Analysis
-
max time kernel
151s -
max time network
58s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
28-09-2021 09:10
Static task
static1
Behavioral task
behavioral1
Sample
69af86da86fc2f9639f010e0b729b1c2ce33a272d199aeedc4c873d98a2b83b4.dll
Resource
win7v20210408
General
-
Target
69af86da86fc2f9639f010e0b729b1c2ce33a272d199aeedc4c873d98a2b83b4.dll
-
Size
2.0MB
-
MD5
784adf3295b7eafe53aa80da302b1b5d
-
SHA1
c79da77a4d00ec47594e007f9a174de43b5028d3
-
SHA256
69af86da86fc2f9639f010e0b729b1c2ce33a272d199aeedc4c873d98a2b83b4
-
SHA512
3fbc71e7f7de7526acd525f98fc18c8af2cef28a44e0b08b0f789f758ca96ce4c631d94b76c85513c2954ea9fa0dd6bbcbf07143ab86861a720b89a018a29860
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1180-62-0x00000000037B0000-0x00000000037B1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
WindowsAnytimeUpgradeResults.exeperfmon.exeDevicePairingWizard.exepid process 768 WindowsAnytimeUpgradeResults.exe 1456 perfmon.exe 1220 DevicePairingWizard.exe -
Loads dropped DLL 7 IoCs
Processes:
WindowsAnytimeUpgradeResults.exeperfmon.exeDevicePairingWizard.exepid process 1180 768 WindowsAnytimeUpgradeResults.exe 1180 1456 perfmon.exe 1180 1220 DevicePairingWizard.exe 1180 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Windows\CurrentVersion\Run\Axiifu = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\SendTo\\6vJHNR\\perfmon.exe" -
Processes:
rundll32.exeWindowsAnytimeUpgradeResults.exeperfmon.exeDevicePairingWizard.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA WindowsAnytimeUpgradeResults.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA perfmon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DevicePairingWizard.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 1696 rundll32.exe 1696 rundll32.exe 1696 rundll32.exe 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 1180 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1180 -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
pid process 1180 1180 1180 1180 1180 -
Suspicious use of SendNotifyMessage 6 IoCs
Processes:
pid process 1180 1180 1180 1180 1180 1180 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1180 wrote to memory of 332 1180 WindowsAnytimeUpgradeResults.exe PID 1180 wrote to memory of 332 1180 WindowsAnytimeUpgradeResults.exe PID 1180 wrote to memory of 332 1180 WindowsAnytimeUpgradeResults.exe PID 1180 wrote to memory of 768 1180 WindowsAnytimeUpgradeResults.exe PID 1180 wrote to memory of 768 1180 WindowsAnytimeUpgradeResults.exe PID 1180 wrote to memory of 768 1180 WindowsAnytimeUpgradeResults.exe PID 1180 wrote to memory of 572 1180 perfmon.exe PID 1180 wrote to memory of 572 1180 perfmon.exe PID 1180 wrote to memory of 572 1180 perfmon.exe PID 1180 wrote to memory of 1456 1180 perfmon.exe PID 1180 wrote to memory of 1456 1180 perfmon.exe PID 1180 wrote to memory of 1456 1180 perfmon.exe PID 1180 wrote to memory of 1384 1180 DevicePairingWizard.exe PID 1180 wrote to memory of 1384 1180 DevicePairingWizard.exe PID 1180 wrote to memory of 1384 1180 DevicePairingWizard.exe PID 1180 wrote to memory of 1220 1180 DevicePairingWizard.exe PID 1180 wrote to memory of 1220 1180 DevicePairingWizard.exe PID 1180 wrote to memory of 1220 1180 DevicePairingWizard.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\69af86da86fc2f9639f010e0b729b1c2ce33a272d199aeedc4c873d98a2b83b4.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\WindowsAnytimeUpgradeResults.exeC:\Windows\system32\WindowsAnytimeUpgradeResults.exe1⤵
-
C:\Users\Admin\AppData\Local\4vcWIkC\WindowsAnytimeUpgradeResults.exeC:\Users\Admin\AppData\Local\4vcWIkC\WindowsAnytimeUpgradeResults.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\perfmon.exeC:\Windows\system32\perfmon.exe1⤵
-
C:\Users\Admin\AppData\Local\Y77p2v\perfmon.exeC:\Users\Admin\AppData\Local\Y77p2v\perfmon.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\DevicePairingWizard.exeC:\Windows\system32\DevicePairingWizard.exe1⤵
-
C:\Users\Admin\AppData\Local\xG8\DevicePairingWizard.exeC:\Users\Admin\AppData\Local\xG8\DevicePairingWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\4vcWIkC\DUI70.dllMD5
73a3d0132a3cf361898e7227a2eecf46
SHA122ef47dc1cf35e50ef37f61adcefa3f51e3ae45c
SHA256688aefab069757476d7ffe27f8e15d80bd8914bab1a9543b728f656299e08a72
SHA51237b5b98bd6cec199b9314b65de0645f753f6684124a1050725c518ff37a60a02a759538b7d8ca6703cfb2a902f5a6fb70dae456cc9f9265426cd6f8ca6be9508
-
C:\Users\Admin\AppData\Local\4vcWIkC\WindowsAnytimeUpgradeResults.exeMD5
6f3f29905f0ec4ce22c1fd8acbf6c6de
SHA168bdfefe549dfa6262ad659f1578f3e87d862773
SHA256e9c4d718d09a28de8a99386b0dd65429f433837c712314e98ec4f01031af595b
SHA51216a9ad3183d7e11d9f0dd3c79363aa9a7af306f4f35a6f1e0cc1e175ef254e8052ec94dfd600dbe882f9ab41254d482cce9190ab7b0c005a34e46c66e8ff5f9e
-
C:\Users\Admin\AppData\Local\Y77p2v\Secur32.dllMD5
b450f9877ac32e8092654ca0fd662d39
SHA107cd10b58f139d77cb4f604e7b25b607bb6fb3f7
SHA256957819da7f684fa448113088a1ca903022655cdc954e05f3c37f02b9ad2c9360
SHA512fce0215533eadaa65a1869271886df9fc2591b3e7a802a8e0b9791da13838b61a0a1d41d056db37ce01f8f20aae1c43688140db7a27db8f6ff65f7dea429a891
-
C:\Users\Admin\AppData\Local\Y77p2v\perfmon.exeMD5
3eb98cff1c242167df5fdbc6441ce3c5
SHA1730b27a1c92e8df1e60db5a6fc69ea1b24f68a69
SHA2566d8d5a244bb5a23c95653853fec3d04d2bdd2df5cff8cffb9848bddeb6adb081
SHA512f42be2a52d97fd1db2ed5a1a1a81a186a0aab41204980a103df33a4190632ba03f3cbb88fcea8da7ed9a5e15f60732d49a924b025fe6d3e623195ec1d37dfb35
-
C:\Users\Admin\AppData\Local\xG8\DevicePairingWizard.exeMD5
9728725678f32e84575e0cd2d2c58e9b
SHA1dd9505d3548f08e5198a8d6ba6bcd60b1da86d5c
SHA256d95d3aa065a657c354244e3d9d4dc62673dc36c1bed60650fade7d128ddab544
SHA512a5d22240450e7b659cba507f9abe7e6d861e9712ca2335ea5ceb69e3557362b00f5d02bf84c3a6fed82a09eda555866dcab43741ad9c6db96e1e302ef2363377
-
C:\Users\Admin\AppData\Local\xG8\MFC42u.dllMD5
137df002776cf86571205aec4a5ae8d4
SHA1a56288d683330ce5c38f5c1b7734d349e47ad3d9
SHA256e5735164983dd9a535f8d05b50c519c49178c64156746cc7a95c91262ebbb5b7
SHA512ffa37d3050577b08efbbeb8039b3fc40cf5324fbf5ae3702a1f24de04aaec9d31328a783a75b8a9e593fa919ac48d7e74d4f1c39bc0ae47803dbb2f303454f7c
-
\Users\Admin\AppData\Local\4vcWIkC\DUI70.dllMD5
73a3d0132a3cf361898e7227a2eecf46
SHA122ef47dc1cf35e50ef37f61adcefa3f51e3ae45c
SHA256688aefab069757476d7ffe27f8e15d80bd8914bab1a9543b728f656299e08a72
SHA51237b5b98bd6cec199b9314b65de0645f753f6684124a1050725c518ff37a60a02a759538b7d8ca6703cfb2a902f5a6fb70dae456cc9f9265426cd6f8ca6be9508
-
\Users\Admin\AppData\Local\4vcWIkC\WindowsAnytimeUpgradeResults.exeMD5
6f3f29905f0ec4ce22c1fd8acbf6c6de
SHA168bdfefe549dfa6262ad659f1578f3e87d862773
SHA256e9c4d718d09a28de8a99386b0dd65429f433837c712314e98ec4f01031af595b
SHA51216a9ad3183d7e11d9f0dd3c79363aa9a7af306f4f35a6f1e0cc1e175ef254e8052ec94dfd600dbe882f9ab41254d482cce9190ab7b0c005a34e46c66e8ff5f9e
-
\Users\Admin\AppData\Local\Y77p2v\Secur32.dllMD5
b450f9877ac32e8092654ca0fd662d39
SHA107cd10b58f139d77cb4f604e7b25b607bb6fb3f7
SHA256957819da7f684fa448113088a1ca903022655cdc954e05f3c37f02b9ad2c9360
SHA512fce0215533eadaa65a1869271886df9fc2591b3e7a802a8e0b9791da13838b61a0a1d41d056db37ce01f8f20aae1c43688140db7a27db8f6ff65f7dea429a891
-
\Users\Admin\AppData\Local\Y77p2v\perfmon.exeMD5
3eb98cff1c242167df5fdbc6441ce3c5
SHA1730b27a1c92e8df1e60db5a6fc69ea1b24f68a69
SHA2566d8d5a244bb5a23c95653853fec3d04d2bdd2df5cff8cffb9848bddeb6adb081
SHA512f42be2a52d97fd1db2ed5a1a1a81a186a0aab41204980a103df33a4190632ba03f3cbb88fcea8da7ed9a5e15f60732d49a924b025fe6d3e623195ec1d37dfb35
-
\Users\Admin\AppData\Local\xG8\DevicePairingWizard.exeMD5
9728725678f32e84575e0cd2d2c58e9b
SHA1dd9505d3548f08e5198a8d6ba6bcd60b1da86d5c
SHA256d95d3aa065a657c354244e3d9d4dc62673dc36c1bed60650fade7d128ddab544
SHA512a5d22240450e7b659cba507f9abe7e6d861e9712ca2335ea5ceb69e3557362b00f5d02bf84c3a6fed82a09eda555866dcab43741ad9c6db96e1e302ef2363377
-
\Users\Admin\AppData\Local\xG8\MFC42u.dllMD5
137df002776cf86571205aec4a5ae8d4
SHA1a56288d683330ce5c38f5c1b7734d349e47ad3d9
SHA256e5735164983dd9a535f8d05b50c519c49178c64156746cc7a95c91262ebbb5b7
SHA512ffa37d3050577b08efbbeb8039b3fc40cf5324fbf5ae3702a1f24de04aaec9d31328a783a75b8a9e593fa919ac48d7e74d4f1c39bc0ae47803dbb2f303454f7c
-
\Users\Admin\AppData\Roaming\Macromedia\Flash Player\#SharedObjects\F7RBUR3H\3AoEuRzC\DevicePairingWizard.exeMD5
9728725678f32e84575e0cd2d2c58e9b
SHA1dd9505d3548f08e5198a8d6ba6bcd60b1da86d5c
SHA256d95d3aa065a657c354244e3d9d4dc62673dc36c1bed60650fade7d128ddab544
SHA512a5d22240450e7b659cba507f9abe7e6d861e9712ca2335ea5ceb69e3557362b00f5d02bf84c3a6fed82a09eda555866dcab43741ad9c6db96e1e302ef2363377
-
memory/768-103-0x0000000000000000-mapping.dmp
-
memory/768-107-0x0000000140000000-0x000000014022D000-memory.dmpFilesize
2.2MB
-
memory/1180-88-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1180-101-0x0000000077270000-0x0000000077272000-memory.dmpFilesize
8KB
-
memory/1180-91-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1180-89-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1180-95-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1180-93-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1180-94-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1180-87-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1180-86-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1180-83-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1180-84-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1180-81-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1180-79-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1180-77-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1180-76-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1180-75-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1180-72-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1180-71-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1180-69-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1180-68-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1180-65-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1180-92-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1180-90-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1180-62-0x00000000037B0000-0x00000000037B1000-memory.dmpFilesize
4KB
-
memory/1180-85-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1180-82-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1180-80-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1180-78-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1180-63-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1180-74-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1180-73-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1180-70-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1180-67-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1180-64-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1180-66-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1220-118-0x0000000000000000-mapping.dmp
-
memory/1220-122-0x0000000140000000-0x0000000140200000-memory.dmpFilesize
2.0MB
-
memory/1456-115-0x0000000140000000-0x00000001401FA000-memory.dmpFilesize
2.0MB
-
memory/1456-114-0x000007FEFBAE1000-0x000007FEFBAE3000-memory.dmpFilesize
8KB
-
memory/1456-110-0x0000000000000000-mapping.dmp
-
memory/1696-59-0x0000000140000000-0x00000001401F9000-memory.dmpFilesize
2.0MB
-
memory/1696-61-0x0000000000110000-0x0000000000117000-memory.dmpFilesize
28KB