Analysis
-
max time kernel
152s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
19-04-2022 04:19
Static task
static1
Behavioral task
behavioral1
Sample
4c50f5f9e103236b5a05eefa06dd459b73e3b562ff7789c05a3a1c0591860f91.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
4c50f5f9e103236b5a05eefa06dd459b73e3b562ff7789c05a3a1c0591860f91.dll
Resource
win10v2004-20220310-en
General
-
Target
4c50f5f9e103236b5a05eefa06dd459b73e3b562ff7789c05a3a1c0591860f91.dll
-
Size
1.2MB
-
MD5
6e082f88f99a2f0e6dbc17609e8ebcc6
-
SHA1
2454239c5fb616d83814145a77596064942a4f20
-
SHA256
4c50f5f9e103236b5a05eefa06dd459b73e3b562ff7789c05a3a1c0591860f91
-
SHA512
e0edb0858e02adbc7d0bec75e4a3b82c5dda7811c022cf503e5862ff03fe396dcbb814144517f96363e889f1c67264079b4b9b5d62fbed21f7fd5e46c56f4dc1
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1692-54-0x0000000140000000-0x0000000140141000-memory.dmp dridex_payload behavioral1/memory/1420-87-0x0000000140000000-0x0000000140142000-memory.dmp dridex_payload behavioral1/memory/668-107-0x0000000140000000-0x0000000140148000-memory.dmp dridex_payload -
Processes:
resource yara_rule behavioral1/memory/1236-58-0x0000000002150000-0x0000000002151000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
fvenotify.exemsdtc.exeFXSCOVER.exepid process 1420 fvenotify.exe 1100 msdtc.exe 668 FXSCOVER.exe -
Loads dropped DLL 7 IoCs
Processes:
fvenotify.exemsdtc.exeFXSCOVER.exepid process 1236 1420 fvenotify.exe 1236 1100 msdtc.exe 1236 668 FXSCOVER.exe 1236 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2277218442-1199762539-2004043321-1000\Software\Microsoft\Windows\CurrentVersion\Run\Evgmngveltmlhb = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Themes\\uVIwM0JYrBR\\msdtc.exe" -
Processes:
rundll32.exefvenotify.exemsdtc.exeFXSCOVER.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA fvenotify.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msdtc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA FXSCOVER.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exefvenotify.exemsdtc.exeFXSCOVER.exepid process 1692 rundll32.exe 1692 rundll32.exe 1692 rundll32.exe 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1420 fvenotify.exe 1420 fvenotify.exe 1236 1236 1236 1236 1236 1236 1236 1236 1100 msdtc.exe 1100 msdtc.exe 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 1236 668 FXSCOVER.exe 668 FXSCOVER.exe 1236 1236 1236 1236 1236 1236 1236 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1236 wrote to memory of 1452 1236 fvenotify.exe PID 1236 wrote to memory of 1452 1236 fvenotify.exe PID 1236 wrote to memory of 1452 1236 fvenotify.exe PID 1236 wrote to memory of 1420 1236 fvenotify.exe PID 1236 wrote to memory of 1420 1236 fvenotify.exe PID 1236 wrote to memory of 1420 1236 fvenotify.exe PID 1236 wrote to memory of 1548 1236 msdtc.exe PID 1236 wrote to memory of 1548 1236 msdtc.exe PID 1236 wrote to memory of 1548 1236 msdtc.exe PID 1236 wrote to memory of 1100 1236 msdtc.exe PID 1236 wrote to memory of 1100 1236 msdtc.exe PID 1236 wrote to memory of 1100 1236 msdtc.exe PID 1236 wrote to memory of 1040 1236 FXSCOVER.exe PID 1236 wrote to memory of 1040 1236 FXSCOVER.exe PID 1236 wrote to memory of 1040 1236 FXSCOVER.exe PID 1236 wrote to memory of 668 1236 FXSCOVER.exe PID 1236 wrote to memory of 668 1236 FXSCOVER.exe PID 1236 wrote to memory of 668 1236 FXSCOVER.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c50f5f9e103236b5a05eefa06dd459b73e3b562ff7789c05a3a1c0591860f91.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\fvenotify.exeC:\Windows\system32\fvenotify.exe1⤵
-
C:\Users\Admin\AppData\Local\C7wdF1g\fvenotify.exeC:\Users\Admin\AppData\Local\C7wdF1g\fvenotify.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\msdtc.exeC:\Windows\system32\msdtc.exe1⤵
-
C:\Users\Admin\AppData\Local\lf8S\msdtc.exeC:\Users\Admin\AppData\Local\lf8S\msdtc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\FXSCOVER.exeC:\Windows\system32\FXSCOVER.exe1⤵
-
C:\Users\Admin\AppData\Local\8QJq\FXSCOVER.exeC:\Users\Admin\AppData\Local\8QJq\FXSCOVER.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\8QJq\FXSCOVER.exeFilesize
261KB
MD55e2c61be8e093dbfe7fc37585be42869
SHA1ed46cda4ece3ef187b0cf29ca843a6c6735af6c0
SHA2563d1719c1caa5d6b0358830a30713c43a9710fbf7bcedca20815be54d24aa9121
SHA51290bf180c8f6e3d0286a19fcd4727f23925a39c90113db979e1b4bbf8f0491471ad26c877a6e2cf49638b14050d952a9ee02a3c1293129843ec6bba01bc325d0b
-
C:\Users\Admin\AppData\Local\8QJq\MFC42u.dllFilesize
1.3MB
MD5cb045f2c1758ad793106c2574f18b374
SHA1be069d8625cfb858b3d465132465b85466cc1ba9
SHA25672bd1235474472ebf2a2da1adc59422bec24ecfbfd5954a18a7095a8f2f3a20f
SHA512bae86129fb8049d4edcb7c7dbf1d6606e8ad6062967435b0a388f5a6f55c3703e75b5910b28bdea8e6ce909292843359cbba14085e1ab35913944535521a1f90
-
C:\Users\Admin\AppData\Local\C7wdF1g\fvenotify.exeFilesize
117KB
MD5e61d644998e07c02f0999388808ac109
SHA1183130ad81ff4c7997582a484e759bf7769592d6
SHA25615a85cd6fbcb1ec57d78f986d6dd8908bd56231ce0cf65775075512303f7e5fa
SHA512310141b73394ae12a35f8d4f0c097868ee8a8045a62dd402a5dfbe2151980dd4fe18409ae3ca9422e3b88b2fa9afb04c1acbf8ec23a937a0a242b32a9a1e9272
-
C:\Users\Admin\AppData\Local\C7wdF1g\slc.dllFilesize
1.2MB
MD5423286e3ad08b166a4a4723e2915a7a0
SHA1995a9c18cc28afb22a191746690679cc5f084d68
SHA2562487ff42953e1a0c149430718483a3900e55b3eeccd9819c857677ae5eb388b2
SHA512e48432750f4e1c3b672890f9132ad6686fe5769cee7fb68bedea0eea686b871d812c1fb14517244da4d95f43de523f61d5835013242f476867b3b14a31d0e6ce
-
C:\Users\Admin\AppData\Local\lf8S\VERSION.dllFilesize
1.2MB
MD50663ee5cff61254ec136ca946ae4490c
SHA1bca7567656ee47291adaa28438b7ea8aa4d30dc2
SHA256ffb1e248e1e605149af3e00a56f0f58863a4454a6e9fa4bbf8f66df898b0df86
SHA51298a8e6719de17419b6aad904e02b8377c864272ad7164b6445f165f54566e9921fa72fed86197c73717e7ba66d82701fe44bf7bb238732add436696445cae005
-
C:\Users\Admin\AppData\Local\lf8S\msdtc.exeFilesize
138KB
MD5de0ece52236cfa3ed2dbfc03f28253a8
SHA184bbd2495c1809fcd19b535d41114e4fb101466c
SHA2562fbbec4cacb5161f68d7c2935852a5888945ca0f107cf8a1c01f4528ce407de3
SHA51269386134667626c60c99d941c8ab52f8e5235e3897b5af76965572287afd5dcd42b8207a520587844a57a268e4decb3f3c550e5b7a06230ee677dc5e40c50bb3
-
\Users\Admin\AppData\Local\8QJq\FXSCOVER.exeFilesize
261KB
MD55e2c61be8e093dbfe7fc37585be42869
SHA1ed46cda4ece3ef187b0cf29ca843a6c6735af6c0
SHA2563d1719c1caa5d6b0358830a30713c43a9710fbf7bcedca20815be54d24aa9121
SHA51290bf180c8f6e3d0286a19fcd4727f23925a39c90113db979e1b4bbf8f0491471ad26c877a6e2cf49638b14050d952a9ee02a3c1293129843ec6bba01bc325d0b
-
\Users\Admin\AppData\Local\8QJq\MFC42u.dllFilesize
1.3MB
MD5cb045f2c1758ad793106c2574f18b374
SHA1be069d8625cfb858b3d465132465b85466cc1ba9
SHA25672bd1235474472ebf2a2da1adc59422bec24ecfbfd5954a18a7095a8f2f3a20f
SHA512bae86129fb8049d4edcb7c7dbf1d6606e8ad6062967435b0a388f5a6f55c3703e75b5910b28bdea8e6ce909292843359cbba14085e1ab35913944535521a1f90
-
\Users\Admin\AppData\Local\C7wdF1g\fvenotify.exeFilesize
117KB
MD5e61d644998e07c02f0999388808ac109
SHA1183130ad81ff4c7997582a484e759bf7769592d6
SHA25615a85cd6fbcb1ec57d78f986d6dd8908bd56231ce0cf65775075512303f7e5fa
SHA512310141b73394ae12a35f8d4f0c097868ee8a8045a62dd402a5dfbe2151980dd4fe18409ae3ca9422e3b88b2fa9afb04c1acbf8ec23a937a0a242b32a9a1e9272
-
\Users\Admin\AppData\Local\C7wdF1g\slc.dllFilesize
1.2MB
MD5423286e3ad08b166a4a4723e2915a7a0
SHA1995a9c18cc28afb22a191746690679cc5f084d68
SHA2562487ff42953e1a0c149430718483a3900e55b3eeccd9819c857677ae5eb388b2
SHA512e48432750f4e1c3b672890f9132ad6686fe5769cee7fb68bedea0eea686b871d812c1fb14517244da4d95f43de523f61d5835013242f476867b3b14a31d0e6ce
-
\Users\Admin\AppData\Local\lf8S\VERSION.dllFilesize
1.2MB
MD50663ee5cff61254ec136ca946ae4490c
SHA1bca7567656ee47291adaa28438b7ea8aa4d30dc2
SHA256ffb1e248e1e605149af3e00a56f0f58863a4454a6e9fa4bbf8f66df898b0df86
SHA51298a8e6719de17419b6aad904e02b8377c864272ad7164b6445f165f54566e9921fa72fed86197c73717e7ba66d82701fe44bf7bb238732add436696445cae005
-
\Users\Admin\AppData\Local\lf8S\msdtc.exeFilesize
138KB
MD5de0ece52236cfa3ed2dbfc03f28253a8
SHA184bbd2495c1809fcd19b535d41114e4fb101466c
SHA2562fbbec4cacb5161f68d7c2935852a5888945ca0f107cf8a1c01f4528ce407de3
SHA51269386134667626c60c99d941c8ab52f8e5235e3897b5af76965572287afd5dcd42b8207a520587844a57a268e4decb3f3c550e5b7a06230ee677dc5e40c50bb3
-
\Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\OQ1fo\FXSCOVER.exeFilesize
261KB
MD55e2c61be8e093dbfe7fc37585be42869
SHA1ed46cda4ece3ef187b0cf29ca843a6c6735af6c0
SHA2563d1719c1caa5d6b0358830a30713c43a9710fbf7bcedca20815be54d24aa9121
SHA51290bf180c8f6e3d0286a19fcd4727f23925a39c90113db979e1b4bbf8f0491471ad26c877a6e2cf49638b14050d952a9ee02a3c1293129843ec6bba01bc325d0b
-
memory/668-106-0x000000013F9E1000-0x000000013F9E3000-memory.dmpFilesize
8KB
-
memory/668-101-0x0000000000000000-mapping.dmp
-
memory/668-107-0x0000000140000000-0x0000000140148000-memory.dmpFilesize
1.3MB
-
memory/668-110-0x0000000000180000-0x0000000000187000-memory.dmpFilesize
28KB
-
memory/1100-92-0x0000000000000000-mapping.dmp
-
memory/1100-99-0x0000000000080000-0x0000000000087000-memory.dmpFilesize
28KB
-
memory/1236-67-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1236-64-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1236-58-0x0000000002150000-0x0000000002151000-memory.dmpFilesize
4KB
-
memory/1236-80-0x00000000777B0000-0x00000000777B2000-memory.dmpFilesize
8KB
-
memory/1236-61-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1236-63-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1236-73-0x0000000002120000-0x0000000002127000-memory.dmpFilesize
28KB
-
memory/1236-59-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1236-68-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1236-69-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1236-70-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1236-65-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1236-60-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1236-62-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1236-66-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1420-84-0x000007FEFBE51000-0x000007FEFBE53000-memory.dmpFilesize
8KB
-
memory/1420-90-0x0000000000170000-0x0000000000177000-memory.dmpFilesize
28KB
-
memory/1420-87-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/1420-82-0x0000000000000000-mapping.dmp
-
memory/1692-54-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/1692-57-0x00000000000A0000-0x00000000000A7000-memory.dmpFilesize
28KB