Analysis
-
max time kernel
155s -
max time network
118s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
26-11-2021 09:32
Static task
static1
Behavioral task
behavioral1
Sample
a25acf9e95fa653dde6830bbe1dc4406804347b9d3f9a037f53f0a8e79296fe2.dll
Resource
win7-en-20211014
General
-
Target
a25acf9e95fa653dde6830bbe1dc4406804347b9d3f9a037f53f0a8e79296fe2.dll
-
Size
1.2MB
-
MD5
92d2b982db190dd73a46815f69730460
-
SHA1
fa22116b54799ed06e28dca5a813c4ac29f24184
-
SHA256
a25acf9e95fa653dde6830bbe1dc4406804347b9d3f9a037f53f0a8e79296fe2
-
SHA512
f8abc9da38f5f04d91e7f7c00ff8464914737f19a892374f960f511dd36c15ba2c901e53e2a4e4f5047d89f15af7f6d3fbb4e790e2147ca2a828ef3b3d32d122
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1368-60-0x00000000029B0000-0x00000000029B1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
Magnify.exeiexpress.exeSystemPropertiesRemote.exepid process 1256 Magnify.exe 1068 iexpress.exe 1300 SystemPropertiesRemote.exe -
Loads dropped DLL 7 IoCs
Processes:
Magnify.exeiexpress.exeSystemPropertiesRemote.exepid process 1368 1256 Magnify.exe 1368 1068 iexpress.exe 1368 1300 SystemPropertiesRemote.exe 1368 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gpavvclvseucyal = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\INTERN~1\\QUICKL~1\\USERPI~1\\IMPLIC~1\\y7Up6u\\iexpress.exe" -
Processes:
SystemPropertiesRemote.exerundll32.exeMagnify.exeiexpress.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesRemote.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Magnify.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA iexpress.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exeMagnify.exeiexpress.exepid process 1360 rundll32.exe 1360 rundll32.exe 1360 rundll32.exe 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1256 Magnify.exe 1256 Magnify.exe 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1368 1068 iexpress.exe 1068 iexpress.exe 1368 1368 1368 1368 1368 1368 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 1368 -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1368 wrote to memory of 1036 1368 Magnify.exe PID 1368 wrote to memory of 1036 1368 Magnify.exe PID 1368 wrote to memory of 1036 1368 Magnify.exe PID 1368 wrote to memory of 1256 1368 Magnify.exe PID 1368 wrote to memory of 1256 1368 Magnify.exe PID 1368 wrote to memory of 1256 1368 Magnify.exe PID 1368 wrote to memory of 1528 1368 iexpress.exe PID 1368 wrote to memory of 1528 1368 iexpress.exe PID 1368 wrote to memory of 1528 1368 iexpress.exe PID 1368 wrote to memory of 1068 1368 iexpress.exe PID 1368 wrote to memory of 1068 1368 iexpress.exe PID 1368 wrote to memory of 1068 1368 iexpress.exe PID 1368 wrote to memory of 1716 1368 SystemPropertiesRemote.exe PID 1368 wrote to memory of 1716 1368 SystemPropertiesRemote.exe PID 1368 wrote to memory of 1716 1368 SystemPropertiesRemote.exe PID 1368 wrote to memory of 1300 1368 SystemPropertiesRemote.exe PID 1368 wrote to memory of 1300 1368 SystemPropertiesRemote.exe PID 1368 wrote to memory of 1300 1368 SystemPropertiesRemote.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\a25acf9e95fa653dde6830bbe1dc4406804347b9d3f9a037f53f0a8e79296fe2.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\Magnify.exeC:\Windows\system32\Magnify.exe1⤵
-
C:\Users\Admin\AppData\Local\ls1LNpv\Magnify.exeC:\Users\Admin\AppData\Local\ls1LNpv\Magnify.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\iexpress.exeC:\Windows\system32\iexpress.exe1⤵
-
C:\Users\Admin\AppData\Local\sg2\iexpress.exeC:\Users\Admin\AppData\Local\sg2\iexpress.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\SystemPropertiesRemote.exeC:\Windows\system32\SystemPropertiesRemote.exe1⤵
-
C:\Users\Admin\AppData\Local\bBMMDV\SystemPropertiesRemote.exeC:\Users\Admin\AppData\Local\bBMMDV\SystemPropertiesRemote.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\bBMMDV\SYSDM.CPLMD5
09d144fd9c7e536b212e677ce25be3c6
SHA136da6595975d8c5a19d7f0d75693f30b28040f85
SHA256b06e8517f20c0e699807226d06de76a3f0ad7ec46290901ccdd71e9b8c663848
SHA5120e7149890e3c8d60c47fdb26ee3b8574b7ad2f6cad089f763ac2205cae1e09853629fc5866fabb16af46961d3a64f668eef2feb3c35c7e43982153f118e6974e
-
C:\Users\Admin\AppData\Local\bBMMDV\SystemPropertiesRemote.exeMD5
d0d7ac869aa4e179da2cc333f0440d71
SHA1e7b9a58f5bfc1ec321f015641a60978c0c683894
SHA2565762e1570de6ca4ff4254d03c8f6e572f3b9c065bf5c78fd5a9ea3769c33818a
SHA5121808b10dc85f8755a0074d1ea00794b46b4254573b6862c2813a89ca171ad94f95262e8b59a8f9a596c9bd6a724f440a14a813eab93aa140e818ee97af106db7
-
C:\Users\Admin\AppData\Local\ls1LNpv\Magnify.exeMD5
233b45ddf77bd45e53872881cff1839b
SHA1d4b8cafce4664bb339859a90a9dd1506f831756d
SHA256adfd109ec03cd57e44dbd5fd1c4d8c47f8f58f887f690ba3c92f744b670fd75a
SHA5126fb5f730633bfb2d063e6bc8cf37a7624bdcde2bd1d0c92b6b9a557484e7acf5d3a2be354808cade751f7ac5c5fe936e765f6494ef54b4fdb2725179f0d0fe39
-
C:\Users\Admin\AppData\Local\ls1LNpv\Magnify.exeMD5
233b45ddf77bd45e53872881cff1839b
SHA1d4b8cafce4664bb339859a90a9dd1506f831756d
SHA256adfd109ec03cd57e44dbd5fd1c4d8c47f8f58f887f690ba3c92f744b670fd75a
SHA5126fb5f730633bfb2d063e6bc8cf37a7624bdcde2bd1d0c92b6b9a557484e7acf5d3a2be354808cade751f7ac5c5fe936e765f6494ef54b4fdb2725179f0d0fe39
-
C:\Users\Admin\AppData\Local\ls1LNpv\dwmapi.dllMD5
287b1c1ae358698e80f9f52261ff4d94
SHA11c36fed7730db0234194b58862d03e7d8bc9f6fa
SHA256a8c96ff269fb666f58ce42c8455f47cf452b98dedef2a8b3c84a4366c750fef1
SHA512d1f15be88641c1ed25819fc47b87609d34900be244c37149bbf487280efd09b068a52302da6c72e095c82f12dc9eb523a59def9fe456bf72582f00f89643881b
-
C:\Users\Admin\AppData\Local\sg2\VERSION.dllMD5
23314ddfd1b18ad9361850353c9c6527
SHA1b74cd8ea6dd6e59fa2cce22303be0f3d5f0b1fb8
SHA256d618dd45950830f8f58d607612d99931e5a7d52c2015f69a38d687c04157f9f3
SHA512fc426153598d5bc22c24c60ce57e09c2fa7528a9ffc6b600ad3f536fd0c415bdc5f3c8a4a55b37a992ba0fb245757ba9719a79f9dee6987e31dcb53427118521
-
C:\Users\Admin\AppData\Local\sg2\iexpress.exeMD5
46fd16f9b1924a2ea8cd5c6716cc654f
SHA199284bc91cf829e9602b4b95811c1d72977700b6
SHA2569f993a1f6a133fa8375eab99bf1710471dd13ef177ef713acf8921fb4ff565a3
SHA51252c91043f514f3f8ce07f8e60357786eb7236fcf6cdcccca0dd76000b9a23d6b138cebcdec53b01823cb2313ec850fc7bece326ec01d44ed33f4052b789b7629
-
\Users\Admin\AppData\Local\bBMMDV\SYSDM.CPLMD5
09d144fd9c7e536b212e677ce25be3c6
SHA136da6595975d8c5a19d7f0d75693f30b28040f85
SHA256b06e8517f20c0e699807226d06de76a3f0ad7ec46290901ccdd71e9b8c663848
SHA5120e7149890e3c8d60c47fdb26ee3b8574b7ad2f6cad089f763ac2205cae1e09853629fc5866fabb16af46961d3a64f668eef2feb3c35c7e43982153f118e6974e
-
\Users\Admin\AppData\Local\bBMMDV\SystemPropertiesRemote.exeMD5
d0d7ac869aa4e179da2cc333f0440d71
SHA1e7b9a58f5bfc1ec321f015641a60978c0c683894
SHA2565762e1570de6ca4ff4254d03c8f6e572f3b9c065bf5c78fd5a9ea3769c33818a
SHA5121808b10dc85f8755a0074d1ea00794b46b4254573b6862c2813a89ca171ad94f95262e8b59a8f9a596c9bd6a724f440a14a813eab93aa140e818ee97af106db7
-
\Users\Admin\AppData\Local\ls1LNpv\Magnify.exeMD5
233b45ddf77bd45e53872881cff1839b
SHA1d4b8cafce4664bb339859a90a9dd1506f831756d
SHA256adfd109ec03cd57e44dbd5fd1c4d8c47f8f58f887f690ba3c92f744b670fd75a
SHA5126fb5f730633bfb2d063e6bc8cf37a7624bdcde2bd1d0c92b6b9a557484e7acf5d3a2be354808cade751f7ac5c5fe936e765f6494ef54b4fdb2725179f0d0fe39
-
\Users\Admin\AppData\Local\ls1LNpv\dwmapi.dllMD5
287b1c1ae358698e80f9f52261ff4d94
SHA11c36fed7730db0234194b58862d03e7d8bc9f6fa
SHA256a8c96ff269fb666f58ce42c8455f47cf452b98dedef2a8b3c84a4366c750fef1
SHA512d1f15be88641c1ed25819fc47b87609d34900be244c37149bbf487280efd09b068a52302da6c72e095c82f12dc9eb523a59def9fe456bf72582f00f89643881b
-
\Users\Admin\AppData\Local\sg2\VERSION.dllMD5
23314ddfd1b18ad9361850353c9c6527
SHA1b74cd8ea6dd6e59fa2cce22303be0f3d5f0b1fb8
SHA256d618dd45950830f8f58d607612d99931e5a7d52c2015f69a38d687c04157f9f3
SHA512fc426153598d5bc22c24c60ce57e09c2fa7528a9ffc6b600ad3f536fd0c415bdc5f3c8a4a55b37a992ba0fb245757ba9719a79f9dee6987e31dcb53427118521
-
\Users\Admin\AppData\Local\sg2\iexpress.exeMD5
46fd16f9b1924a2ea8cd5c6716cc654f
SHA199284bc91cf829e9602b4b95811c1d72977700b6
SHA2569f993a1f6a133fa8375eab99bf1710471dd13ef177ef713acf8921fb4ff565a3
SHA51252c91043f514f3f8ce07f8e60357786eb7236fcf6cdcccca0dd76000b9a23d6b138cebcdec53b01823cb2313ec850fc7bece326ec01d44ed33f4052b789b7629
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\kL\SystemPropertiesRemote.exeMD5
d0d7ac869aa4e179da2cc333f0440d71
SHA1e7b9a58f5bfc1ec321f015641a60978c0c683894
SHA2565762e1570de6ca4ff4254d03c8f6e572f3b9c065bf5c78fd5a9ea3769c33818a
SHA5121808b10dc85f8755a0074d1ea00794b46b4254573b6862c2813a89ca171ad94f95262e8b59a8f9a596c9bd6a724f440a14a813eab93aa140e818ee97af106db7
-
memory/1068-98-0x0000000000000000-mapping.dmp
-
memory/1068-102-0x000007FEF6280000-0x000007FEF63AD000-memory.dmpFilesize
1.2MB
-
memory/1256-92-0x000007FEF6320000-0x000007FEF644D000-memory.dmpFilesize
1.2MB
-
memory/1256-89-0x000007FEFB831000-0x000007FEFB833000-memory.dmpFilesize
8KB
-
memory/1256-87-0x0000000000000000-mapping.dmp
-
memory/1300-107-0x0000000000000000-mapping.dmp
-
memory/1360-55-0x000007FEF6320000-0x000007FEF644C000-memory.dmpFilesize
1.2MB
-
memory/1360-59-0x0000000000100000-0x0000000000107000-memory.dmpFilesize
28KB
-
memory/1368-70-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/1368-85-0x0000000077160000-0x0000000077162000-memory.dmpFilesize
8KB
-
memory/1368-79-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/1368-80-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/1368-78-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/1368-77-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/1368-76-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/1368-75-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/1368-69-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/1368-74-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/1368-73-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/1368-72-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/1368-71-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/1368-68-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/1368-66-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/1368-67-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/1368-61-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/1368-65-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/1368-64-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/1368-63-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/1368-62-0x0000000140000000-0x000000014012C000-memory.dmpFilesize
1.2MB
-
memory/1368-60-0x00000000029B0000-0x00000000029B1000-memory.dmpFilesize
4KB