Analysis
-
max time kernel
130s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
10-03-2023 11:01
Static task
static1
Behavioral task
behavioral1
Sample
86bcfce2dd342e9a1c04cfc65731d40ed1c397a4ec47bd9f5b41771297d81100.dll
Resource
win7-20230220-en
General
-
Target
86bcfce2dd342e9a1c04cfc65731d40ed1c397a4ec47bd9f5b41771297d81100.dll
-
Size
768KB
-
MD5
bd5cfa593ed87901f8184eaa44c0a8b8
-
SHA1
963a57fb83ca6361624fb057058ea4fb538015dc
-
SHA256
86bcfce2dd342e9a1c04cfc65731d40ed1c397a4ec47bd9f5b41771297d81100
-
SHA512
f6235abb0503db5a7cc7a0f6d2a4682db1491127a4f5700d3f68e15535b838651e1df8a8292643e46febb678e16abe9f36f6990db57db3f58c60ceae186ae489
-
SSDEEP
12288:4lORVEAueQmTmQKO2nMlqVaSEwzH7YxiCyJ86azEZy1f11pNx:8ORVEVNmaDznMlqVNE27dJ8J2inNx
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/2704-137-0x0000000000760000-0x0000000000761000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
SppExtComObj.Exeupfc.exetabcal.exepid process 4760 SppExtComObj.Exe 1716 upfc.exe 488 tabcal.exe -
Loads dropped DLL 3 IoCs
Processes:
SppExtComObj.Exeupfc.exetabcal.exepid process 4760 SppExtComObj.Exe 1716 upfc.exe 488 tabcal.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2275444769-3691835758-4097679484-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Xjibqlu = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\yljY9Etk\\upfc.exe" -
Processes:
SppExtComObj.Exeupfc.exetabcal.exerundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SppExtComObj.Exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA upfc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA tabcal.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exeSppExtComObj.Exepid process 1332 rundll32.exe 1332 rundll32.exe 1332 rundll32.exe 1332 rundll32.exe 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 2704 4760 SppExtComObj.Exe 4760 SppExtComObj.Exe 2704 2704 2704 2704 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2704 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 2704 wrote to memory of 3936 2704 SppExtComObj.Exe PID 2704 wrote to memory of 3936 2704 SppExtComObj.Exe PID 2704 wrote to memory of 4760 2704 SppExtComObj.Exe PID 2704 wrote to memory of 4760 2704 SppExtComObj.Exe PID 2704 wrote to memory of 3856 2704 upfc.exe PID 2704 wrote to memory of 3856 2704 upfc.exe PID 2704 wrote to memory of 1716 2704 upfc.exe PID 2704 wrote to memory of 1716 2704 upfc.exe PID 2704 wrote to memory of 4468 2704 tabcal.exe PID 2704 wrote to memory of 4468 2704 tabcal.exe PID 2704 wrote to memory of 488 2704 tabcal.exe PID 2704 wrote to memory of 488 2704 tabcal.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\86bcfce2dd342e9a1c04cfc65731d40ed1c397a4ec47bd9f5b41771297d81100.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\SppExtComObj.ExeC:\Windows\system32\SppExtComObj.Exe1⤵
-
C:\Users\Admin\AppData\Local\XC0x\SppExtComObj.ExeC:\Users\Admin\AppData\Local\XC0x\SppExtComObj.Exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\upfc.exeC:\Windows\system32\upfc.exe1⤵
-
C:\Users\Admin\AppData\Local\0MrPy\upfc.exeC:\Users\Admin\AppData\Local\0MrPy\upfc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\tabcal.exeC:\Windows\system32\tabcal.exe1⤵
-
C:\Users\Admin\AppData\Local\xLrHj\tabcal.exeC:\Users\Admin\AppData\Local\xLrHj\tabcal.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\0MrPy\XmlLite.dllFilesize
768KB
MD5d5f879685e801e3a824fe8bb95eb6f2e
SHA13b385bd66991c384aa75d3c972cf7e81f1a47f5a
SHA2564b4a275c5b20c683eb1e7bd2506a0191b57d439cdccfc521617ec46fd10e9353
SHA5125c4eb543183f09831845f9587fd2c0cda73f19836f9d16e5f19f22f4ce8fc4d6104826e0c21ab250da8c882ac70b7f488296506cfd933b1b7adf94652cbf0f63
-
C:\Users\Admin\AppData\Local\0MrPy\XmlLite.dllFilesize
768KB
MD5d5f879685e801e3a824fe8bb95eb6f2e
SHA13b385bd66991c384aa75d3c972cf7e81f1a47f5a
SHA2564b4a275c5b20c683eb1e7bd2506a0191b57d439cdccfc521617ec46fd10e9353
SHA5125c4eb543183f09831845f9587fd2c0cda73f19836f9d16e5f19f22f4ce8fc4d6104826e0c21ab250da8c882ac70b7f488296506cfd933b1b7adf94652cbf0f63
-
C:\Users\Admin\AppData\Local\0MrPy\upfc.exeFilesize
118KB
MD5299ea296575ccb9d2c1a779062535d5c
SHA12497169c13b0ba46a6be8a1fe493b250094079b7
SHA256ee44fe14df89c4e5eaf8398f8fb4823fd910c5a94d913653d6b9e831254f6cc2
SHA51202fc2b25167ebd7dfcc7b8aa74613e7004fdf33dfccccba6c3427434cca981c2eb50f4a801969b3a40c495a9bb0eac8176f4f2ec9091916cf3509a7f909b30fa
-
C:\Users\Admin\AppData\Local\0MrPy\upfc.exeFilesize
118KB
MD5299ea296575ccb9d2c1a779062535d5c
SHA12497169c13b0ba46a6be8a1fe493b250094079b7
SHA256ee44fe14df89c4e5eaf8398f8fb4823fd910c5a94d913653d6b9e831254f6cc2
SHA51202fc2b25167ebd7dfcc7b8aa74613e7004fdf33dfccccba6c3427434cca981c2eb50f4a801969b3a40c495a9bb0eac8176f4f2ec9091916cf3509a7f909b30fa
-
C:\Users\Admin\AppData\Local\XC0x\ACTIVEDS.dllFilesize
768KB
MD5ea3f674be659b00748cabbab89b8c831
SHA196b5b54b52e03dbd7efbf89f3e20c03478485921
SHA2560602bb75247df9562be21aa789d485d4bc6da6aa6d3958bb51ba657150d2bd08
SHA512d4d583e14c057539452be9589adf524a57e57760b8d16a4e47a7c9ec2ecec48a0af377b0c43ce3c530d418ee1b4600f0edac7fb07a34681bcd8ec8eda9115cdd
-
C:\Users\Admin\AppData\Local\XC0x\ACTIVEDS.dllFilesize
768KB
MD5ea3f674be659b00748cabbab89b8c831
SHA196b5b54b52e03dbd7efbf89f3e20c03478485921
SHA2560602bb75247df9562be21aa789d485d4bc6da6aa6d3958bb51ba657150d2bd08
SHA512d4d583e14c057539452be9589adf524a57e57760b8d16a4e47a7c9ec2ecec48a0af377b0c43ce3c530d418ee1b4600f0edac7fb07a34681bcd8ec8eda9115cdd
-
C:\Users\Admin\AppData\Local\XC0x\SppExtComObj.ExeFilesize
559KB
MD5728a78909aa69ca0e976e94482350700
SHA16508dfcbf37df25cae8ae68cf1fcd4b78084abb7
SHA2562a6581576305771044f07ea0fef27f77859996dbf66c2017e938f90bfc1e010c
SHA51222bf985e71afa58a1365cc733c0aa03dabd4b44e7c6a136eb5f9b870db14470201b4ef88a19fa3864af6c44e79e1a01d6f8806062d9d4861ba7dac77d82074f1
-
C:\Users\Admin\AppData\Local\XC0x\SppExtComObj.ExeFilesize
559KB
MD5728a78909aa69ca0e976e94482350700
SHA16508dfcbf37df25cae8ae68cf1fcd4b78084abb7
SHA2562a6581576305771044f07ea0fef27f77859996dbf66c2017e938f90bfc1e010c
SHA51222bf985e71afa58a1365cc733c0aa03dabd4b44e7c6a136eb5f9b870db14470201b4ef88a19fa3864af6c44e79e1a01d6f8806062d9d4861ba7dac77d82074f1
-
C:\Users\Admin\AppData\Local\xLrHj\HID.DLLFilesize
768KB
MD5e5e73267fdabab00c3af437fb0546677
SHA12b8a635120d5dc667eaac00c5676fb7280f38662
SHA25649eab83dee97c8e6f14440b2729d0d1090cc4d2d3fb070760740a9bc09234d74
SHA5120ba5e289303a7eb2617b77606de7ab9cbbb4fba3dafea572fd5f15f1e921ef9b6efd179a2ed9e95abd6823f79f0440eb571a94901aae935cd9cc7d0fcc55250a
-
C:\Users\Admin\AppData\Local\xLrHj\HID.DLLFilesize
768KB
MD5e5e73267fdabab00c3af437fb0546677
SHA12b8a635120d5dc667eaac00c5676fb7280f38662
SHA25649eab83dee97c8e6f14440b2729d0d1090cc4d2d3fb070760740a9bc09234d74
SHA5120ba5e289303a7eb2617b77606de7ab9cbbb4fba3dafea572fd5f15f1e921ef9b6efd179a2ed9e95abd6823f79f0440eb571a94901aae935cd9cc7d0fcc55250a
-
C:\Users\Admin\AppData\Local\xLrHj\tabcal.exeFilesize
84KB
MD540f4014416ff0cbf92a9509f67a69754
SHA11798ff7324724a32c810e2075b11c09b41e4fede
SHA256f31b4c751dbca276446119ba775787c3eb032da72eabcd40ad96a55826a3f33c
SHA512646dfe4cfe90d068c3da4c35f7053bb0f57687875a0f3469c0683e707306e6a42b0baca3e944d78f9be5c564bb0600202c32c223a770f89d3e2b07a24673c259
-
C:\Users\Admin\AppData\Local\xLrHj\tabcal.exeFilesize
84KB
MD540f4014416ff0cbf92a9509f67a69754
SHA11798ff7324724a32c810e2075b11c09b41e4fede
SHA256f31b4c751dbca276446119ba775787c3eb032da72eabcd40ad96a55826a3f33c
SHA512646dfe4cfe90d068c3da4c35f7053bb0f57687875a0f3469c0683e707306e6a42b0baca3e944d78f9be5c564bb0600202c32c223a770f89d3e2b07a24673c259
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Gytjzonguizwcx.lnkFilesize
1KB
MD51b19922cfe860bca320e287df722b3de
SHA125abbfe00727a9e446fa3171e8c0d0977e8213c7
SHA2562385d41ba413fdc431839a0d2dfde2b473cd0e52645e2b0d66d737e82019b06e
SHA51271679180ea16ed6b0107aa86f57f04873e06ded336b6e61eaf977431333fb118598915c7784c2d6b3d2460a767901218d6821877dccc576c0a8939bf2032b8ab
-
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TAtdQ\ACTIVEDS.dllFilesize
768KB
MD5ea3f674be659b00748cabbab89b8c831
SHA196b5b54b52e03dbd7efbf89f3e20c03478485921
SHA2560602bb75247df9562be21aa789d485d4bc6da6aa6d3958bb51ba657150d2bd08
SHA512d4d583e14c057539452be9589adf524a57e57760b8d16a4e47a7c9ec2ecec48a0af377b0c43ce3c530d418ee1b4600f0edac7fb07a34681bcd8ec8eda9115cdd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\gDdCvW\HID.DLLFilesize
768KB
MD5e5e73267fdabab00c3af437fb0546677
SHA12b8a635120d5dc667eaac00c5676fb7280f38662
SHA25649eab83dee97c8e6f14440b2729d0d1090cc4d2d3fb070760740a9bc09234d74
SHA5120ba5e289303a7eb2617b77606de7ab9cbbb4fba3dafea572fd5f15f1e921ef9b6efd179a2ed9e95abd6823f79f0440eb571a94901aae935cd9cc7d0fcc55250a
-
C:\Users\Admin\AppData\Roaming\Microsoft\yljY9Etk\XmlLite.dllFilesize
768KB
MD5d5f879685e801e3a824fe8bb95eb6f2e
SHA13b385bd66991c384aa75d3c972cf7e81f1a47f5a
SHA2564b4a275c5b20c683eb1e7bd2506a0191b57d439cdccfc521617ec46fd10e9353
SHA5125c4eb543183f09831845f9587fd2c0cda73f19836f9d16e5f19f22f4ce8fc4d6104826e0c21ab250da8c882ac70b7f488296506cfd933b1b7adf94652cbf0f63
-
memory/488-212-0x0000025C577D0000-0x0000025C577D7000-memory.dmpFilesize
28KB
-
memory/488-215-0x00007FFDEC020000-0x00007FFDEC0E0000-memory.dmpFilesize
768KB
-
memory/1332-133-0x00007FFDEC020000-0x00007FFDEC0E0000-memory.dmpFilesize
768KB
-
memory/1332-140-0x00007FFDEC020000-0x00007FFDEC0E0000-memory.dmpFilesize
768KB
-
memory/1332-136-0x00000273BCDB0000-0x00000273BCDB7000-memory.dmpFilesize
28KB
-
memory/1716-198-0x00007FFDEC020000-0x00007FFDEC0E0000-memory.dmpFilesize
768KB
-
memory/1716-195-0x00000293D9840000-0x00000293D9847000-memory.dmpFilesize
28KB
-
memory/2704-147-0x0000000140000000-0x00000001400C0000-memory.dmpFilesize
768KB
-
memory/2704-149-0x00000000006A0000-0x00000000006A7000-memory.dmpFilesize
28KB
-
memory/2704-164-0x0000000140000000-0x00000001400C0000-memory.dmpFilesize
768KB
-
memory/2704-137-0x0000000000760000-0x0000000000761000-memory.dmpFilesize
4KB
-
memory/2704-146-0x0000000140000000-0x00000001400C0000-memory.dmpFilesize
768KB
-
memory/2704-154-0x0000000140000000-0x00000001400C0000-memory.dmpFilesize
768KB
-
memory/2704-166-0x0000000140000000-0x00000001400C0000-memory.dmpFilesize
768KB
-
memory/2704-139-0x0000000140000000-0x00000001400C0000-memory.dmpFilesize
768KB
-
memory/2704-158-0x00007FFE0A760000-0x00007FFE0A770000-memory.dmpFilesize
64KB
-
memory/2704-144-0x0000000140000000-0x00000001400C0000-memory.dmpFilesize
768KB
-
memory/2704-145-0x0000000140000000-0x00000001400C0000-memory.dmpFilesize
768KB
-
memory/2704-143-0x0000000140000000-0x00000001400C0000-memory.dmpFilesize
768KB
-
memory/2704-142-0x0000000140000000-0x00000001400C0000-memory.dmpFilesize
768KB
-
memory/2704-141-0x0000000140000000-0x00000001400C0000-memory.dmpFilesize
768KB
-
memory/4760-181-0x00007FFDEC020000-0x00007FFDEC0E0000-memory.dmpFilesize
768KB
-
memory/4760-178-0x000002C007CD0000-0x000002C007CD7000-memory.dmpFilesize
28KB