Analysis
-
max time kernel
147s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
17-04-2022 16:35
Static task
static1
Behavioral task
behavioral1
Sample
1f10d52854a4e7eb1eb2045e481d7c4a4fa84c9f3bf698de800f055f7bfd04a9.dll
Resource
win7-20220414-en
General
-
Target
1f10d52854a4e7eb1eb2045e481d7c4a4fa84c9f3bf698de800f055f7bfd04a9.dll
-
Size
687KB
-
MD5
2dec966f89ae3919024a4515677f9ebc
-
SHA1
a0b4f328df803150f21a74e513020f2134f81a9e
-
SHA256
1f10d52854a4e7eb1eb2045e481d7c4a4fa84c9f3bf698de800f055f7bfd04a9
-
SHA512
a74825d7baadb04927367be6f2ad3bd4efb60b791ccb8eea5447dc665f1c93565b1d01d6de552a977ce8e0e5482d16801b4f6a4bfc76661c28f318982d9adae1
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/864-54-0x0000000140000000-0x00000001400B1000-memory.dmp dridex_payload behavioral1/memory/584-83-0x0000000140000000-0x00000001400B2000-memory.dmp dridex_payload behavioral1/memory/696-103-0x0000000140000000-0x00000001400B3000-memory.dmp dridex_payload -
Processes:
resource yara_rule behavioral1/memory/1376-58-0x00000000026E0000-0x00000000026E1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
wscript.exelpksetup.execalc.exepid process 584 wscript.exe 1460 lpksetup.exe 696 calc.exe -
Loads dropped DLL 8 IoCs
Processes:
wscript.exelpksetup.execalc.exepid process 1376 1376 584 wscript.exe 1376 1460 lpksetup.exe 1376 696 calc.exe 1376 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gcehmtlftxqmyqm = "C:\\Users\\Admin\\AppData\\Roaming\\Mozilla\\Km\\lpksetup.exe" -
Processes:
rundll32.exewscript.exelpksetup.execalc.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wscript.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA lpksetup.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA calc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exewscript.exelpksetup.execalc.exepid process 864 rundll32.exe 864 rundll32.exe 864 rundll32.exe 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 584 wscript.exe 584 wscript.exe 1376 1376 1376 1376 1376 1460 lpksetup.exe 1460 lpksetup.exe 1376 1376 1376 1376 1376 1376 1376 1376 696 calc.exe 696 calc.exe 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 1376 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1376 wrote to memory of 1956 1376 wscript.exe PID 1376 wrote to memory of 1956 1376 wscript.exe PID 1376 wrote to memory of 1956 1376 wscript.exe PID 1376 wrote to memory of 584 1376 wscript.exe PID 1376 wrote to memory of 584 1376 wscript.exe PID 1376 wrote to memory of 584 1376 wscript.exe PID 1376 wrote to memory of 1800 1376 lpksetup.exe PID 1376 wrote to memory of 1800 1376 lpksetup.exe PID 1376 wrote to memory of 1800 1376 lpksetup.exe PID 1376 wrote to memory of 1460 1376 lpksetup.exe PID 1376 wrote to memory of 1460 1376 lpksetup.exe PID 1376 wrote to memory of 1460 1376 lpksetup.exe PID 1376 wrote to memory of 1644 1376 calc.exe PID 1376 wrote to memory of 1644 1376 calc.exe PID 1376 wrote to memory of 1644 1376 calc.exe PID 1376 wrote to memory of 696 1376 calc.exe PID 1376 wrote to memory of 696 1376 calc.exe PID 1376 wrote to memory of 696 1376 calc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1f10d52854a4e7eb1eb2045e481d7c4a4fa84c9f3bf698de800f055f7bfd04a9.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\wscript.exeC:\Windows\system32\wscript.exe1⤵
-
C:\Users\Admin\AppData\Local\szpdr\wscript.exeC:\Users\Admin\AppData\Local\szpdr\wscript.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\lpksetup.exeC:\Windows\system32\lpksetup.exe1⤵
-
C:\Users\Admin\AppData\Local\wuo9OG3Uy\lpksetup.exeC:\Users\Admin\AppData\Local\wuo9OG3Uy\lpksetup.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\calc.exeC:\Windows\system32\calc.exe1⤵
-
C:\Users\Admin\AppData\Local\dOJ4X\calc.exeC:\Users\Admin\AppData\Local\dOJ4X\calc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\dOJ4X\WINMM.dllFilesize
693KB
MD5423413ab5e6821d67574db2d017c2267
SHA17234cd83c10ab5cba0b61779ac8b302d24d15925
SHA2567b5cf3f1a79cee374b26f0b29eaeeb0a271b27a80f5d886e133983f770feffd1
SHA512355db1b060d49ef05ac52c4b4f6aac440c90fd587004e76b426af807fe08a0f0d993b5a7f461bb5af8e101ee52d9425f5b5f029266d76e3124ae26b3c0cf8950
-
C:\Users\Admin\AppData\Local\dOJ4X\calc.exeFilesize
897KB
MD510e4a1d2132ccb5c6759f038cdb6f3c9
SHA142d36eeb2140441b48287b7cd30b38105986d68f
SHA256c6a91cba00bf87cdb064c49adaac82255cbec6fdd48fd21f9b3b96abf019916b
SHA5129bd44afb164ab3e09a784c765cd03838d2e5f696c549fc233eb5a69cada47a8e1fb62095568cb272a80da579d9d0e124b1c27cf61bb2ac8cf6e584a722d8864d
-
C:\Users\Admin\AppData\Local\szpdr\VERSION.dllFilesize
688KB
MD5c1b7eec93166179b8e2ead5f5b9fff80
SHA1895ba485e6700792477f96591be892b6dffc65e5
SHA2566b47f37c426555a0e79acf8cad9597e6bc062aae88d37ba8a5d2e9e7f8a7209f
SHA5120fe2d062861c54b994ae9d1671db0d19c520987f5eca985b39d773b8f9cc4484161a68efe9102fdcc10e1c7940f229665694fb6e83b4e3d2085e18dfb81aa343
-
C:\Users\Admin\AppData\Local\szpdr\wscript.exeFilesize
165KB
MD58886e0697b0a93c521f99099ef643450
SHA1851bd390bf559e702b8323062dbeb251d9f2f6f7
SHA256d73f7ee4e6e992a618d02580bdbf4fd6ba7c683d110928001092f4073341e95f
SHA512fc4a176f49a69c5600c427af72d3d274cfeacef48612b18cda966c3b4dda0b9d59c0fe8114d5ed8e0fec780744346e2cd503d1fd15c0c908908d067214b9d837
-
C:\Users\Admin\AppData\Local\wuo9OG3Uy\dpx.dllFilesize
688KB
MD5a171b0b8774fa682878dc5ff731941f0
SHA1cc1948dc75841983aa781968f7fab6d0b7d2370f
SHA256a379eec3f60372e49a212623f003052b449625006b5cd05224de401f1e4b1ce7
SHA512b028f0bc0572f80d136045ad316e8ec60e19a20487d2043b5101c73ae988c5eebb82afe67cd4a358c771250534d7c4c59bb7de09c6c80f66c2865f892921ce07
-
C:\Users\Admin\AppData\Local\wuo9OG3Uy\lpksetup.exeFilesize
638KB
MD550d28f3f8b7c17056520c80a29efe17c
SHA11b1e62be0a0bdc9aec2e91842c35381297d8f01e
SHA25671613ea48467d1a0b00f8bcaed270b7527fc5771f540a8eb0515b3a5fdc8604f
SHA51292bc60402aacf1a62e47335adf8696a5c0d31637e624628d82b6ec1f17e1ee65ae8edf7e8dcd10933f59c892a4a74d8e461945df0991b706a4a53927c5fd3861
-
\Users\Admin\AppData\Local\dOJ4X\WINMM.dllFilesize
693KB
MD5423413ab5e6821d67574db2d017c2267
SHA17234cd83c10ab5cba0b61779ac8b302d24d15925
SHA2567b5cf3f1a79cee374b26f0b29eaeeb0a271b27a80f5d886e133983f770feffd1
SHA512355db1b060d49ef05ac52c4b4f6aac440c90fd587004e76b426af807fe08a0f0d993b5a7f461bb5af8e101ee52d9425f5b5f029266d76e3124ae26b3c0cf8950
-
\Users\Admin\AppData\Local\dOJ4X\calc.exeFilesize
897KB
MD510e4a1d2132ccb5c6759f038cdb6f3c9
SHA142d36eeb2140441b48287b7cd30b38105986d68f
SHA256c6a91cba00bf87cdb064c49adaac82255cbec6fdd48fd21f9b3b96abf019916b
SHA5129bd44afb164ab3e09a784c765cd03838d2e5f696c549fc233eb5a69cada47a8e1fb62095568cb272a80da579d9d0e124b1c27cf61bb2ac8cf6e584a722d8864d
-
\Users\Admin\AppData\Local\szpdr\VERSION.dllFilesize
688KB
MD5c1b7eec93166179b8e2ead5f5b9fff80
SHA1895ba485e6700792477f96591be892b6dffc65e5
SHA2566b47f37c426555a0e79acf8cad9597e6bc062aae88d37ba8a5d2e9e7f8a7209f
SHA5120fe2d062861c54b994ae9d1671db0d19c520987f5eca985b39d773b8f9cc4484161a68efe9102fdcc10e1c7940f229665694fb6e83b4e3d2085e18dfb81aa343
-
\Users\Admin\AppData\Local\szpdr\wscript.exeFilesize
165KB
MD58886e0697b0a93c521f99099ef643450
SHA1851bd390bf559e702b8323062dbeb251d9f2f6f7
SHA256d73f7ee4e6e992a618d02580bdbf4fd6ba7c683d110928001092f4073341e95f
SHA512fc4a176f49a69c5600c427af72d3d274cfeacef48612b18cda966c3b4dda0b9d59c0fe8114d5ed8e0fec780744346e2cd503d1fd15c0c908908d067214b9d837
-
\Users\Admin\AppData\Local\szpdr\wscript.exeFilesize
165KB
MD58886e0697b0a93c521f99099ef643450
SHA1851bd390bf559e702b8323062dbeb251d9f2f6f7
SHA256d73f7ee4e6e992a618d02580bdbf4fd6ba7c683d110928001092f4073341e95f
SHA512fc4a176f49a69c5600c427af72d3d274cfeacef48612b18cda966c3b4dda0b9d59c0fe8114d5ed8e0fec780744346e2cd503d1fd15c0c908908d067214b9d837
-
\Users\Admin\AppData\Local\wuo9OG3Uy\dpx.dllFilesize
688KB
MD5a171b0b8774fa682878dc5ff731941f0
SHA1cc1948dc75841983aa781968f7fab6d0b7d2370f
SHA256a379eec3f60372e49a212623f003052b449625006b5cd05224de401f1e4b1ce7
SHA512b028f0bc0572f80d136045ad316e8ec60e19a20487d2043b5101c73ae988c5eebb82afe67cd4a358c771250534d7c4c59bb7de09c6c80f66c2865f892921ce07
-
\Users\Admin\AppData\Local\wuo9OG3Uy\lpksetup.exeFilesize
638KB
MD550d28f3f8b7c17056520c80a29efe17c
SHA11b1e62be0a0bdc9aec2e91842c35381297d8f01e
SHA25671613ea48467d1a0b00f8bcaed270b7527fc5771f540a8eb0515b3a5fdc8604f
SHA51292bc60402aacf1a62e47335adf8696a5c0d31637e624628d82b6ec1f17e1ee65ae8edf7e8dcd10933f59c892a4a74d8e461945df0991b706a4a53927c5fd3861
-
\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\bjQ\calc.exeFilesize
897KB
MD510e4a1d2132ccb5c6759f038cdb6f3c9
SHA142d36eeb2140441b48287b7cd30b38105986d68f
SHA256c6a91cba00bf87cdb064c49adaac82255cbec6fdd48fd21f9b3b96abf019916b
SHA5129bd44afb164ab3e09a784c765cd03838d2e5f696c549fc233eb5a69cada47a8e1fb62095568cb272a80da579d9d0e124b1c27cf61bb2ac8cf6e584a722d8864d
-
memory/584-79-0x0000000000000000-mapping.dmp
-
memory/584-83-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/584-86-0x0000000000270000-0x0000000000277000-memory.dmpFilesize
28KB
-
memory/696-98-0x0000000000000000-mapping.dmp
-
memory/696-103-0x0000000140000000-0x00000001400B3000-memory.dmpFilesize
716KB
-
memory/696-106-0x0000000000080000-0x0000000000087000-memory.dmpFilesize
28KB
-
memory/864-54-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/864-57-0x00000000001A0000-0x00000000001A7000-memory.dmpFilesize
28KB
-
memory/1376-65-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1376-62-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1376-76-0x0000000077070000-0x0000000077072000-memory.dmpFilesize
8KB
-
memory/1376-72-0x00000000026C0000-0x00000000026C7000-memory.dmpFilesize
28KB
-
memory/1376-58-0x00000000026E0000-0x00000000026E1000-memory.dmpFilesize
4KB
-
memory/1376-59-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1376-66-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1376-63-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1376-64-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1376-61-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1376-60-0x0000000140000000-0x00000001400B1000-memory.dmpFilesize
708KB
-
memory/1460-88-0x0000000000000000-mapping.dmp
-
memory/1460-96-0x0000000000170000-0x0000000000177000-memory.dmpFilesize
28KB
-
memory/1460-90-0x000007FEFB8B1000-0x000007FEFB8B3000-memory.dmpFilesize
8KB