Analysis
-
max time kernel
163s -
max time network
143s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
26-11-2021 09:26
Static task
static1
Behavioral task
behavioral1
Sample
c876113220b534ba1da612f3ca0eb30a735548a20e6b70b5bf547bc7ce3e1794.dll
Resource
win7-en-20211014
General
-
Target
c876113220b534ba1da612f3ca0eb30a735548a20e6b70b5bf547bc7ce3e1794.dll
-
Size
1.5MB
-
MD5
9b7b23ecfe0f8461fd0d9a7e5e590e31
-
SHA1
616a00949db4ce3fb3e13ddfda0f288ad39d2877
-
SHA256
c876113220b534ba1da612f3ca0eb30a735548a20e6b70b5bf547bc7ce3e1794
-
SHA512
1f715cf068481951a697caa17ed94ddf3afec21186de5674d4d138a2ae8635e8f5879053fca0ec99bf33169737d8298146f000702a900487a8c5f45d5bc53875
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3056-124-0x0000000000660000-0x0000000000661000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
Magnify.exeRdpSaUacHelper.exeMagnify.exepid process 1272 Magnify.exe 1660 RdpSaUacHelper.exe 1104 Magnify.exe -
Loads dropped DLL 3 IoCs
Processes:
Magnify.exeRdpSaUacHelper.exeMagnify.exepid process 1272 Magnify.exe 1660 RdpSaUacHelper.exe 1104 Magnify.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1042495040-510797905-2613508344-1000\Software\Microsoft\Windows\CurrentVersion\Run\Ziekmjidk = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Recent\\CustomDestinations\\lyNW2wUZ\\RdpSaUacHelper.exe" -
Processes:
RdpSaUacHelper.exeMagnify.exerundll32.exeMagnify.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA RdpSaUacHelper.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Magnify.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Magnify.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 3764 rundll32.exe 3764 rundll32.exe 3764 rundll32.exe 3764 rundll32.exe 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 3056 -
Suspicious behavior: GetForegroundWindowSpam 5 IoCs
Processes:
rundll32.exeMagnify.exeRdpSaUacHelper.exeMagnify.exepid process 3764 rundll32.exe 3056 1272 Magnify.exe 1660 RdpSaUacHelper.exe 1104 Magnify.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3056 wrote to memory of 1276 3056 Magnify.exe PID 3056 wrote to memory of 1276 3056 Magnify.exe PID 3056 wrote to memory of 1272 3056 Magnify.exe PID 3056 wrote to memory of 1272 3056 Magnify.exe PID 3056 wrote to memory of 1500 3056 RdpSaUacHelper.exe PID 3056 wrote to memory of 1500 3056 RdpSaUacHelper.exe PID 3056 wrote to memory of 1660 3056 RdpSaUacHelper.exe PID 3056 wrote to memory of 1660 3056 RdpSaUacHelper.exe PID 3056 wrote to memory of 720 3056 Magnify.exe PID 3056 wrote to memory of 720 3056 Magnify.exe PID 3056 wrote to memory of 1104 3056 Magnify.exe PID 3056 wrote to memory of 1104 3056 Magnify.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c876113220b534ba1da612f3ca0eb30a735548a20e6b70b5bf547bc7ce3e1794.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:3764
-
C:\Windows\system32\Magnify.exeC:\Windows\system32\Magnify.exe1⤵PID:1276
-
C:\Users\Admin\AppData\Local\HWS\Magnify.exeC:\Users\Admin\AppData\Local\HWS\Magnify.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
PID:1272
-
C:\Windows\system32\RdpSaUacHelper.exeC:\Windows\system32\RdpSaUacHelper.exe1⤵PID:1500
-
C:\Users\Admin\AppData\Local\bczZecb\RdpSaUacHelper.exeC:\Users\Admin\AppData\Local\bczZecb\RdpSaUacHelper.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
PID:1660
-
C:\Windows\system32\Magnify.exeC:\Windows\system32\Magnify.exe1⤵PID:720
-
C:\Users\Admin\AppData\Local\CXmBroCG\Magnify.exeC:\Users\Admin\AppData\Local\CXmBroCG\Magnify.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: GetForegroundWindowSpam
PID:1104
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
0c3925b9a284f0dd02571d0d2bca19ee
SHA1a73451bb2ddd09397cb7737d36a75c0cdfdf9d51
SHA25641e91d736995628275261aa1adb14158e0783b36c913ef5fc681da105a4272cc
SHA512db02a3211b1b2cf7b10cd70148404106be6cb4a63c7c0c0526256f983c3ad756c157a67848173208e7c0d88a8f34b73c42d37b24f5cc1f9da66731731a534a72
-
MD5
be2b908ea709252a7d6e48826c6f4eb9
SHA1b1adcae7e16bd74848f568d58ea4bc601c8f8ed3
SHA256dc55fcd4f459e056ca687ee8a78589ff88d3160f5bdfc14b59f80f585a466b5f
SHA512fad070839dce8a7255f39134c147e2fb9c39e924735dc32fa001815b5705223eae9a842e4ca0a38f0cbf442651d7b8d567007b6b4e4bdb507cd616816a6b440d
-
MD5
b19279254e270cfd7b785a7b53f930ff
SHA12736eadf5bdbb4a38519243ebb460d60148a00b0
SHA2565392b39662e0885caff964317938470a876a092158474527a35cd1f95d9c9ada
SHA5123268c310d2f6213861e72ad751a1cb832eaf54b7f2d834c1302dfd0f927789c7b0f7d2da379d15f7e011037107ddb5cd7a83d12c6e899dd27a6cf64c7d035cd5
-
MD5
0c3925b9a284f0dd02571d0d2bca19ee
SHA1a73451bb2ddd09397cb7737d36a75c0cdfdf9d51
SHA25641e91d736995628275261aa1adb14158e0783b36c913ef5fc681da105a4272cc
SHA512db02a3211b1b2cf7b10cd70148404106be6cb4a63c7c0c0526256f983c3ad756c157a67848173208e7c0d88a8f34b73c42d37b24f5cc1f9da66731731a534a72
-
MD5
0e8c26287144226d1e9db0d3fd02102f
SHA12c800a7226c1e6f29c26899525c7c2d1eb850943
SHA2564e190c57b28faba314b89b0504c82f578bd988478807ba5b1ada1cd238f8aac0
SHA512673559d1c321950187625b04a04f8708ed50f13f84f0f7470b55552374b32ae4a382bd30671029513077f65cd32f50577653e87bf272c706476d20785f976236
-
MD5
dd34f3feea11bc5f25976eb42549118e
SHA12f3e6f083dbe439c6e364fa20f4d5fd2d84eb413
SHA2564b396ec3d314f581d0e7d3bc1a4e78e4162410901ca5773467db23f3bdc39763
SHA5120cb2eb6635cbe128f3c1fcdf9c483ebfaa4e61159e63a0f87fc251a061911b746280822b9f9d6aff597e543febf1a92a506855ca0c66d800d5a17b018ac486f3
-
MD5
be2b908ea709252a7d6e48826c6f4eb9
SHA1b1adcae7e16bd74848f568d58ea4bc601c8f8ed3
SHA256dc55fcd4f459e056ca687ee8a78589ff88d3160f5bdfc14b59f80f585a466b5f
SHA512fad070839dce8a7255f39134c147e2fb9c39e924735dc32fa001815b5705223eae9a842e4ca0a38f0cbf442651d7b8d567007b6b4e4bdb507cd616816a6b440d
-
MD5
b19279254e270cfd7b785a7b53f930ff
SHA12736eadf5bdbb4a38519243ebb460d60148a00b0
SHA2565392b39662e0885caff964317938470a876a092158474527a35cd1f95d9c9ada
SHA5123268c310d2f6213861e72ad751a1cb832eaf54b7f2d834c1302dfd0f927789c7b0f7d2da379d15f7e011037107ddb5cd7a83d12c6e899dd27a6cf64c7d035cd5
-
MD5
dd34f3feea11bc5f25976eb42549118e
SHA12f3e6f083dbe439c6e364fa20f4d5fd2d84eb413
SHA2564b396ec3d314f581d0e7d3bc1a4e78e4162410901ca5773467db23f3bdc39763
SHA5120cb2eb6635cbe128f3c1fcdf9c483ebfaa4e61159e63a0f87fc251a061911b746280822b9f9d6aff597e543febf1a92a506855ca0c66d800d5a17b018ac486f3