Analysis
-
max time kernel
150s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
19-04-2022 04:19
Static task
static1
Behavioral task
behavioral1
Sample
64f123d80872e8fd401f1ab89fa83ac61c744be1fb30b3ef2f1b1236b0db62a1.dll
Resource
win7-20220414-en
General
-
Target
64f123d80872e8fd401f1ab89fa83ac61c744be1fb30b3ef2f1b1236b0db62a1.dll
-
Size
1.2MB
-
MD5
fc7cd6f0409c5a8d3fc4c29652781e38
-
SHA1
84ea9d31cedb77e804a6b4941eeeb6081bd8ee84
-
SHA256
64f123d80872e8fd401f1ab89fa83ac61c744be1fb30b3ef2f1b1236b0db62a1
-
SHA512
05688c205f8ae6045500262bf865e230ad52fdc0fb08f1de4bcb9666e29c65cd45a85f5b05542bf7b4f5d9302cf1128a1bcc9cbb2b456ce2839910f8ae689943
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/1560-130-0x0000000140000000-0x0000000140140000-memory.dmp dridex_payload behavioral2/memory/3156-164-0x0000000140000000-0x0000000140142000-memory.dmp dridex_payload behavioral2/memory/2156-172-0x0000000140000000-0x0000000140141000-memory.dmp dridex_payload -
Processes:
resource yara_rule behavioral2/memory/3140-134-0x0000000000910000-0x0000000000911000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
mmc.exemblctr.execmstp.exepid process 3156 mmc.exe 2156 mblctr.exe 1668 cmstp.exe -
Loads dropped DLL 4 IoCs
Processes:
mmc.exemblctr.execmstp.exepid process 3156 mmc.exe 2156 mblctr.exe 1668 cmstp.exe 1668 cmstp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Eqzhtortkjjc = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Credentials\\kZQ\\mblctr.exe" -
Processes:
rundll32.exemmc.exemblctr.execmstp.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mmc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mblctr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmstp.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1560 rundll32.exe 1560 rundll32.exe 1560 rundll32.exe 1560 rundll32.exe 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 3140 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3140 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3140 wrote to memory of 3700 3140 mmc.exe PID 3140 wrote to memory of 3700 3140 mmc.exe PID 3140 wrote to memory of 3156 3140 mmc.exe PID 3140 wrote to memory of 3156 3140 mmc.exe PID 3140 wrote to memory of 4352 3140 mblctr.exe PID 3140 wrote to memory of 4352 3140 mblctr.exe PID 3140 wrote to memory of 2156 3140 mblctr.exe PID 3140 wrote to memory of 2156 3140 mblctr.exe PID 3140 wrote to memory of 1632 3140 cmstp.exe PID 3140 wrote to memory of 1632 3140 cmstp.exe PID 3140 wrote to memory of 1668 3140 cmstp.exe PID 3140 wrote to memory of 1668 3140 cmstp.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\64f123d80872e8fd401f1ab89fa83ac61c744be1fb30b3ef2f1b1236b0db62a1.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\mmc.exeC:\Windows\system32\mmc.exe1⤵
-
C:\Users\Admin\AppData\Local\XcIYA6nH\mmc.exeC:\Users\Admin\AppData\Local\XcIYA6nH\mmc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\mblctr.exeC:\Windows\system32\mblctr.exe1⤵
-
C:\Users\Admin\AppData\Local\Qx9BSuh\mblctr.exeC:\Users\Admin\AppData\Local\Qx9BSuh\mblctr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\cmstp.exeC:\Windows\system32\cmstp.exe1⤵
-
C:\Users\Admin\AppData\Local\YY1jtY\cmstp.exeC:\Users\Admin\AppData\Local\YY1jtY\cmstp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Qx9BSuh\dwmapi.dllFilesize
1.2MB
MD526b4cf0ed87b8cdd3a10cef42d593fc1
SHA1d753ee17569adb92c7617222ab54f7d53ff13f0d
SHA256497afaaaafb4828dcb6cebf9039c60b0384e389641f29c982ce6724a5d788307
SHA512f1c4458d129b513ed7db6e62fb61c89a6eaaec3232d254bab6214b31d1ecf1f64aa9e30e8c6ff093fe5cb4328c6fc41b665da9bed06b36e4ad350fba6ee42fe6
-
C:\Users\Admin\AppData\Local\Qx9BSuh\dwmapi.dllFilesize
1.2MB
MD526b4cf0ed87b8cdd3a10cef42d593fc1
SHA1d753ee17569adb92c7617222ab54f7d53ff13f0d
SHA256497afaaaafb4828dcb6cebf9039c60b0384e389641f29c982ce6724a5d788307
SHA512f1c4458d129b513ed7db6e62fb61c89a6eaaec3232d254bab6214b31d1ecf1f64aa9e30e8c6ff093fe5cb4328c6fc41b665da9bed06b36e4ad350fba6ee42fe6
-
C:\Users\Admin\AppData\Local\Qx9BSuh\mblctr.exeFilesize
790KB
MD5d3db14eabb2679e08020bcd0c96fa9f6
SHA1578dca7aad29409634064579d269e61e1f07d9dd
SHA2563baa1dc0756ebb0c2c70a31be7147863d8d8ba056c1aa7f979307f8790d1ff69
SHA51214dc895ae458ff0ca13d9c27aa5b4cfc906d338603d43389bb5f4429be593a587818855d1fe938f9ebebf46467fb0c1ab28247e8f9f5357098e8b822ecd8fffe
-
C:\Users\Admin\AppData\Local\XcIYA6nH\mmc.exeFilesize
1.8MB
MD58c86b80518406f14a4952d67185032d6
SHA19269f1fbcf65fefbc88a2e239519c21efe0f6ba5
SHA256895eef1eda5700a425934ae3782d4741dfefb7deafa53891bde490150187b98a
SHA5121bbdaa3ae8b5716ad2bd517055533e286ddb8a6c23cbc7aa602143dbb1ae132b513088ab61527c49737c554269c51416cceb80206ac8128ac6b003f1864eb099
-
C:\Users\Admin\AppData\Local\XcIYA6nH\mmc.exeFilesize
1.8MB
MD58c86b80518406f14a4952d67185032d6
SHA19269f1fbcf65fefbc88a2e239519c21efe0f6ba5
SHA256895eef1eda5700a425934ae3782d4741dfefb7deafa53891bde490150187b98a
SHA5121bbdaa3ae8b5716ad2bd517055533e286ddb8a6c23cbc7aa602143dbb1ae132b513088ab61527c49737c554269c51416cceb80206ac8128ac6b003f1864eb099
-
C:\Users\Admin\AppData\Local\XcIYA6nH\mmcbase.DLLFilesize
1.2MB
MD56e76347bdfe064a3300276c233eb3061
SHA10211f1270e89b49f35336af8a9ee5f6546431df0
SHA25620df3d964935df714e4e7bbf424fa3478a06c84d5b0f93a9209ceb4b52b44651
SHA512f118e92d4786dd53af23e3dd17c711c07d2cde13fe6911b0001a6c115cf3bee2feb03212dfcf97f2d9c00b73c4fcace048c72d03e177f2da8301447aa0bc11f0
-
C:\Users\Admin\AppData\Local\XcIYA6nH\mmcbase.DLLFilesize
1.2MB
MD56e76347bdfe064a3300276c233eb3061
SHA10211f1270e89b49f35336af8a9ee5f6546431df0
SHA25620df3d964935df714e4e7bbf424fa3478a06c84d5b0f93a9209ceb4b52b44651
SHA512f118e92d4786dd53af23e3dd17c711c07d2cde13fe6911b0001a6c115cf3bee2feb03212dfcf97f2d9c00b73c4fcace048c72d03e177f2da8301447aa0bc11f0
-
C:\Users\Admin\AppData\Local\YY1jtY\VERSION.dllFilesize
1.2MB
MD58ebe3c560364225dcbe5f87d0e96b8a1
SHA12411bd9f6db88feeae674feb787f5ea3d747386f
SHA2565b72d5156974e9e331aa294c221b5aa2305023b7d3300dd3027ad1d4d74d1aa6
SHA51282e5f4b3452d0bcb2a8633e17ec3adb527b95b0f43598d0c33dee4c309eb85dc6df54d7e1006ba90d1410c871c4c2f7b56803de55b71a9ed1e5df55faf89d1e5
-
C:\Users\Admin\AppData\Local\YY1jtY\VERSION.dllFilesize
1.2MB
MD58ebe3c560364225dcbe5f87d0e96b8a1
SHA12411bd9f6db88feeae674feb787f5ea3d747386f
SHA2565b72d5156974e9e331aa294c221b5aa2305023b7d3300dd3027ad1d4d74d1aa6
SHA51282e5f4b3452d0bcb2a8633e17ec3adb527b95b0f43598d0c33dee4c309eb85dc6df54d7e1006ba90d1410c871c4c2f7b56803de55b71a9ed1e5df55faf89d1e5
-
C:\Users\Admin\AppData\Local\YY1jtY\VERSION.dllFilesize
1.2MB
MD58ebe3c560364225dcbe5f87d0e96b8a1
SHA12411bd9f6db88feeae674feb787f5ea3d747386f
SHA2565b72d5156974e9e331aa294c221b5aa2305023b7d3300dd3027ad1d4d74d1aa6
SHA51282e5f4b3452d0bcb2a8633e17ec3adb527b95b0f43598d0c33dee4c309eb85dc6df54d7e1006ba90d1410c871c4c2f7b56803de55b71a9ed1e5df55faf89d1e5
-
C:\Users\Admin\AppData\Local\YY1jtY\cmstp.exeFilesize
96KB
MD54cc43fe4d397ff79fa69f397e016df52
SHA18fd6cf81ad40c9b123cd75611860a8b95c72869c
SHA256f2d3905ee38b2b5c0b724d582f14eb1db7621ffb8f3826df686a20784341614c
SHA512851ef9fa5a03ec8b9fea0094c6e4bfa0b9e71cee3412ee86b2dfc34682aa5fb6455fefe7fc0092b711956d7c880cf8a5761b63ee990aa8e72f3473086ac0f157
-
memory/1560-130-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1560-133-0x000001CA24C30000-0x000001CA24C37000-memory.dmpFilesize
28KB
-
memory/1668-175-0x0000000000000000-mapping.dmp
-
memory/1668-183-0x000001EA65B60000-0x000001EA65B67000-memory.dmpFilesize
28KB
-
memory/2156-172-0x0000000140000000-0x0000000140141000-memory.dmpFilesize
1.3MB
-
memory/2156-168-0x0000000000000000-mapping.dmp
-
memory/3140-141-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/3140-145-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/3140-134-0x0000000000910000-0x0000000000911000-memory.dmpFilesize
4KB
-
memory/3140-156-0x00007FFCDC0FC000-0x00007FFCDC0FD000-memory.dmpFilesize
4KB
-
memory/3140-157-0x00007FFCDC0CC000-0x00007FFCDC0CD000-memory.dmpFilesize
4KB
-
memory/3140-147-0x00000000008D0000-0x00000000008D7000-memory.dmpFilesize
28KB
-
memory/3140-146-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/3140-136-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/3140-135-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/3140-158-0x00007FFCDC010000-0x00007FFCDC020000-memory.dmpFilesize
64KB
-
memory/3140-144-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/3140-143-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/3140-142-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/3140-140-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/3140-139-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/3140-138-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/3140-137-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/3156-167-0x0000000000820000-0x0000000000827000-memory.dmpFilesize
28KB
-
memory/3156-164-0x0000000140000000-0x0000000140142000-memory.dmpFilesize
1.3MB
-
memory/3156-159-0x0000000000000000-mapping.dmp