Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 01:13
Static task
static1
Behavioral task
behavioral1
Sample
8c1edc294ab7bcaa45a2467817c833c0_NEIKI.dll
Resource
win7-20240419-en
General
-
Target
8c1edc294ab7bcaa45a2467817c833c0_NEIKI.dll
-
Size
1.2MB
-
MD5
8c1edc294ab7bcaa45a2467817c833c0
-
SHA1
84166d264a241b17e0c30e57c8a9029bdefc4448
-
SHA256
a26ebf633120aaf24e733dd3b9a4737d20565d3b8b43edffe548e7bc8e3528c9
-
SHA512
4369e992d268d298c9e7dbf39596f650a5390e6e5f1b3a0e555e11c7f1f0bbaf5bbc056669054aad7dfb2180e66977d3e5d93299699103239abf4dc6214be68a
-
SSDEEP
12288:w38uea4w46+K1FZPfxyMs2SRXTajPomqkpyrJXy6mfvHELWUbxdewWRa7CkhkgjS:K8uea4w467D5/0ypyFYELW8xFZmMXJZ
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1116-4-0x0000000002E00000-0x0000000002E01000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral1/memory/1824-0-0x0000000140000000-0x000000014013E000-memory.dmp dridex_payload behavioral1/memory/1116-37-0x0000000140000000-0x000000014013E000-memory.dmp dridex_payload behavioral1/memory/1116-48-0x0000000140000000-0x000000014013E000-memory.dmp dridex_payload behavioral1/memory/1116-49-0x0000000140000000-0x000000014013E000-memory.dmp dridex_payload behavioral1/memory/1824-57-0x0000000140000000-0x000000014013E000-memory.dmp dridex_payload behavioral1/memory/2528-65-0x0000000140000000-0x0000000140140000-memory.dmp dridex_payload behavioral1/memory/2528-68-0x0000000140000000-0x0000000140140000-memory.dmp dridex_payload behavioral1/memory/2808-82-0x0000000140000000-0x0000000140172000-memory.dmp dridex_payload behavioral1/memory/2808-86-0x0000000140000000-0x0000000140172000-memory.dmp dridex_payload behavioral1/memory/1772-103-0x0000000140000000-0x0000000140140000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
xpsrchvw.exemsdt.exewinlogon.exepid process 2528 xpsrchvw.exe 2808 msdt.exe 1772 winlogon.exe -
Loads dropped DLL 7 IoCs
Processes:
xpsrchvw.exemsdt.exewinlogon.exepid process 1116 2528 xpsrchvw.exe 1116 2808 msdt.exe 1116 1772 winlogon.exe 1116 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-481678230-3773327859-3495911762-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mwyjnbrrs = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SystemCertificates\\My\\RrSrJ\\msdt.exe" -
Processes:
winlogon.exerundll32.exexpsrchvw.exemsdt.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winlogon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA xpsrchvw.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA msdt.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1824 rundll32.exe 1824 rundll32.exe 1824 rundll32.exe 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 1116 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1116 wrote to memory of 2476 1116 xpsrchvw.exe PID 1116 wrote to memory of 2476 1116 xpsrchvw.exe PID 1116 wrote to memory of 2476 1116 xpsrchvw.exe PID 1116 wrote to memory of 2528 1116 xpsrchvw.exe PID 1116 wrote to memory of 2528 1116 xpsrchvw.exe PID 1116 wrote to memory of 2528 1116 xpsrchvw.exe PID 1116 wrote to memory of 2712 1116 msdt.exe PID 1116 wrote to memory of 2712 1116 msdt.exe PID 1116 wrote to memory of 2712 1116 msdt.exe PID 1116 wrote to memory of 2808 1116 msdt.exe PID 1116 wrote to memory of 2808 1116 msdt.exe PID 1116 wrote to memory of 2808 1116 msdt.exe PID 1116 wrote to memory of 1752 1116 winlogon.exe PID 1116 wrote to memory of 1752 1116 winlogon.exe PID 1116 wrote to memory of 1752 1116 winlogon.exe PID 1116 wrote to memory of 1772 1116 winlogon.exe PID 1116 wrote to memory of 1772 1116 winlogon.exe PID 1116 wrote to memory of 1772 1116 winlogon.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\8c1edc294ab7bcaa45a2467817c833c0_NEIKI.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\xpsrchvw.exeC:\Windows\system32\xpsrchvw.exe1⤵
-
C:\Users\Admin\AppData\Local\hh6\xpsrchvw.exeC:\Users\Admin\AppData\Local\hh6\xpsrchvw.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\msdt.exeC:\Windows\system32\msdt.exe1⤵
-
C:\Users\Admin\AppData\Local\KzYu\msdt.exeC:\Users\Admin\AppData\Local\KzYu\msdt.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\winlogon.exeC:\Windows\system32\winlogon.exe1⤵
-
C:\Users\Admin\AppData\Local\uatwV49\winlogon.exeC:\Users\Admin\AppData\Local\uatwV49\winlogon.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\KzYu\DUI70.dllFilesize
1.4MB
MD551f6e2e24c98c83d720db83fd49b6ca1
SHA1c218a334ec10d5a405cd826fc877c497b0693b64
SHA25632b30c90e162d3e30838c9b48aa3e8cfa1efd84cb062891e20b7b3468a0e1d07
SHA5129a979a459df68790d8f08cc7ff00222dcef4a0abced231d4fe39eaae7a20e60d5eb95858761623834b568c657c74ca14b87454fedaf7e5d37be36e09878cac23
-
C:\Users\Admin\AppData\Local\hh6\WINMM.dllFilesize
1.2MB
MD58330756872576d07cc9706715b2b234d
SHA11ed17f8190c8555da3a25c718c68937ec3cde4a1
SHA256ef4320ed6d1c87c20c0d9afc254dfbac82d117cdccd5566e98e331915aea2b16
SHA512f311a473c60089c1d52bcac6accc24ccafbc925c3a0c3529ef01a7deecc5c0a130d5be3531f97d1b2d6ffd5d19f4a174be0b4fc371d6e99e6e5fdee78af78dda
-
C:\Users\Admin\AppData\Local\uatwV49\WINSTA.dllFilesize
1.2MB
MD5031d2262888963e2fb519576e82c55c9
SHA1c48e29a277e382f177b1bc858c8b33ef8122b4e7
SHA2569cdb5ef688d20fe87f4673f60ce73e0adbaafd2ce65451e3b670b9840f8d5b54
SHA5122e101a9fbd4d739b8ddfabb0ae168476c21a2dddff9bbf7693a18a9445fc9fa4b08a7c5f4052ad06c4860fea221a8ff7d68c4f01b52b9312f1d723c5ec806bca
-
C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Pclfpjzoauil.lnkFilesize
1KB
MD58f9f8a2277bd48cb88548ae57abab436
SHA19446ef7d05da17792ff6b9f634c6a6af3a7642e9
SHA25657620e1b524ff1906750c036499550fb278a1993e6019fb8eeeebe6cc70223c7
SHA5122a3bdf187ca77e68ba08197ea62bb0d0a96ba95c3bb258431b95b719a3e51029fb53102bdc9512269fd9aead7673b8690a2ec1818bc392b271f8dcdb4c6ca426
-
\Users\Admin\AppData\Local\KzYu\msdt.exeFilesize
1.0MB
MD5aecb7b09566b1f83f61d5a4b44ae9c7e
SHA13a4a2338c6b5ac833dc87497e04fe89c5481e289
SHA256fbdbe7a2027cab237c4635ef71c1a93cf7afc4b79d56b63a119b7f8e3029ccf5
SHA5126e14200262e0729ebcab2226c3eac729ab5af2a4c6f4f9c3e2950cc203387d9a0a447cf38665c724d4397353931fd10064dc067e043a3579538a6144e33e4746
-
\Users\Admin\AppData\Local\hh6\xpsrchvw.exeFilesize
4.6MB
MD5492cb6a624d5dad73ee0294b5db37dd6
SHA1e74806af04a5147ccabfb5b167eb95a0177c43b3
SHA256ccb4ecd48561ce024ea176b7036f0f2713b98bc82aa37347a30d8187762a8784
SHA51263bf2931764efe767fb42f9576702dd585a032f74ad2be2481eaf309f34950f05974d77b5cb220a3ff89c92af0c7693dc558f8e3a3ee2a0be6c5c07171d03835
-
\Users\Admin\AppData\Local\uatwV49\winlogon.exeFilesize
381KB
MD51151b1baa6f350b1db6598e0fea7c457
SHA1434856b834baf163c5ea4d26434eeae775a507fb
SHA256b1506e0a7e826eff0f5252ef5026070c46e2235438403a9a24d73ee69c0b8a49
SHA512df728d06238da1dece96f8b8d67a2423ed4dcb344b42d5958768d23bd570a79e7189e7c5ba783c1628fe8ddd1deaebeacb1b471c59c8a7c9beb21b4f1eb9edab
-
memory/1116-15-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/1116-10-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/1116-28-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/1116-39-0x0000000077120000-0x0000000077122000-memory.dmpFilesize
8KB
-
memory/1116-38-0x00000000770F0000-0x00000000770F2000-memory.dmpFilesize
8KB
-
memory/1116-37-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/1116-36-0x0000000002D10000-0x0000000002D17000-memory.dmpFilesize
28KB
-
memory/1116-27-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/1116-26-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/1116-25-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/1116-24-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/1116-23-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/1116-22-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/1116-19-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/1116-16-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/1116-18-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/1116-17-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/1116-3-0x0000000076D86000-0x0000000076D87000-memory.dmpFilesize
4KB
-
memory/1116-14-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/1116-12-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/1116-11-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/1116-20-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/1116-9-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/1116-8-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/1116-48-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/1116-49-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/1116-4-0x0000000002E00000-0x0000000002E01000-memory.dmpFilesize
4KB
-
memory/1116-13-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/1116-21-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/1116-7-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/1116-6-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/1116-73-0x0000000076D86000-0x0000000076D87000-memory.dmpFilesize
4KB
-
memory/1772-100-0x0000000000280000-0x0000000000287000-memory.dmpFilesize
28KB
-
memory/1772-103-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/1824-57-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/1824-0-0x0000000140000000-0x000000014013E000-memory.dmpFilesize
1.2MB
-
memory/1824-2-0x0000000000110000-0x0000000000117000-memory.dmpFilesize
28KB
-
memory/2528-68-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/2528-65-0x0000000140000000-0x0000000140140000-memory.dmpFilesize
1.2MB
-
memory/2808-81-0x0000000000100000-0x0000000000107000-memory.dmpFilesize
28KB
-
memory/2808-82-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB
-
memory/2808-86-0x0000000140000000-0x0000000140172000-memory.dmpFilesize
1.4MB