Analysis
-
max time kernel
147s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
19-04-2022 04:17
Static task
static1
Behavioral task
behavioral1
Sample
a0a7108d7f34ff577b4a8db39b03563800dc3700d33e2f9829c057b93bde7aa6.dll
Resource
win7-20220414-en
General
-
Target
a0a7108d7f34ff577b4a8db39b03563800dc3700d33e2f9829c057b93bde7aa6.dll
-
Size
1.2MB
-
MD5
928e03c371cf2e36675fe8aaf3651b8f
-
SHA1
60a06ac1dee727b35f783c8da28426100d4ba527
-
SHA256
a0a7108d7f34ff577b4a8db39b03563800dc3700d33e2f9829c057b93bde7aa6
-
SHA512
24511d0641f02a0a762c47831d4bd64ca2e65a4573afeba8facb463d88275dc2d858e10b2e633260a0d623ce81d3d16ad79bca6b4cbc17409e2fc1a26d625d99
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1008-54-0x0000000140000000-0x0000000140140000-memory.dmp dridex_payload behavioral1/memory/784-87-0x0000000140000000-0x0000000140141000-memory.dmp dridex_payload -
Processes:
resource yara_rule behavioral1/memory/1280-58-0x00000000029F0000-0x00000000029F1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
psr.exeUI0Detect.exerstrui.exepid process 784 psr.exe 1572 UI0Detect.exe 1304 rstrui.exe -
Loads dropped DLL 7 IoCs
Processes:
psr.exeUI0Detect.exerstrui.exepid process 1280 784 psr.exe 1280 1572 UI0Detect.exe 1280 1304 rstrui.exe 1280 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\Evgmngveltmlhb = "C:\\Users\\Admin\\AppData\\Roaming\\MACROM~1\\FLASHP~1\\#SHARE~1\\RRGCQR~1\\UI0DET~1.EXE" -
Processes:
rundll32.exepsr.exeUI0Detect.exerstrui.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA psr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA UI0Detect.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rstrui.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepsr.exeUI0Detect.exerstrui.exepid process 1008 rundll32.exe 1008 rundll32.exe 1008 rundll32.exe 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 784 psr.exe 784 psr.exe 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1572 UI0Detect.exe 1572 UI0Detect.exe 1280 1280 1280 1280 1280 1280 1280 1280 1280 1304 rstrui.exe 1304 rstrui.exe 1280 1280 1280 1280 1280 1280 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1280 wrote to memory of 692 1280 psr.exe PID 1280 wrote to memory of 692 1280 psr.exe PID 1280 wrote to memory of 692 1280 psr.exe PID 1280 wrote to memory of 784 1280 psr.exe PID 1280 wrote to memory of 784 1280 psr.exe PID 1280 wrote to memory of 784 1280 psr.exe PID 1280 wrote to memory of 652 1280 UI0Detect.exe PID 1280 wrote to memory of 652 1280 UI0Detect.exe PID 1280 wrote to memory of 652 1280 UI0Detect.exe PID 1280 wrote to memory of 1572 1280 UI0Detect.exe PID 1280 wrote to memory of 1572 1280 UI0Detect.exe PID 1280 wrote to memory of 1572 1280 UI0Detect.exe PID 1280 wrote to memory of 1944 1280 rstrui.exe PID 1280 wrote to memory of 1944 1280 rstrui.exe PID 1280 wrote to memory of 1944 1280 rstrui.exe PID 1280 wrote to memory of 1304 1280 rstrui.exe PID 1280 wrote to memory of 1304 1280 rstrui.exe PID 1280 wrote to memory of 1304 1280 rstrui.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a0a7108d7f34ff577b4a8db39b03563800dc3700d33e2f9829c057b93bde7aa6.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\psr.exeC:\Windows\system32\psr.exe1⤵
-
C:\Users\Admin\AppData\Local\of1mac\psr.exeC:\Users\Admin\AppData\Local\of1mac\psr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\UI0Detect.exeC:\Windows\system32\UI0Detect.exe1⤵
-
C:\Users\Admin\AppData\Local\EKToL\UI0Detect.exeC:\Users\Admin\AppData\Local\EKToL\UI0Detect.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\rstrui.exeC:\Windows\system32\rstrui.exe1⤵
-
C:\Users\Admin\AppData\Local\2o35GULo\rstrui.exeC:\Users\Admin\AppData\Local\2o35GULo\rstrui.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\2o35GULo\SPP.dllFilesize
1.2MB
MD534786d4d5d78ab210c24e725b8d76748
SHA1474b307ebc9009ed0e4fa99e0b3e12d15cd0b9bd
SHA256189257df8bf61078c6177beeb4a8da2d0322de8908e19a252e129f01ada601e0
SHA5129bae9ec637a6d6c90bbaccdfd62e7ca9c849b97a743f8cd13f0967b45d7a580c6a3d5703b83a24dd4f41c8468d9370dbda7a12f7a60e24cbc7f35401aa701284
-
C:\Users\Admin\AppData\Local\2o35GULo\rstrui.exeFilesize
290KB
MD53db5a1eace7f3049ecc49fa64461e254
SHA17dc64e4f75741b93804cbae365e10dc70592c6a9
SHA256ba8387d4543b8b11e2202919b9608ee614753fe77f967aad9906702841658b49
SHA512ea81e3233e382f1cf2938785c9ded7c8fbbf11a6a6f5cf4323e3211ae66dad4a2c597cb589ff11f9eae79516043aba77d4b24bfa6eb0aa045d405aabdea4a025
-
C:\Users\Admin\AppData\Local\EKToL\UI0Detect.exeFilesize
40KB
MD53cbdec8d06b9968aba702eba076364a1
SHA16e0fcaccadbdb5e3293aa3523ec1006d92191c58
SHA256b8dab8aa804fc23021bfebd7ae4d40fbe648d6c6ba21cc008e26d1c084972f9b
SHA512a8e434c925ef849ecef0efcb4873dbb95eea2821c967b05afbbe5733071cc2293fc94e7fdf1fdaee51cbcf9885b3b72bfd4d690f23af34558b056920263e465d
-
C:\Users\Admin\AppData\Local\EKToL\WTSAPI32.dllFilesize
1.2MB
MD5b092a27dbf362016156d27823dc2e851
SHA125401caa3fbb6b04f7cb1a7a2556d5cb92fcd2f7
SHA256a6399e121c625d43be996ecb62e3e894bbb4ffdcfc5378a49a7cee4983adc587
SHA51207c35556b858e121dab449c88fc385eb55b5b14db45c46da8fbe3ac2128c4861238b5453a67d36c853e097f31caed672441d5b39b64937266c022cfd3ada21a4
-
C:\Users\Admin\AppData\Local\of1mac\VERSION.dllFilesize
1.2MB
MD52929a3fddfc992e883cc32261ceeb951
SHA10982d12ee4ffe16c625360dcad668dbd3e3c0e48
SHA25637af726b8d43d695d2150d32e75650dd055fa18f9697ef056197a97ef16e4243
SHA51294d2f96a93661c6d82ab41646054f873e7af36f7af5e1f77b9b53f9eee9954855a129e9cdbc22a7a2d9fe6af5a426fadfa517ea4a5dbcdb0b25c62a8909729ed
-
C:\Users\Admin\AppData\Local\of1mac\psr.exeFilesize
715KB
MD5a80527109d75cba125d940b007eea151
SHA1facf32a9ede6abfaa09368bfdfcfec8554107272
SHA25668910f8aae867e938b6a3b76cdf176898ba275d9ade85b4ce00b03232de4c495
SHA51277b86a597c33af8d3fbd9711f4abe6e0ca33b86279b1d28a25dcf3545a34b221be1ad7d11004d016203809cead1ebfd4b7e889ee9df2efc100eabf77963c1774
-
\Users\Admin\AppData\Local\2o35GULo\SPP.dllFilesize
1.2MB
MD534786d4d5d78ab210c24e725b8d76748
SHA1474b307ebc9009ed0e4fa99e0b3e12d15cd0b9bd
SHA256189257df8bf61078c6177beeb4a8da2d0322de8908e19a252e129f01ada601e0
SHA5129bae9ec637a6d6c90bbaccdfd62e7ca9c849b97a743f8cd13f0967b45d7a580c6a3d5703b83a24dd4f41c8468d9370dbda7a12f7a60e24cbc7f35401aa701284
-
\Users\Admin\AppData\Local\2o35GULo\rstrui.exeFilesize
290KB
MD53db5a1eace7f3049ecc49fa64461e254
SHA17dc64e4f75741b93804cbae365e10dc70592c6a9
SHA256ba8387d4543b8b11e2202919b9608ee614753fe77f967aad9906702841658b49
SHA512ea81e3233e382f1cf2938785c9ded7c8fbbf11a6a6f5cf4323e3211ae66dad4a2c597cb589ff11f9eae79516043aba77d4b24bfa6eb0aa045d405aabdea4a025
-
\Users\Admin\AppData\Local\EKToL\UI0Detect.exeFilesize
40KB
MD53cbdec8d06b9968aba702eba076364a1
SHA16e0fcaccadbdb5e3293aa3523ec1006d92191c58
SHA256b8dab8aa804fc23021bfebd7ae4d40fbe648d6c6ba21cc008e26d1c084972f9b
SHA512a8e434c925ef849ecef0efcb4873dbb95eea2821c967b05afbbe5733071cc2293fc94e7fdf1fdaee51cbcf9885b3b72bfd4d690f23af34558b056920263e465d
-
\Users\Admin\AppData\Local\EKToL\WTSAPI32.dllFilesize
1.2MB
MD5b092a27dbf362016156d27823dc2e851
SHA125401caa3fbb6b04f7cb1a7a2556d5cb92fcd2f7
SHA256a6399e121c625d43be996ecb62e3e894bbb4ffdcfc5378a49a7cee4983adc587
SHA51207c35556b858e121dab449c88fc385eb55b5b14db45c46da8fbe3ac2128c4861238b5453a67d36c853e097f31caed672441d5b39b64937266c022cfd3ada21a4
-
\Users\Admin\AppData\Local\of1mac\VERSION.dllFilesize
1.2MB
MD52929a3fddfc992e883cc32261ceeb951
SHA10982d12ee4ffe16c625360dcad668dbd3e3c0e48
SHA25637af726b8d43d695d2150d32e75650dd055fa18f9697ef056197a97ef16e4243
SHA51294d2f96a93661c6d82ab41646054f873e7af36f7af5e1f77b9b53f9eee9954855a129e9cdbc22a7a2d9fe6af5a426fadfa517ea4a5dbcdb0b25c62a8909729ed
-
\Users\Admin\AppData\Local\of1mac\psr.exeFilesize
715KB
MD5a80527109d75cba125d940b007eea151
SHA1facf32a9ede6abfaa09368bfdfcfec8554107272
SHA25668910f8aae867e938b6a3b76cdf176898ba275d9ade85b4ce00b03232de4c495
SHA51277b86a597c33af8d3fbd9711f4abe6e0ca33b86279b1d28a25dcf3545a34b221be1ad7d11004d016203809cead1ebfd4b7e889ee9df2efc100eabf77963c1774
-
\Users\Admin\AppData\Roaming\Adobe\ZHJWJKjr\rstrui.exeFilesize
290KB
MD53db5a1eace7f3049ecc49fa64461e254
SHA17dc64e4f75741b93804cbae365e10dc70592c6a9
SHA256ba8387d4543b8b11e2202919b9608ee614753fe77f967aad9906702841658b49
SHA512ea81e3233e382f1cf2938785c9ded7c8fbbf11a6a6f5cf4323e3211ae66dad4a2c597cb589ff11f9eae79516043aba77d4b24bfa6eb0aa045d405aabdea4a025
-
memory/784-82-0x0000000000000000-mapping.dmp
-
memory/784-84-0x000007FEFBA51000-0x000007FEFBA53000-memory.dmpFilesize
8KB
-
memory/784-90-0x0000000000500000-0x0000000000507000-memory.dmpFilesize
28KB
-
memory/784-87-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1008-57-0x0000000000320000-0x0000000000327000-memory.dmpFilesize
28KB
-
memory/1008-54-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1280-70-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1280-79-0x00000000029D0000-0x00000000029D7000-memory.dmpFilesize
28KB
-
memory/1280-68-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1280-69-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1280-61-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1280-80-0x00000000773B0000-0x00000000773B2000-memory.dmpFilesize
8KB
-
memory/1280-67-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1280-60-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1280-66-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1280-65-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1280-64-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1280-58-0x00000000029F0000-0x00000000029F1000-memory.dmpFilesize
4KB
-
memory/1280-63-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1280-59-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1280-62-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1304-101-0x0000000000000000-mapping.dmp
-
memory/1304-109-0x0000000000100000-0x0000000000107000-memory.dmpFilesize
28KB
-
memory/1572-99-0x0000000000180000-0x0000000000187000-memory.dmpFilesize
28KB
-
memory/1572-92-0x0000000000000000-mapping.dmp