc53a862958bdf3909c068eb58bad996e5450c4bf77dd171d17f8b234a07511d6b91
-
C:\Users\Admin\AppData\Local\zGBumj9L\msdt.exeFilesize
1.0MB
MD5aecb7b09566b1f83f61d5a4b44ae9c7e
SHA13a4a2338c6b5ac833dc87497e04fe89c5481e289
SHA256fbdbe7a2027cab237c4635ef71c1a93cf7afc4b79d56b63a119b7f8e3029ccf5
SHA5126e14200262e0729ebcab2226c3eac729ab5af2a4c6f4f9c3e2950cc203387d9a0a447cf38665c724d4397353931fd10064dc067e043a3579538a6144e33e4746
-
\Users\Admin\AppData\Local\fxBM3Lv9\WTSAPI32.dllFilesize
691KB
MD575fd3d496696f334a292833634d88bd7
SHA1f88342db2363ee31a74fd3d089737e7e02995710
SHA256076d9753820bee4585530f354978bb01f9c6a398901f352e50004ffe7567f270
SHA5120e63b19877c263348700186bfeb2fcfd83144353a4bcaa8fe664b53596628a55d0adfaf97f73b6561bc9d1cd4ce0908806752ef05866a7debccdb8e3d551a31d
-
\Users\Admin\AppData\Local\fxBM3Lv9\raserver.exeFilesize
123KB
MD5cd0bc0b6b8d219808aea3ecd4e889b19
SHA19f8f4071ce2484008e36fdfd963378f4ebad703f
SHA25616abc530c0367df1ad631f09e14c565cf99561949aa14acc533cd54bf8a5e22c
SHA51284291ea3fafb38ef96817d5fe4a972475ef8ea24a4353568029e892fa8e15cf8e8f6ef4ff567813cd3b38092f0db4577d9dccb22be755eebdd4f77e623dc80ac
-
\Users\Admin\AppData\Local\t2EZ8\BitLockerWizardElev.exeFilesize
98KB
MD573f13d791e36d3486743244f16875239
SHA1ed5ec55dbc6b3bda505f0a4c699c257c90c02020
SHA2562483d2f0ad481005cca081a86a07be9060bc6d4769c4570f92ad96fa325be9b8
SHA512911a7b532312d50cc5e7f6a046d46ab5b322aa17ce59a40477173ea50f000a95db45f169f4ea3574e3e00ae4234b9f8363ac79329d683c14ebee1d423e6e43af
-
\Users\Admin\AppData\Local\t2EZ8\FVEWIZ.dllFilesize
691KB
MD5636e3eb28c8fdab2aca6ef63ca916502
SHA183be35af1672b3b3a48718b9bb694e4bf5656386
SHA256ab5193e17cf43df42874b94a3b0c6b53d932f3749ad7da4e975e40cfc499f749
SHA512eb51cb8ebe9af17c8ebdd2db15ba7b2eb3f0460cb6232f1d35f9b122406dd35ba17958a9313a34fbbbfeda60b9f35dcd72b6ba78483b7050c75665527c4b5fce
-
\Users\Admin\AppData\Local\zGBumj9L\Secur32.dllFilesize
693KB
MD59b5576cefb97dbdd1a6f0dcbad1aa8c1
SHA1120fa74039053cb2181969493a6b34979cac5545
SHA256eed41a156f0012e3596e35bbe55c5c970045e0eeb4781cee135c728480243f78
SHA5127a00c85053093eb63cc912af83f38b368bc3fd87ed43614c84dc011b7b7cfc53a862958bdf3909c068eb58bad996e5450c4bf77dd171d17f8b234a07511d6b91
-
\Users\Admin\AppData\Local\zGBumj9L\msdt.exeFilesize
1.0MB
MD5aecb7b09566b1f83f61d5a4b44ae9c7e
SHA13a4a2338c6b5ac833dc87497e04fe89c5481e289
SHA256fbdbe7a2027cab237c4635ef71c1a93cf7afc4b79d56b63a119b7f8e3029ccf5
SHA5126e14200262e0729ebcab2226c3eac729ab5af2a4c6f4f9c3e2950cc203387d9a0a447cf38665c724d4397353931fd10064dc067e043a3579538a6144e33e4746
-
\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\UserData\GIpa2pKb5dR\raserver.exeFilesize
123KB
MD5cd0bc0b6b8d219808aea3ecd4e889b19
SHA19f8f4071ce2484008e36fdfd963378f4ebad703f
SHA25616abc530c0367df1ad631f09e14c565cf99561949aa14acc533cd54bf8a5e22c
SHA51284291ea3fafb38ef96817d5fe4a972475ef8ea24a4353568029e892fa8e15cf8e8f6ef4ff567813cd3b38092f0db4577d9dccb22be755eebdd4f77e623dc80ac
-
memory/1208-63-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1208-64-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1208-74-0x00000000025C0000-0x00000000025C7000-memory.dmpFilesize
28KB
-
memory/1208-59-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1208-60-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1208-65-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1208-62-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1208-61-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1208-58-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1656-85-0x0000000000000000-mapping.dmp
-
memory/1656-93-0x0000000000180000-0x0000000000187000-memory.dmpFilesize
28KB
-
memory/1656-87-0x000007FEFB5B1000-0x000007FEFB5B3000-memory.dmpFilesize
8KB
-
memory/1692-76-0x0000000000000000-mapping.dmp
-
memory/1692-83-0x0000000000170000-0x0000000000177000-memory.dmpFilesize
28KB
-
memory/1692-80-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/1868-54-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1868-57-0x00000000001A0000-0x00000000001A7000-memory.dmpFilesize
28KB
-
memory/2012-95-0x0000000000000000-mapping.dmp