Analysis
-
max time kernel
150s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
18-04-2022 18:25
Static task
static1
Behavioral task
behavioral1
Sample
c76536d2ace8f628cd93c78ba8e4825f94ca5a4694a290dd0fb95cae08e77be4.dll
Resource
win7-20220414-en
General
-
Target
c76536d2ace8f628cd93c78ba8e4825f94ca5a4694a290dd0fb95cae08e77be4.dll
-
Size
886KB
-
MD5
1e813a7ad4be6645921f8b0516b8b00c
-
SHA1
02da546df7f9a3507497a1443a0c46cb1fbd0c15
-
SHA256
c76536d2ace8f628cd93c78ba8e4825f94ca5a4694a290dd0fb95cae08e77be4
-
SHA512
a54ed387d7511ae83c8d7adacad93ae0acd0364c09ad6e931f36443aa62dbb496e7dc3afae71e1b42ea9ce62354770d4f72a52b5d8a6dfd86b796299902d86ad
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1256-55-0x00000000029D0000-0x00000000029D1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
WindowsAnytimeUpgradeResults.exeWFS.exetaskmgr.exepid process 908 WindowsAnytimeUpgradeResults.exe 288 WFS.exe 1152 taskmgr.exe -
Loads dropped DLL 7 IoCs
Processes:
WindowsAnytimeUpgradeResults.exeWFS.exetaskmgr.exepid process 1256 908 WindowsAnytimeUpgradeResults.exe 1256 288 WFS.exe 1256 1152 taskmgr.exe 1256 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gcehmtlftxqmyqm = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\090iR\\WFS.exe" -
Processes:
WindowsAnytimeUpgradeResults.exeWFS.exetaskmgr.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WindowsAnytimeUpgradeResults.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WFS.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exepid process 1376 regsvr32.exe 1376 regsvr32.exe 1376 regsvr32.exe 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1256 wrote to memory of 1672 1256 WindowsAnytimeUpgradeResults.exe PID 1256 wrote to memory of 1672 1256 WindowsAnytimeUpgradeResults.exe PID 1256 wrote to memory of 1672 1256 WindowsAnytimeUpgradeResults.exe PID 1256 wrote to memory of 908 1256 WindowsAnytimeUpgradeResults.exe PID 1256 wrote to memory of 908 1256 WindowsAnytimeUpgradeResults.exe PID 1256 wrote to memory of 908 1256 WindowsAnytimeUpgradeResults.exe PID 1256 wrote to memory of 548 1256 WFS.exe PID 1256 wrote to memory of 548 1256 WFS.exe PID 1256 wrote to memory of 548 1256 WFS.exe PID 1256 wrote to memory of 288 1256 WFS.exe PID 1256 wrote to memory of 288 1256 WFS.exe PID 1256 wrote to memory of 288 1256 WFS.exe PID 1256 wrote to memory of 1108 1256 taskmgr.exe PID 1256 wrote to memory of 1108 1256 taskmgr.exe PID 1256 wrote to memory of 1108 1256 taskmgr.exe PID 1256 wrote to memory of 1152 1256 taskmgr.exe PID 1256 wrote to memory of 1152 1256 taskmgr.exe PID 1256 wrote to memory of 1152 1256 taskmgr.exe
Processes
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\AppData\Local\Temp\c76536d2ace8f628cd93c78ba8e4825f94ca5a4694a290dd0fb95cae08e77be4.dll1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\WindowsAnytimeUpgradeResults.exeC:\Windows\system32\WindowsAnytimeUpgradeResults.exe1⤵
-
C:\Users\Admin\AppData\Local\6lZ\WindowsAnytimeUpgradeResults.exeC:\Users\Admin\AppData\Local\6lZ\WindowsAnytimeUpgradeResults.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\WFS.exeC:\Windows\system32\WFS.exe1⤵
-
C:\Users\Admin\AppData\Local\W8gw7zE\WFS.exeC:\Users\Admin\AppData\Local\W8gw7zE\WFS.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\taskmgr.exeC:\Windows\system32\taskmgr.exe1⤵
-
C:\Users\Admin\AppData\Local\gZfJws6ss\taskmgr.exeC:\Users\Admin\AppData\Local\gZfJws6ss\taskmgr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\6lZ\WINBRAND.dllFilesize
887KB
MD581d7cc9262d8cb92657b7092c31519be
SHA18863b463b13796bbe60bffd5ff5f338d350eb012
SHA2563fa02cbfb28f89cd86c00f0f6475439d4cb93d09a716244813d5dbba0c13281a
SHA5121ee9286f91c78c1fe7db6461c751e7ec3bcd45106e1a5e8577332704d8e6482c404b5e304fad2f49b7e616ce88a60970b58a3209cb7142e3397f940710f338d2
-
C:\Users\Admin\AppData\Local\6lZ\WindowsAnytimeUpgradeResults.exeFilesize
288KB
MD56f3f29905f0ec4ce22c1fd8acbf6c6de
SHA168bdfefe549dfa6262ad659f1578f3e87d862773
SHA256e9c4d718d09a28de8a99386b0dd65429f433837c712314e98ec4f01031af595b
SHA51216a9ad3183d7e11d9f0dd3c79363aa9a7af306f4f35a6f1e0cc1e175ef254e8052ec94dfd600dbe882f9ab41254d482cce9190ab7b0c005a34e46c66e8ff5f9e
-
C:\Users\Admin\AppData\Local\W8gw7zE\WFS.exeFilesize
951KB
MD5a943d670747778c7597987a4b5b9a679
SHA1c48b760ff9762205386563b93e8884352645ef40
SHA2561a582ebe780abc1143baccaf4910714d3e9f4195edd86939499d03ed6e756610
SHA5123d926ddead8afcb32b52b3eb3c416d197c15e5fff6ba9fa03a31a07522bdb9088b32500fc8b98d82af657071571d09cd336a65cf45c485ebcc145dea70b3a934
-
C:\Users\Admin\AppData\Local\W8gw7zE\WINMM.dllFilesize
892KB
MD51e817c840cf0ba36568156c53af7df5b
SHA1a98a3869da7b5f74f3afe4361e503c78f3d12ff2
SHA256859c540696bb5fae9083f14171d7aedcd7047330c2961349d8b187c2aecd3515
SHA512d4e4bedefdf1e986788bdfe8e76efc6f05d5b053d58aa6ed14729abcf16675b2918566739c581f67755a471cd1e09c78bbc635e15a62d22d8ced7d4e2d175691
-
C:\Users\Admin\AppData\Local\gZfJws6ss\UxTheme.dllFilesize
889KB
MD50ffa5f4832d02cbb4fbde0367d9adc5c
SHA17e053a95ea2a0b1e73479b86797defea746f4d66
SHA25658e8beec9f81fd4394a33fa6d4cfd3289271788eaed55284954c7aff20346433
SHA51271fc54966d6060bbcb982da3091e68203bae99aac5a239bf3d9609058395cbe23258249fbe0351c6fae1e2f47e8f86f937b27cf2a386eebf5a98db3f9dbcee63
-
C:\Users\Admin\AppData\Local\gZfJws6ss\taskmgr.exeFilesize
251KB
MD509f7401d56f2393c6ca534ff0241a590
SHA1e8b4d84a28e5ea17272416ec45726964fdf25883
SHA2566766717b8afafe46b5fd66c7082ccce6b382cbea982c73cb651e35dc8187ace1
SHA5127187a27cd32c1b295c74e36e1b6148a31d602962448b18395a44a721d17daa7271d0cd198edb2ed05ace439746517ffb1bcc11c7f682e09b025c950ea7b83192
-
\Users\Admin\AppData\Local\6lZ\WINBRAND.dllFilesize
887KB
MD581d7cc9262d8cb92657b7092c31519be
SHA18863b463b13796bbe60bffd5ff5f338d350eb012
SHA2563fa02cbfb28f89cd86c00f0f6475439d4cb93d09a716244813d5dbba0c13281a
SHA5121ee9286f91c78c1fe7db6461c751e7ec3bcd45106e1a5e8577332704d8e6482c404b5e304fad2f49b7e616ce88a60970b58a3209cb7142e3397f940710f338d2
-
\Users\Admin\AppData\Local\6lZ\WindowsAnytimeUpgradeResults.exeFilesize
288KB
MD56f3f29905f0ec4ce22c1fd8acbf6c6de
SHA168bdfefe549dfa6262ad659f1578f3e87d862773
SHA256e9c4d718d09a28de8a99386b0dd65429f433837c712314e98ec4f01031af595b
SHA51216a9ad3183d7e11d9f0dd3c79363aa9a7af306f4f35a6f1e0cc1e175ef254e8052ec94dfd600dbe882f9ab41254d482cce9190ab7b0c005a34e46c66e8ff5f9e
-
\Users\Admin\AppData\Local\W8gw7zE\WFS.exeFilesize
951KB
MD5a943d670747778c7597987a4b5b9a679
SHA1c48b760ff9762205386563b93e8884352645ef40
SHA2561a582ebe780abc1143baccaf4910714d3e9f4195edd86939499d03ed6e756610
SHA5123d926ddead8afcb32b52b3eb3c416d197c15e5fff6ba9fa03a31a07522bdb9088b32500fc8b98d82af657071571d09cd336a65cf45c485ebcc145dea70b3a934
-
\Users\Admin\AppData\Local\W8gw7zE\WINMM.dllFilesize
892KB
MD51e817c840cf0ba36568156c53af7df5b
SHA1a98a3869da7b5f74f3afe4361e503c78f3d12ff2
SHA256859c540696bb5fae9083f14171d7aedcd7047330c2961349d8b187c2aecd3515
SHA512d4e4bedefdf1e986788bdfe8e76efc6f05d5b053d58aa6ed14729abcf16675b2918566739c581f67755a471cd1e09c78bbc635e15a62d22d8ced7d4e2d175691
-
\Users\Admin\AppData\Local\gZfJws6ss\UxTheme.dllFilesize
889KB
MD50ffa5f4832d02cbb4fbde0367d9adc5c
SHA17e053a95ea2a0b1e73479b86797defea746f4d66
SHA25658e8beec9f81fd4394a33fa6d4cfd3289271788eaed55284954c7aff20346433
SHA51271fc54966d6060bbcb982da3091e68203bae99aac5a239bf3d9609058395cbe23258249fbe0351c6fae1e2f47e8f86f937b27cf2a386eebf5a98db3f9dbcee63
-
\Users\Admin\AppData\Local\gZfJws6ss\taskmgr.exeFilesize
251KB
MD509f7401d56f2393c6ca534ff0241a590
SHA1e8b4d84a28e5ea17272416ec45726964fdf25883
SHA2566766717b8afafe46b5fd66c7082ccce6b382cbea982c73cb651e35dc8187ace1
SHA5127187a27cd32c1b295c74e36e1b6148a31d602962448b18395a44a721d17daa7271d0cd198edb2ed05ace439746517ffb1bcc11c7f682e09b025c950ea7b83192
-
\Users\Admin\AppData\Roaming\Microsoft\Credentials\Rj76Kj7nVuG\taskmgr.exeFilesize
251KB
MD509f7401d56f2393c6ca534ff0241a590
SHA1e8b4d84a28e5ea17272416ec45726964fdf25883
SHA2566766717b8afafe46b5fd66c7082ccce6b382cbea982c73cb651e35dc8187ace1
SHA5127187a27cd32c1b295c74e36e1b6148a31d602962448b18395a44a721d17daa7271d0cd198edb2ed05ace439746517ffb1bcc11c7f682e09b025c950ea7b83192
-
memory/288-80-0x000000013FF91000-0x000000013FF93000-memory.dmpFilesize
8KB
-
memory/288-75-0x0000000000000000-mapping.dmp
-
memory/908-70-0x0000000000000000-mapping.dmp
-
memory/1152-82-0x0000000000000000-mapping.dmp
-
memory/1256-61-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1256-60-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1256-67-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1256-65-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1256-63-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1256-64-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1256-66-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1256-55-0x00000000029D0000-0x00000000029D1000-memory.dmpFilesize
4KB
-
memory/1256-62-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1256-59-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1256-68-0x00000000778F0000-0x00000000778F2000-memory.dmpFilesize
8KB
-
memory/1256-58-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1256-57-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1256-56-0x0000000140000000-0x00000001400E1000-memory.dmpFilesize
900KB
-
memory/1376-54-0x000007FEFBF91000-0x000007FEFBF93000-memory.dmpFilesize
8KB