Analysis
-
max time kernel
155s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
10-03-2023 11:30
Static task
static1
Behavioral task
behavioral1
Sample
86bcfce2dd342e9a1c04cfc65731d40ed1c397a4ec47bd9f5b41771297d81100.dll
Resource
win7-20230220-en
General
-
Target
86bcfce2dd342e9a1c04cfc65731d40ed1c397a4ec47bd9f5b41771297d81100.dll
-
Size
768KB
-
MD5
bd5cfa593ed87901f8184eaa44c0a8b8
-
SHA1
963a57fb83ca6361624fb057058ea4fb538015dc
-
SHA256
86bcfce2dd342e9a1c04cfc65731d40ed1c397a4ec47bd9f5b41771297d81100
-
SHA512
f6235abb0503db5a7cc7a0f6d2a4682db1491127a4f5700d3f68e15535b838651e1df8a8292643e46febb678e16abe9f36f6990db57db3f58c60ceae186ae489
-
SSDEEP
12288:4lORVEAueQmTmQKO2nMlqVaSEwzH7YxiCyJ86azEZy1f11pNx:8ORVEVNmaDznMlqVNE27dJ8J2inNx
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3132-138-0x00000000032D0000-0x00000000032D1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
mfpmp.exewlrmdr.exeEhStorAuthn.exepid process 4044 mfpmp.exe 3116 wlrmdr.exe 3716 EhStorAuthn.exe -
Loads dropped DLL 3 IoCs
Processes:
mfpmp.exewlrmdr.exeEhStorAuthn.exepid process 4044 mfpmp.exe 3116 wlrmdr.exe 3716 EhStorAuthn.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Vbkzszunqcp = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\PRINTE~1\\za3\\wlrmdr.exe" -
Processes:
wlrmdr.exeEhStorAuthn.exerundll32.exemfpmp.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wlrmdr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA EhStorAuthn.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mfpmp.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exemfpmp.exepid process 4924 rundll32.exe 4924 rundll32.exe 4924 rundll32.exe 4924 rundll32.exe 4924 rundll32.exe 4924 rundll32.exe 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 3132 4044 mfpmp.exe 4044 mfpmp.exe 3132 3132 3132 3132 3132 3132 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3132 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3132 wrote to memory of 432 3132 mfpmp.exe PID 3132 wrote to memory of 432 3132 mfpmp.exe PID 3132 wrote to memory of 4044 3132 mfpmp.exe PID 3132 wrote to memory of 4044 3132 mfpmp.exe PID 3132 wrote to memory of 3376 3132 wlrmdr.exe PID 3132 wrote to memory of 3376 3132 wlrmdr.exe PID 3132 wrote to memory of 3116 3132 wlrmdr.exe PID 3132 wrote to memory of 3116 3132 wlrmdr.exe PID 3132 wrote to memory of 3760 3132 EhStorAuthn.exe PID 3132 wrote to memory of 3760 3132 EhStorAuthn.exe PID 3132 wrote to memory of 3716 3132 EhStorAuthn.exe PID 3132 wrote to memory of 3716 3132 EhStorAuthn.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\86bcfce2dd342e9a1c04cfc65731d40ed1c397a4ec47bd9f5b41771297d81100.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\mfpmp.exeC:\Windows\system32\mfpmp.exe1⤵
-
C:\Users\Admin\AppData\Local\1099\mfpmp.exeC:\Users\Admin\AppData\Local\1099\mfpmp.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\wlrmdr.exeC:\Windows\system32\wlrmdr.exe1⤵
-
C:\Users\Admin\AppData\Local\fOV\wlrmdr.exeC:\Users\Admin\AppData\Local\fOV\wlrmdr.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\EhStorAuthn.exeC:\Windows\system32\EhStorAuthn.exe1⤵
-
C:\Users\Admin\AppData\Local\zGposDA\EhStorAuthn.exeC:\Users\Admin\AppData\Local\zGposDA\EhStorAuthn.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\1099\MFPlat.DLLFilesize
776KB
MD58bd1ad854a823e6d56dc12a541dbf378
SHA163d97d73fc935d734dd7c048a0b1b64f252de1cf
SHA2567188c77863a41005609cea996b60ea36aa6546c64f928d8518f3f7e1d8750ac9
SHA5123adb25cfb9c912b3f2366b6eb752fda075aef672585c778f7fceb5e45ad7c55796b677808fc1179ea0250ae2fc874e1b8ca3c2a8f38b45c12ec7321bec45862e
-
C:\Users\Admin\AppData\Local\1099\MFPlat.DLLFilesize
776KB
MD58bd1ad854a823e6d56dc12a541dbf378
SHA163d97d73fc935d734dd7c048a0b1b64f252de1cf
SHA2567188c77863a41005609cea996b60ea36aa6546c64f928d8518f3f7e1d8750ac9
SHA5123adb25cfb9c912b3f2366b6eb752fda075aef672585c778f7fceb5e45ad7c55796b677808fc1179ea0250ae2fc874e1b8ca3c2a8f38b45c12ec7321bec45862e
-
C:\Users\Admin\AppData\Local\1099\mfpmp.exeFilesize
46KB
MD58f8fd1988973bac0c5244431473b96a5
SHA1ce81ea37260d7cafe27612606cf044921ad1304c
SHA25627287ac874cef86be03aee7b6d34fdc3bd208070ed20e44621a305865fb7579e
SHA512a91179e1561168b3b58f5ca893bce425d35f4a02aec20ac3d6fb944f5eb3c06b0a1b9d9f3fb9ea87869d65671d2b89b4ae19acf794372bdbd27f5e9756c5a8ab
-
C:\Users\Admin\AppData\Local\1099\mfpmp.exeFilesize
46KB
MD58f8fd1988973bac0c5244431473b96a5
SHA1ce81ea37260d7cafe27612606cf044921ad1304c
SHA25627287ac874cef86be03aee7b6d34fdc3bd208070ed20e44621a305865fb7579e
SHA512a91179e1561168b3b58f5ca893bce425d35f4a02aec20ac3d6fb944f5eb3c06b0a1b9d9f3fb9ea87869d65671d2b89b4ae19acf794372bdbd27f5e9756c5a8ab
-
C:\Users\Admin\AppData\Local\fOV\DUI70.dllFilesize
1.0MB
MD5e7ba2d9e3646d7379abda62532ec460a
SHA1495eb8147bec323bb6dff29cb971024eed26e701
SHA256ada3aeecd337de23b976253ed975998850c1a13fc03a0077895cb0dee216d166
SHA51244d4532c79c45dd22b15ae2f9c816335d88086c386ddabc5410c9d862ff2e8751460a967446c38210875747b36f1166162d657606e3d971d7890d7ad3bbea999
-
C:\Users\Admin\AppData\Local\fOV\DUI70.dllFilesize
1.0MB
MD5e7ba2d9e3646d7379abda62532ec460a
SHA1495eb8147bec323bb6dff29cb971024eed26e701
SHA256ada3aeecd337de23b976253ed975998850c1a13fc03a0077895cb0dee216d166
SHA51244d4532c79c45dd22b15ae2f9c816335d88086c386ddabc5410c9d862ff2e8751460a967446c38210875747b36f1166162d657606e3d971d7890d7ad3bbea999
-
C:\Users\Admin\AppData\Local\fOV\wlrmdr.exeFilesize
66KB
MD5ef9bba7a637a11b224a90bf90a8943ac
SHA14747ec6efd2d41e049159249c2d888189bb33d1d
SHA2562fda95aafb2e9284c730bf912b93f60a75b151941adc14445ed1e056140325b1
SHA5124c1fdb8e4bf25546a2a33c95268593746f5ae2666ce36c6d9ba5833357f13720c4722231224e82308af8c156485a2c86ffd97e3093717a28d1300d3787ef1831
-
C:\Users\Admin\AppData\Local\fOV\wlrmdr.exeFilesize
66KB
MD5ef9bba7a637a11b224a90bf90a8943ac
SHA14747ec6efd2d41e049159249c2d888189bb33d1d
SHA2562fda95aafb2e9284c730bf912b93f60a75b151941adc14445ed1e056140325b1
SHA5124c1fdb8e4bf25546a2a33c95268593746f5ae2666ce36c6d9ba5833357f13720c4722231224e82308af8c156485a2c86ffd97e3093717a28d1300d3787ef1831
-
C:\Users\Admin\AppData\Local\zGposDA\EhStorAuthn.exeFilesize
128KB
MD5d45618e58303edb4268a6cca5ec99ecc
SHA11f8049fc5ea8b57bb68e19fb55cb9dc1e18e9513
SHA256d527323643be9df4d174c3169c6f2c7854a59b781654bcaebd154cb51fb4219c
SHA5125d7ae663dcfedfaf00836dc018131851e5a40778bd582b417b9f0bbd4bb6d1b2eb8f37f7f5a01cd2beed78b6037ef6eb2a3290248d5e901173b1407990a202bd
-
C:\Users\Admin\AppData\Local\zGposDA\EhStorAuthn.exeFilesize
128KB
MD5d45618e58303edb4268a6cca5ec99ecc
SHA11f8049fc5ea8b57bb68e19fb55cb9dc1e18e9513
SHA256d527323643be9df4d174c3169c6f2c7854a59b781654bcaebd154cb51fb4219c
SHA5125d7ae663dcfedfaf00836dc018131851e5a40778bd582b417b9f0bbd4bb6d1b2eb8f37f7f5a01cd2beed78b6037ef6eb2a3290248d5e901173b1407990a202bd
-
C:\Users\Admin\AppData\Local\zGposDA\UxTheme.dllFilesize
772KB
MD5b99d2e934427a5e45de1314c35698603
SHA1399cd0e0db2deaa84eb21dc5d936f772e0b19fd4
SHA2568e9d94a25c80fce115291b4f287bb170f5a6cd5d39ba52ac181bfadc4ccad9fc
SHA512704da4e61bdb7ec0c6293ccc4f0e241a3823afe64df9e2f0fb2053118b3bab20562fba421ca015ecbf29d3057abaeb9d20e1e9137d432bf877d28a849975b2cc
-
C:\Users\Admin\AppData\Local\zGposDA\UxTheme.dllFilesize
772KB
MD5b99d2e934427a5e45de1314c35698603
SHA1399cd0e0db2deaa84eb21dc5d936f772e0b19fd4
SHA2568e9d94a25c80fce115291b4f287bb170f5a6cd5d39ba52ac181bfadc4ccad9fc
SHA512704da4e61bdb7ec0c6293ccc4f0e241a3823afe64df9e2f0fb2053118b3bab20562fba421ca015ecbf29d3057abaeb9d20e1e9137d432bf877d28a849975b2cc
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Ysexmho.lnkFilesize
1KB
MD570aa824049fb96820b0f8f2c0c81b10e
SHA1e1c4a152102997e5dafe13dd122cd84852dd16cb
SHA2564cdcadbd242fef48b958354c78fd3bb7756792b01af7c17fa76c0903c230ab26
SHA5125194acd897d8e5ae70acae1269888562dcc2ad54c69ae460701826dbc730519e3882199f57673f4c96eb28ddcdeb3aec8587d322a13e269a812408e27c4c07ce
-
C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\ImplicitAppShortcuts\BnuuFI\UxTheme.dllFilesize
772KB
MD5b99d2e934427a5e45de1314c35698603
SHA1399cd0e0db2deaa84eb21dc5d936f772e0b19fd4
SHA2568e9d94a25c80fce115291b4f287bb170f5a6cd5d39ba52ac181bfadc4ccad9fc
SHA512704da4e61bdb7ec0c6293ccc4f0e241a3823afe64df9e2f0fb2053118b3bab20562fba421ca015ecbf29d3057abaeb9d20e1e9137d432bf877d28a849975b2cc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Printer Shortcuts\za3\DUI70.dllFilesize
1.0MB
MD5e7ba2d9e3646d7379abda62532ec460a
SHA1495eb8147bec323bb6dff29cb971024eed26e701
SHA256ada3aeecd337de23b976253ed975998850c1a13fc03a0077895cb0dee216d166
SHA51244d4532c79c45dd22b15ae2f9c816335d88086c386ddabc5410c9d862ff2e8751460a967446c38210875747b36f1166162d657606e3d971d7890d7ad3bbea999
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\0eKMDFXmZv\MFPlat.DLLFilesize
776KB
MD58bd1ad854a823e6d56dc12a541dbf378
SHA163d97d73fc935d734dd7c048a0b1b64f252de1cf
SHA2567188c77863a41005609cea996b60ea36aa6546c64f928d8518f3f7e1d8750ac9
SHA5123adb25cfb9c912b3f2366b6eb752fda075aef672585c778f7fceb5e45ad7c55796b677808fc1179ea0250ae2fc874e1b8ca3c2a8f38b45c12ec7321bec45862e
-
memory/3116-193-0x00007FFBF9060000-0x00007FFBF9166000-memory.dmpFilesize
1.0MB
-
memory/3116-196-0x000002207DCB0000-0x000002207DCB7000-memory.dmpFilesize
28KB
-
memory/3116-199-0x00007FFBF9060000-0x00007FFBF9166000-memory.dmpFilesize
1.0MB
-
memory/3132-147-0x0000000140000000-0x00000001400C0000-memory.dmpFilesize
768KB
-
memory/3132-146-0x0000000140000000-0x00000001400C0000-memory.dmpFilesize
768KB
-
memory/3132-138-0x00000000032D0000-0x00000000032D1000-memory.dmpFilesize
4KB
-
memory/3132-140-0x0000000140000000-0x00000001400C0000-memory.dmpFilesize
768KB
-
memory/3132-142-0x0000000140000000-0x00000001400C0000-memory.dmpFilesize
768KB
-
memory/3132-166-0x0000000140000000-0x00000001400C0000-memory.dmpFilesize
768KB
-
memory/3132-164-0x0000000140000000-0x00000001400C0000-memory.dmpFilesize
768KB
-
memory/3132-155-0x0000000140000000-0x00000001400C0000-memory.dmpFilesize
768KB
-
memory/3132-148-0x0000000140000000-0x00000001400C0000-memory.dmpFilesize
768KB
-
memory/3132-149-0x00000000014B0000-0x00000000014B7000-memory.dmpFilesize
28KB
-
memory/3132-143-0x0000000140000000-0x00000001400C0000-memory.dmpFilesize
768KB
-
memory/3132-178-0x00007FFC175E0000-0x00007FFC175F0000-memory.dmpFilesize
64KB
-
memory/3132-145-0x0000000140000000-0x00000001400C0000-memory.dmpFilesize
768KB
-
memory/3132-144-0x0000000140000000-0x00000001400C0000-memory.dmpFilesize
768KB
-
memory/3716-210-0x00007FFBF90A0000-0x00007FFBF9161000-memory.dmpFilesize
772KB
-
memory/3716-213-0x000001FCB2B90000-0x000001FCB2B97000-memory.dmpFilesize
28KB
-
memory/3716-216-0x00007FFBF90A0000-0x00007FFBF9161000-memory.dmpFilesize
772KB
-
memory/4044-175-0x00007FFBF8730000-0x00007FFBF87F2000-memory.dmpFilesize
776KB
-
memory/4044-182-0x00007FFBF8730000-0x00007FFBF87F2000-memory.dmpFilesize
776KB
-
memory/4044-179-0x0000021BAEA30000-0x0000021BAEA37000-memory.dmpFilesize
28KB
-
memory/4924-133-0x00007FFBF8BE0000-0x00007FFBF8CA0000-memory.dmpFilesize
768KB
-
memory/4924-137-0x00007FFBF8BE0000-0x00007FFBF8CA0000-memory.dmpFilesize
768KB
-
memory/4924-136-0x000001A1BC400000-0x000001A1BC407000-memory.dmpFilesize
28KB