Analysis
-
max time kernel
152s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
19-04-2022 04:18
Static task
static1
Behavioral task
behavioral1
Sample
1db516ec44d7e582128b742a21ad262b118ede5823969eae29b8d0c6eace59f5.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1db516ec44d7e582128b742a21ad262b118ede5823969eae29b8d0c6eace59f5.dll
Resource
win10v2004-20220414-en
General
-
Target
1db516ec44d7e582128b742a21ad262b118ede5823969eae29b8d0c6eace59f5.dll
-
Size
1000KB
-
MD5
3558b7179725f016656dd90085f93678
-
SHA1
6f86ad7ebacc70ba7c1a032fe9964d4fec4c71cf
-
SHA256
1db516ec44d7e582128b742a21ad262b118ede5823969eae29b8d0c6eace59f5
-
SHA512
84845486787de8e7bd64a9df0a50720c68619fbb383d078013470ce6d935d86b843768f6d1253979e91c9da01adf82db04691a0fbf0002b4a4cf45f59e8f708f
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
sessionmsg.exerecdisc.exewbengine.exepid process 5056 sessionmsg.exe 4748 recdisc.exe 1980 wbengine.exe -
Loads dropped DLL 3 IoCs
Processes:
sessionmsg.exerecdisc.exewbengine.exepid process 5056 sessionmsg.exe 4748 recdisc.exe 1980 wbengine.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Erihzxqqayujs = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\FLASHP~1\\NATIVE~1\\MkZE0\\recdisc.exe" -
Processes:
wbengine.exerundll32.exesessionmsg.exerecdisc.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wbengine.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sessionmsg.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA recdisc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1508 rundll32.exe 1508 rundll32.exe 1508 rundll32.exe 1508 rundll32.exe 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 2728 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2728 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 2728 wrote to memory of 4936 2728 sessionmsg.exe PID 2728 wrote to memory of 4936 2728 sessionmsg.exe PID 2728 wrote to memory of 5056 2728 sessionmsg.exe PID 2728 wrote to memory of 5056 2728 sessionmsg.exe PID 2728 wrote to memory of 4764 2728 recdisc.exe PID 2728 wrote to memory of 4764 2728 recdisc.exe PID 2728 wrote to memory of 4748 2728 recdisc.exe PID 2728 wrote to memory of 4748 2728 recdisc.exe PID 2728 wrote to memory of 2964 2728 wbengine.exe PID 2728 wrote to memory of 2964 2728 wbengine.exe PID 2728 wrote to memory of 1980 2728 wbengine.exe PID 2728 wrote to memory of 1980 2728 wbengine.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\1db516ec44d7e582128b742a21ad262b118ede5823969eae29b8d0c6eace59f5.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\sessionmsg.exeC:\Windows\system32\sessionmsg.exe1⤵
-
C:\Users\Admin\AppData\Local\IO5EsQC\sessionmsg.exeC:\Users\Admin\AppData\Local\IO5EsQC\sessionmsg.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\recdisc.exeC:\Windows\system32\recdisc.exe1⤵
-
C:\Users\Admin\AppData\Local\ltuPOJ5tB\recdisc.exeC:\Users\Admin\AppData\Local\ltuPOJ5tB\recdisc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\wbengine.exeC:\Windows\system32\wbengine.exe1⤵
-
C:\Users\Admin\AppData\Local\YIERt\wbengine.exeC:\Users\Admin\AppData\Local\YIERt\wbengine.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\IO5EsQC\DUI70.dllFilesize
1.2MB
MD5118c8296af4071cc8b059972711f446a
SHA1a54cd0eeb8ae4cbdc079b4a98bc9af270278aed0
SHA2565cefcbbcc6a506ca8772b609933b6f7c98b250f8aca316f8b8ecb95d7c816843
SHA5120137dcdaed4d388139f55cda7bc8b42bac795f6d9e1758d450027319580e084320525c3485cc7ee3a5a4971ddf7b20d4516cef7e27ba749208556bba17c15069
-
C:\Users\Admin\AppData\Local\IO5EsQC\DUI70.dllFilesize
1.2MB
MD5118c8296af4071cc8b059972711f446a
SHA1a54cd0eeb8ae4cbdc079b4a98bc9af270278aed0
SHA2565cefcbbcc6a506ca8772b609933b6f7c98b250f8aca316f8b8ecb95d7c816843
SHA5120137dcdaed4d388139f55cda7bc8b42bac795f6d9e1758d450027319580e084320525c3485cc7ee3a5a4971ddf7b20d4516cef7e27ba749208556bba17c15069
-
C:\Users\Admin\AppData\Local\IO5EsQC\sessionmsg.exeFilesize
85KB
MD5480f710806b68dfe478ca1ec7d7e79cc
SHA1b4fc97fed2dbff9c4874cb65ede7b50699db37cd
SHA2562416cd4aa577dbb2f8790a61e36fbab2b30bff81a4e1f67a5151c2fec29585bc
SHA51229d3d234ebc45049a533b6a91b246ac043a56b9af67276aaf493b014ae34d73000f99a6b0c0b85d2dfb7fba54811cf8bbdfd167a9eed01a8617b7f05bf2971db
-
C:\Users\Admin\AppData\Local\YIERt\SPP.dllFilesize
1001KB
MD50c604cc9cb74b5a197fff72538b5d8b7
SHA1b63202a4624e8f847eef29aab0c8171b50e90c7f
SHA256611fa12cc72e92120cafdab2e1a9656da610315e2744f50102bf2742ef2316c4
SHA51270b9c862be9a5d78499321a13987a7924cf4d76668fb3ace6abb61da9595102b1cd2e7dbe5eeafc1b3b66966e2abac5625ec2ca06c7fb857967c0f063d4f27c9
-
C:\Users\Admin\AppData\Local\YIERt\SPP.dllFilesize
1001KB
MD50c604cc9cb74b5a197fff72538b5d8b7
SHA1b63202a4624e8f847eef29aab0c8171b50e90c7f
SHA256611fa12cc72e92120cafdab2e1a9656da610315e2744f50102bf2742ef2316c4
SHA51270b9c862be9a5d78499321a13987a7924cf4d76668fb3ace6abb61da9595102b1cd2e7dbe5eeafc1b3b66966e2abac5625ec2ca06c7fb857967c0f063d4f27c9
-
C:\Users\Admin\AppData\Local\YIERt\wbengine.exeFilesize
1.5MB
MD517270a354a66590953c4aac1cf54e507
SHA1715babcc8e46b02ac498f4f06df7937904d9798d
SHA2569954394b43783061f9290706320cc65597c29176d5b8e7a26fa1d6b3536832b4
SHA5126be0ba6be84d01ab47f5a4ca98a6b940c43bd2d1e1a273d41c3e88aca47da11d932024b007716d1a6ffe6cee396b0e3e6971ab2afc293e72472f2e61c17b2a89
-
C:\Users\Admin\AppData\Local\ltuPOJ5tB\ReAgent.dllFilesize
1003KB
MD508b19e9f99615eac5d17d7dda5e824b5
SHA11ab6fb3407b1e44a06bc57d2f65a9837432b4653
SHA256af97be94e8244f808343ab780b63a79ddabaeb4f3673acf9e5a3d743a9331dd5
SHA512af197748e4908514511620e023bf2c4f283061750087444a95c2f1ff5af9857a163907a5bc3bd5c31bc623ce7a410299eac380b06764f9defd03239b52187635
-
C:\Users\Admin\AppData\Local\ltuPOJ5tB\ReAgent.dllFilesize
1003KB
MD508b19e9f99615eac5d17d7dda5e824b5
SHA11ab6fb3407b1e44a06bc57d2f65a9837432b4653
SHA256af97be94e8244f808343ab780b63a79ddabaeb4f3673acf9e5a3d743a9331dd5
SHA512af197748e4908514511620e023bf2c4f283061750087444a95c2f1ff5af9857a163907a5bc3bd5c31bc623ce7a410299eac380b06764f9defd03239b52187635
-
C:\Users\Admin\AppData\Local\ltuPOJ5tB\recdisc.exeFilesize
193KB
MD518afee6824c84bf5115bada75ff0a3e7
SHA1d10f287a7176f57b3b2b315a5310d25b449795aa
SHA2560787b37cf197595b8149ffe3784f9c59eacde3616011f185513ff5c075a5ac4e
SHA512517356165b401dbebf15437d3b17746aef5a6a4cc62a0afe45966abc92b4cf377eee4514a36ee28b1e88e55a22a2f8a6c997df45971e7f354b66ac7d9e141845
-
memory/1508-130-0x0000000140000000-0x0000000140101000-memory.dmpFilesize
1.0MB
-
memory/1508-134-0x0000021437D10000-0x0000021437D17000-memory.dmpFilesize
28KB
-
memory/1980-182-0x0000021C5F080000-0x0000021C5F087000-memory.dmpFilesize
28KB
-
memory/1980-174-0x0000000000000000-mapping.dmp
-
memory/2728-140-0x0000000140000000-0x0000000140101000-memory.dmpFilesize
1.0MB
-
memory/2728-155-0x00007FFE3DC30000-0x00007FFE3DC40000-memory.dmpFilesize
64KB
-
memory/2728-149-0x0000000000C40000-0x0000000000C47000-memory.dmpFilesize
28KB
-
memory/2728-141-0x0000000140000000-0x0000000140101000-memory.dmpFilesize
1.0MB
-
memory/2728-139-0x0000000140000000-0x0000000140101000-memory.dmpFilesize
1.0MB
-
memory/2728-138-0x0000000140000000-0x0000000140101000-memory.dmpFilesize
1.0MB
-
memory/2728-145-0x0000000140000000-0x0000000140101000-memory.dmpFilesize
1.0MB
-
memory/2728-135-0x0000000140000000-0x0000000140101000-memory.dmpFilesize
1.0MB
-
memory/2728-136-0x0000000140000000-0x0000000140101000-memory.dmpFilesize
1.0MB
-
memory/2728-144-0x0000000140000000-0x0000000140101000-memory.dmpFilesize
1.0MB
-
memory/2728-137-0x0000000140000000-0x0000000140101000-memory.dmpFilesize
1.0MB
-
memory/2728-143-0x0000000140000000-0x0000000140101000-memory.dmpFilesize
1.0MB
-
memory/2728-142-0x0000000140000000-0x0000000140101000-memory.dmpFilesize
1.0MB
-
memory/4748-170-0x0000000140000000-0x0000000140102000-memory.dmpFilesize
1.0MB
-
memory/4748-169-0x000001B879FF0000-0x000001B879FF7000-memory.dmpFilesize
28KB
-
memory/4748-165-0x0000000000000000-mapping.dmp
-
memory/5056-164-0x000001EB7A8C0000-0x000001EB7A8C7000-memory.dmpFilesize
28KB
-
memory/5056-160-0x0000000140000000-0x0000000140147000-memory.dmpFilesize
1.3MB
-
memory/5056-156-0x0000000000000000-mapping.dmp