Analysis
-
max time kernel
152s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
19-04-2022 04:17
Static task
static1
Behavioral task
behavioral1
Sample
6a3d27d8cfaa5e942d3c5eefa9181ef2edfedeae70d1dca0eaad53138fa56add.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
6a3d27d8cfaa5e942d3c5eefa9181ef2edfedeae70d1dca0eaad53138fa56add.dll
Resource
win10v2004-20220414-en
General
-
Target
6a3d27d8cfaa5e942d3c5eefa9181ef2edfedeae70d1dca0eaad53138fa56add.dll
-
Size
1.2MB
-
MD5
f15fa93fc3fc644f39f866875f3a69b7
-
SHA1
6a5c36ae6673e150502f07fd23677fc76033fa06
-
SHA256
6a3d27d8cfaa5e942d3c5eefa9181ef2edfedeae70d1dca0eaad53138fa56add
-
SHA512
ab2f22a9496b2e51f387498b5d8933912221c4e7a5fd141ac5b0b964832c7565291e2db7db13cc06782c2c36f0144d265bb2ede24308eafd1e21bc283bad8d90
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1280-59-0x00000000029F0000-0x00000000029F1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
sigverif.exeBdeUISrv.exeraserver.exepid process 320 sigverif.exe 1576 BdeUISrv.exe 1044 raserver.exe -
Loads dropped DLL 7 IoCs
Processes:
sigverif.exeBdeUISrv.exeraserver.exepid process 1280 320 sigverif.exe 1280 1576 BdeUISrv.exe 1280 1044 raserver.exe 1280 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\Evgmngveltmlhb = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\PrivacIE\\fuo3wg\\BdeUISrv.exe" -
Processes:
BdeUISrv.exeraserver.exerundll32.exesigverif.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA BdeUISrv.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA raserver.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sigverif.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exesigverif.exepid process 1964 rundll32.exe 1964 rundll32.exe 1964 rundll32.exe 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 320 sigverif.exe 320 sigverif.exe 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 1280 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1280 wrote to memory of 472 1280 sigverif.exe PID 1280 wrote to memory of 472 1280 sigverif.exe PID 1280 wrote to memory of 472 1280 sigverif.exe PID 1280 wrote to memory of 320 1280 sigverif.exe PID 1280 wrote to memory of 320 1280 sigverif.exe PID 1280 wrote to memory of 320 1280 sigverif.exe PID 1280 wrote to memory of 1572 1280 BdeUISrv.exe PID 1280 wrote to memory of 1572 1280 BdeUISrv.exe PID 1280 wrote to memory of 1572 1280 BdeUISrv.exe PID 1280 wrote to memory of 1576 1280 BdeUISrv.exe PID 1280 wrote to memory of 1576 1280 BdeUISrv.exe PID 1280 wrote to memory of 1576 1280 BdeUISrv.exe PID 1280 wrote to memory of 1328 1280 raserver.exe PID 1280 wrote to memory of 1328 1280 raserver.exe PID 1280 wrote to memory of 1328 1280 raserver.exe PID 1280 wrote to memory of 1044 1280 raserver.exe PID 1280 wrote to memory of 1044 1280 raserver.exe PID 1280 wrote to memory of 1044 1280 raserver.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6a3d27d8cfaa5e942d3c5eefa9181ef2edfedeae70d1dca0eaad53138fa56add.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\sigverif.exeC:\Windows\system32\sigverif.exe1⤵
-
C:\Users\Admin\AppData\Local\1zMvPqlv\sigverif.exeC:\Users\Admin\AppData\Local\1zMvPqlv\sigverif.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\BdeUISrv.exeC:\Windows\system32\BdeUISrv.exe1⤵
-
C:\Users\Admin\AppData\Local\t7DgHsm\BdeUISrv.exeC:\Users\Admin\AppData\Local\t7DgHsm\BdeUISrv.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\raserver.exeC:\Windows\system32\raserver.exe1⤵
-
C:\Users\Admin\AppData\Local\IHewH7c3\raserver.exeC:\Users\Admin\AppData\Local\IHewH7c3\raserver.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\1zMvPqlv\VERSION.dllFilesize
1.2MB
MD5663ed5b71bb2c32439da6e0971d76ad7
SHA1d0d59120193d141ff7d994f7992eff05d8d526c2
SHA256f80e9307d05c856371ad312f1ca228789c9a8b291a14f85fc73263612e33275c
SHA51293e4894d00012e404700c8e084758e93a2c8501c65a823ddd8efecaf9abd883556c6ccaba65634a734cb9a816dc3013da5c42f57c2c85856da0e0073728cf135
-
C:\Users\Admin\AppData\Local\1zMvPqlv\sigverif.exeFilesize
73KB
MD5e8e95ae5534553fc055051cee99a7f55
SHA14e0f668849fd546edd083d5981ed685d02a68df4
SHA2569e107fd99892d08b15c223ac17c49af75a4cbca41b5e939bb91c9dca9f0d0bec
SHA5125d3c32d136a264b6d2cfba4602e4d8f75e55ba0e199e0e81d7a515c34d8b9237db29647c10ab79081173010ff8e2c6a59b652c0a9cfa796433aed2d200f02da6
-
C:\Users\Admin\AppData\Local\IHewH7c3\WTSAPI32.dllFilesize
1.2MB
MD528d9507d61c84a88b8603da32e247202
SHA180644f83d2510f14008aa7ae1bc0d33e991ff225
SHA2569b733d6cdc1f60b64590b803c5eacd18f9a2af59b31364d4de0c5ff39310874f
SHA512b1944158eeaa1e4689b46f4f1b0cf4fe398b0e88548b4276e063c0eb6e9c749c5a45dac095deac4bff048847d68fcfc970773babb8880d72d0a8b7ee02bb6017
-
C:\Users\Admin\AppData\Local\IHewH7c3\raserver.exeFilesize
123KB
MD5cd0bc0b6b8d219808aea3ecd4e889b19
SHA19f8f4071ce2484008e36fdfd963378f4ebad703f
SHA25616abc530c0367df1ad631f09e14c565cf99561949aa14acc533cd54bf8a5e22c
SHA51284291ea3fafb38ef96817d5fe4a972475ef8ea24a4353568029e892fa8e15cf8e8f6ef4ff567813cd3b38092f0db4577d9dccb22be755eebdd4f77e623dc80ac
-
C:\Users\Admin\AppData\Local\t7DgHsm\BdeUISrv.exeFilesize
47KB
MD51da6b19be5d4949c868a264bc5e74206
SHA1d5ee86ba03a03ef8c93d93accafe40461084c839
SHA25600330a0e0eb1dbb6ee84997963f8e15c7c15c1df787f1c7f109609d7b31bd35c
SHA5129cee858c55eb0852e5bad53a675a094ae591b46b07afe9fb4224cac32e0be577fe36c1ed3e9f6bda4d4eb0c924a773d00e3181cd97f07e24c6c68c70f2b002c6
-
C:\Users\Admin\AppData\Local\t7DgHsm\WTSAPI32.dllFilesize
1.2MB
MD5b2e10edf3a64d61bfff05cf8191c2d05
SHA18a62ac4b3795846cf04df981ce1c813c6951d07a
SHA25615597bd79189b0a73372deef20ec68e4e646ae67c57c7570fb01fd678490a41c
SHA51269fadd85b4fe5a1bdfe0b4bd186f707537ee83c9f39d4db737663db87c34099ac09503a3fb6b110bbc002ccb27ab05bf514705b6dd6061c6fca75dfd5f4a13a5
-
\Users\Admin\AppData\Local\1zMvPqlv\VERSION.dllFilesize
1.2MB
MD5663ed5b71bb2c32439da6e0971d76ad7
SHA1d0d59120193d141ff7d994f7992eff05d8d526c2
SHA256f80e9307d05c856371ad312f1ca228789c9a8b291a14f85fc73263612e33275c
SHA51293e4894d00012e404700c8e084758e93a2c8501c65a823ddd8efecaf9abd883556c6ccaba65634a734cb9a816dc3013da5c42f57c2c85856da0e0073728cf135
-
\Users\Admin\AppData\Local\1zMvPqlv\sigverif.exeFilesize
73KB
MD5e8e95ae5534553fc055051cee99a7f55
SHA14e0f668849fd546edd083d5981ed685d02a68df4
SHA2569e107fd99892d08b15c223ac17c49af75a4cbca41b5e939bb91c9dca9f0d0bec
SHA5125d3c32d136a264b6d2cfba4602e4d8f75e55ba0e199e0e81d7a515c34d8b9237db29647c10ab79081173010ff8e2c6a59b652c0a9cfa796433aed2d200f02da6
-
\Users\Admin\AppData\Local\IHewH7c3\WTSAPI32.dllFilesize
1.2MB
MD528d9507d61c84a88b8603da32e247202
SHA180644f83d2510f14008aa7ae1bc0d33e991ff225
SHA2569b733d6cdc1f60b64590b803c5eacd18f9a2af59b31364d4de0c5ff39310874f
SHA512b1944158eeaa1e4689b46f4f1b0cf4fe398b0e88548b4276e063c0eb6e9c749c5a45dac095deac4bff048847d68fcfc970773babb8880d72d0a8b7ee02bb6017
-
\Users\Admin\AppData\Local\IHewH7c3\raserver.exeFilesize
123KB
MD5cd0bc0b6b8d219808aea3ecd4e889b19
SHA19f8f4071ce2484008e36fdfd963378f4ebad703f
SHA25616abc530c0367df1ad631f09e14c565cf99561949aa14acc533cd54bf8a5e22c
SHA51284291ea3fafb38ef96817d5fe4a972475ef8ea24a4353568029e892fa8e15cf8e8f6ef4ff567813cd3b38092f0db4577d9dccb22be755eebdd4f77e623dc80ac
-
\Users\Admin\AppData\Local\t7DgHsm\BdeUISrv.exeFilesize
47KB
MD51da6b19be5d4949c868a264bc5e74206
SHA1d5ee86ba03a03ef8c93d93accafe40461084c839
SHA25600330a0e0eb1dbb6ee84997963f8e15c7c15c1df787f1c7f109609d7b31bd35c
SHA5129cee858c55eb0852e5bad53a675a094ae591b46b07afe9fb4224cac32e0be577fe36c1ed3e9f6bda4d4eb0c924a773d00e3181cd97f07e24c6c68c70f2b002c6
-
\Users\Admin\AppData\Local\t7DgHsm\WTSAPI32.dllFilesize
1.2MB
MD5b2e10edf3a64d61bfff05cf8191c2d05
SHA18a62ac4b3795846cf04df981ce1c813c6951d07a
SHA25615597bd79189b0a73372deef20ec68e4e646ae67c57c7570fb01fd678490a41c
SHA51269fadd85b4fe5a1bdfe0b4bd186f707537ee83c9f39d4db737663db87c34099ac09503a3fb6b110bbc002ccb27ab05bf514705b6dd6061c6fca75dfd5f4a13a5
-
\Users\Admin\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\2FLV6XPD\EKR57b3LAi\raserver.exeFilesize
123KB
MD5cd0bc0b6b8d219808aea3ecd4e889b19
SHA19f8f4071ce2484008e36fdfd963378f4ebad703f
SHA25616abc530c0367df1ad631f09e14c565cf99561949aa14acc533cd54bf8a5e22c
SHA51284291ea3fafb38ef96817d5fe4a972475ef8ea24a4353568029e892fa8e15cf8e8f6ef4ff567813cd3b38092f0db4577d9dccb22be755eebdd4f77e623dc80ac
-
memory/320-82-0x0000000000000000-mapping.dmp
-
memory/320-84-0x000007FEFBA51000-0x000007FEFBA53000-memory.dmpFilesize
8KB
-
memory/320-91-0x00000000000A0000-0x00000000000A7000-memory.dmpFilesize
28KB
-
memory/320-87-0x0000000140000000-0x000000014013D000-memory.dmpFilesize
1.2MB
-
memory/1044-111-0x0000000000080000-0x0000000000087000-memory.dmpFilesize
28KB
-
memory/1044-103-0x0000000000000000-mapping.dmp
-
memory/1280-66-0x0000000140000000-0x000000014013C000-memory.dmpFilesize
1.2MB
-
memory/1280-60-0x0000000140000000-0x000000014013C000-memory.dmpFilesize
1.2MB
-
memory/1280-68-0x0000000140000000-0x000000014013C000-memory.dmpFilesize
1.2MB
-
memory/1280-80-0x00000000773B0000-0x00000000773B2000-memory.dmpFilesize
8KB
-
memory/1280-69-0x0000000140000000-0x000000014013C000-memory.dmpFilesize
1.2MB
-
memory/1280-71-0x00000000029D0000-0x00000000029D7000-memory.dmpFilesize
28KB
-
memory/1280-59-0x00000000029F0000-0x00000000029F1000-memory.dmpFilesize
4KB
-
memory/1280-65-0x0000000140000000-0x000000014013C000-memory.dmpFilesize
1.2MB
-
memory/1280-64-0x0000000140000000-0x000000014013C000-memory.dmpFilesize
1.2MB
-
memory/1280-67-0x0000000140000000-0x000000014013C000-memory.dmpFilesize
1.2MB
-
memory/1280-61-0x0000000140000000-0x000000014013C000-memory.dmpFilesize
1.2MB
-
memory/1280-63-0x0000000140000000-0x000000014013C000-memory.dmpFilesize
1.2MB
-
memory/1280-70-0x0000000140000000-0x000000014013C000-memory.dmpFilesize
1.2MB
-
memory/1280-62-0x0000000140000000-0x000000014013C000-memory.dmpFilesize
1.2MB
-
memory/1576-101-0x0000000000100000-0x0000000000107000-memory.dmpFilesize
28KB
-
memory/1576-93-0x0000000000000000-mapping.dmp
-
memory/1964-54-0x0000000140000000-0x000000014013C000-memory.dmpFilesize
1.2MB
-
memory/1964-58-0x0000000000290000-0x0000000000297000-memory.dmpFilesize
28KB