Analysis
-
max time kernel
151s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
19-04-2022 04:17
Static task
static1
Behavioral task
behavioral1
Sample
7267885574387dc8769908893f2c1ba297a0e4da0798105e1301247df2d8b97a.dll
Resource
win7-20220414-en
General
-
Target
7267885574387dc8769908893f2c1ba297a0e4da0798105e1301247df2d8b97a.dll
-
Size
1.2MB
-
MD5
513fc64fd591db4f601b9ce9f2da15e0
-
SHA1
c26e626dcf7c5328675ea73a672ff1b5d27d44a8
-
SHA256
7267885574387dc8769908893f2c1ba297a0e4da0798105e1301247df2d8b97a
-
SHA512
a120c47877119d939776c1532592a5b788b8af2185ad15a00fb466c07b916a7f46ac815cd1f2cf19f1974690d29bb812b4c664aa1a47199bc4f10788b2a6e8b1
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/5056-130-0x0000000140000000-0x000000014013F000-memory.dmp dridex_payload behavioral2/memory/836-160-0x0000000140000000-0x0000000140140000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
osk.exeRecoveryDrive.exeddodiag.exepid process 836 osk.exe 4568 RecoveryDrive.exe 3784 ddodiag.exe -
Loads dropped DLL 3 IoCs
Processes:
osk.exeRecoveryDrive.exeddodiag.exepid process 836 osk.exe 4568 RecoveryDrive.exe 3784 ddodiag.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Mozskmmhgssfnvj = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\CustomDestinations\\By2Pzt9J\\RecoveryDrive.exe" -
Processes:
rundll32.exeosk.exeRecoveryDrive.exeddodiag.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA osk.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RecoveryDrive.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ddodiag.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 5056 rundll32.exe 5056 rundll32.exe 5056 rundll32.exe 5056 rundll32.exe 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 1032 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1032 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 1032 wrote to memory of 2584 1032 osk.exe PID 1032 wrote to memory of 2584 1032 osk.exe PID 1032 wrote to memory of 836 1032 osk.exe PID 1032 wrote to memory of 836 1032 osk.exe PID 1032 wrote to memory of 4772 1032 RecoveryDrive.exe PID 1032 wrote to memory of 4772 1032 RecoveryDrive.exe PID 1032 wrote to memory of 4568 1032 RecoveryDrive.exe PID 1032 wrote to memory of 4568 1032 RecoveryDrive.exe PID 1032 wrote to memory of 3324 1032 ddodiag.exe PID 1032 wrote to memory of 3324 1032 ddodiag.exe PID 1032 wrote to memory of 3784 1032 ddodiag.exe PID 1032 wrote to memory of 3784 1032 ddodiag.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7267885574387dc8769908893f2c1ba297a0e4da0798105e1301247df2d8b97a.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\osk.exeC:\Windows\system32\osk.exe1⤵
-
C:\Users\Admin\AppData\Local\mizHKN\osk.exeC:\Users\Admin\AppData\Local\mizHKN\osk.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\RecoveryDrive.exeC:\Windows\system32\RecoveryDrive.exe1⤵
-
C:\Users\Admin\AppData\Local\9coIMvq\RecoveryDrive.exeC:\Users\Admin\AppData\Local\9coIMvq\RecoveryDrive.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\ddodiag.exeC:\Windows\system32\ddodiag.exe1⤵
-
C:\Users\Admin\AppData\Local\q923\ddodiag.exeC:\Users\Admin\AppData\Local\q923\ddodiag.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\9coIMvq\RecoveryDrive.exeFilesize
911KB
MD5b9b3dc6f2eb89e41ff27400952602c74
SHA124ae07e0db3ace0809d08bbd039db3a9d533e81b
SHA256630518cb2e4636f889d12c98fb2e6be4e579c5eeb86f88695d3f7fff3f5515c4
SHA5127906954b881f1051a0c7f098e096bc28eddcc48643b8bf3134dd57b8c18d8beba4f9a0ac5d348de2f9b8ea607c3e9cb0e61d91e4f3ba1fefb02839f928e3e3fe
-
C:\Users\Admin\AppData\Local\9coIMvq\UxTheme.dllFilesize
1.2MB
MD53bfada153f4013966de7e1b784d25861
SHA1734baaf0c98f00ba1c49d0d2f2813451416f956c
SHA2569760fda885693f325587e40cd4d851aaf663a780670cb78b401a5c938b90935e
SHA51254f23aa5696a6bd8d779ed6f1e05d84473aa9d246ec3ada5a3f163b10bfc3a951ab1aa56d8a34f34768bd37776dd2622d3047ccf6ab32d1c55e752835c625dfd
-
C:\Users\Admin\AppData\Local\9coIMvq\UxTheme.dllFilesize
1.2MB
MD53bfada153f4013966de7e1b784d25861
SHA1734baaf0c98f00ba1c49d0d2f2813451416f956c
SHA2569760fda885693f325587e40cd4d851aaf663a780670cb78b401a5c938b90935e
SHA51254f23aa5696a6bd8d779ed6f1e05d84473aa9d246ec3ada5a3f163b10bfc3a951ab1aa56d8a34f34768bd37776dd2622d3047ccf6ab32d1c55e752835c625dfd
-
C:\Users\Admin\AppData\Local\mizHKN\WMsgAPI.dllFilesize
1.2MB
MD5c26961b8439bcdc95f1fe285eaf2266d
SHA1e1ce297f490f1ba084303dead8c03f16ce98d98a
SHA2564669acf1901d08e53714d5cb14009405bdaad7e5a6ce77e490145542f4ffaf4f
SHA5128a1cda83728fa49d23a9821fa1b7e38439a74fc769b661a8890e9014b5825e31754a94bbb08177554d825995e92f47ea0dfe155095d56fc2eea5187fdc81cd5f
-
C:\Users\Admin\AppData\Local\mizHKN\WMsgAPI.dllFilesize
1.2MB
MD5c26961b8439bcdc95f1fe285eaf2266d
SHA1e1ce297f490f1ba084303dead8c03f16ce98d98a
SHA2564669acf1901d08e53714d5cb14009405bdaad7e5a6ce77e490145542f4ffaf4f
SHA5128a1cda83728fa49d23a9821fa1b7e38439a74fc769b661a8890e9014b5825e31754a94bbb08177554d825995e92f47ea0dfe155095d56fc2eea5187fdc81cd5f
-
C:\Users\Admin\AppData\Local\mizHKN\osk.exeFilesize
638KB
MD5745f2df5beed97b8c751df83938cb418
SHA12f9fc33b1bf28e0f14fd75646a7b427ddbe14d25
SHA256f67ef6e31fa0eaed44bfbab5b908be06b56cbc7d5a16ab2a72334d91f2bb6a51
SHA5122125d021e6f45a81bd75c9129f4b098ad9aa15c25d270051f4da42458a9737bff44d6adf17aa1f2547715d159fb621829f7cd3b9d42f1521c919549cc7deb228
-
C:\Users\Admin\AppData\Local\q923\XmlLite.dllFilesize
1.2MB
MD589487698b890a9f909286cff5f77364c
SHA1a65e691d4101e15e82fb2763eb656a48e1167177
SHA25656bbc010db9204af2e21304a855ed4e9cfe1c0b23322b45671000bea3c50f475
SHA512d20f78c54c304d69cc7d3f025a549f090a0797542ea541432e848800e5748d02ceb44847fc5dd3eed167c592c53ddfbf8ab4b0ed022dec9595717c53d8b7cdab
-
C:\Users\Admin\AppData\Local\q923\XmlLite.dllFilesize
1.2MB
MD589487698b890a9f909286cff5f77364c
SHA1a65e691d4101e15e82fb2763eb656a48e1167177
SHA25656bbc010db9204af2e21304a855ed4e9cfe1c0b23322b45671000bea3c50f475
SHA512d20f78c54c304d69cc7d3f025a549f090a0797542ea541432e848800e5748d02ceb44847fc5dd3eed167c592c53ddfbf8ab4b0ed022dec9595717c53d8b7cdab
-
C:\Users\Admin\AppData\Local\q923\ddodiag.exeFilesize
39KB
MD585feee634a6aee90f0108e26d3d9bc1f
SHA1a7b1fa32fe7ed67bd51dea438f2f767e3fef0ca2
SHA25699c63175504781e9278824d487da082da7c014e99f1024227af164986d3a27c6
SHA512b81a3e1723a5180c5168cd7bb5181c631f4f57c59780bb82a502160b7874777f3eef1ebe1b14f66c97f9f1a4721af13b6fbcdff2045c8563c18b5d12540953ff
-
memory/836-156-0x0000000000000000-mapping.dmp
-
memory/836-160-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/836-163-0x000002006F530000-0x000002006F537000-memory.dmpFilesize
28KB
-
memory/1032-155-0x00007FFECB370000-0x00007FFECB380000-memory.dmpFilesize
64KB
-
memory/1032-143-0x0000000140000000-0x000000014013F000-memory.dmpFilesize
1.2MB
-
memory/1032-154-0x0000000000D70000-0x0000000000D77000-memory.dmpFilesize
28KB
-
memory/1032-142-0x0000000140000000-0x000000014013F000-memory.dmpFilesize
1.2MB
-
memory/1032-134-0x0000000140000000-0x000000014013F000-memory.dmpFilesize
1.2MB
-
memory/1032-141-0x0000000140000000-0x000000014013F000-memory.dmpFilesize
1.2MB
-
memory/1032-140-0x0000000140000000-0x000000014013F000-memory.dmpFilesize
1.2MB
-
memory/1032-139-0x0000000140000000-0x000000014013F000-memory.dmpFilesize
1.2MB
-
memory/1032-144-0x0000000140000000-0x000000014013F000-memory.dmpFilesize
1.2MB
-
memory/1032-145-0x0000000140000000-0x000000014013F000-memory.dmpFilesize
1.2MB
-
memory/1032-135-0x0000000140000000-0x000000014013F000-memory.dmpFilesize
1.2MB
-
memory/1032-138-0x0000000140000000-0x000000014013F000-memory.dmpFilesize
1.2MB
-
memory/1032-137-0x0000000140000000-0x000000014013F000-memory.dmpFilesize
1.2MB
-
memory/1032-136-0x0000000140000000-0x000000014013F000-memory.dmpFilesize
1.2MB
-
memory/3784-172-0x0000000000000000-mapping.dmp
-
memory/3784-179-0x0000025D014A0000-0x0000025D014A7000-memory.dmpFilesize
28KB
-
memory/4568-171-0x000001E6E2F10000-0x000001E6E2F17000-memory.dmpFilesize
28KB
-
memory/4568-164-0x0000000000000000-mapping.dmp
-
memory/5056-130-0x0000000140000000-0x000000014013F000-memory.dmpFilesize
1.2MB
-
memory/5056-133-0x0000024C93400000-0x0000024C93407000-memory.dmpFilesize
28KB