Analysis
-
max time kernel
152s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
17-04-2022 16:35
Static task
static1
Behavioral task
behavioral1
Sample
7589df6fc73705e680ebb569b62e9ac1517ed7f50ce4131e7fde26cdbacc9db2.dll
Resource
win7-20220414-en
General
-
Target
7589df6fc73705e680ebb569b62e9ac1517ed7f50ce4131e7fde26cdbacc9db2.dll
-
Size
693KB
-
MD5
08a19101e1128428702d7dd9f509bebd
-
SHA1
0d69fcb18412ad3216ce0ba4d8a3fdf36510d5c7
-
SHA256
7589df6fc73705e680ebb569b62e9ac1517ed7f50ce4131e7fde26cdbacc9db2
-
SHA512
12a9fe8a62323b65a9c0a85f29fb05eaba22c557b5e7bbc246c3092ea17f5bd4be7a61596d3b597c447ac33d3dd6b649c40b462571c2e825d990ffdbd0d8cb28
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/4964-130-0x0000000140000000-0x00000001400B2000-memory.dmp dridex_payload behavioral2/memory/4968-156-0x0000000140000000-0x00000001400F8000-memory.dmp dridex_payload behavioral2/memory/2320-164-0x0000000140000000-0x00000001400B3000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
dpapimig.exeSystemPropertiesProtection.exeCustomShellHost.exepid process 4968 dpapimig.exe 2320 SystemPropertiesProtection.exe 1564 CustomShellHost.exe -
Loads dropped DLL 3 IoCs
Processes:
dpapimig.exeSystemPropertiesProtection.exeCustomShellHost.exepid process 4968 dpapimig.exe 2320 SystemPropertiesProtection.exe 1564 CustomShellHost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Erihzxqqayujs = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Libraries\\ECyBSHM\\SystemPropertiesProtection.exe" -
Processes:
rundll32.exedpapimig.exeSystemPropertiesProtection.exeCustomShellHost.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dpapimig.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesProtection.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA CustomShellHost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 4964 rundll32.exe 4964 rundll32.exe 4964 rundll32.exe 4964 rundll32.exe 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 2084 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2084 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 2084 wrote to memory of 1904 2084 dpapimig.exe PID 2084 wrote to memory of 1904 2084 dpapimig.exe PID 2084 wrote to memory of 4968 2084 dpapimig.exe PID 2084 wrote to memory of 4968 2084 dpapimig.exe PID 2084 wrote to memory of 5112 2084 SystemPropertiesProtection.exe PID 2084 wrote to memory of 5112 2084 SystemPropertiesProtection.exe PID 2084 wrote to memory of 2320 2084 SystemPropertiesProtection.exe PID 2084 wrote to memory of 2320 2084 SystemPropertiesProtection.exe PID 2084 wrote to memory of 1636 2084 CustomShellHost.exe PID 2084 wrote to memory of 1636 2084 CustomShellHost.exe PID 2084 wrote to memory of 1564 2084 CustomShellHost.exe PID 2084 wrote to memory of 1564 2084 CustomShellHost.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\7589df6fc73705e680ebb569b62e9ac1517ed7f50ce4131e7fde26cdbacc9db2.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\dpapimig.exeC:\Windows\system32\dpapimig.exe1⤵
-
C:\Users\Admin\AppData\Local\cXz5a0QTo\dpapimig.exeC:\Users\Admin\AppData\Local\cXz5a0QTo\dpapimig.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\SystemPropertiesProtection.exeC:\Windows\system32\SystemPropertiesProtection.exe1⤵
-
C:\Users\Admin\AppData\Local\laSEY\SystemPropertiesProtection.exeC:\Users\Admin\AppData\Local\laSEY\SystemPropertiesProtection.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\CustomShellHost.exeC:\Windows\system32\CustomShellHost.exe1⤵
-
C:\Users\Admin\AppData\Local\Icb\CustomShellHost.exeC:\Users\Admin\AppData\Local\Icb\CustomShellHost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Icb\CustomShellHost.exeFilesize
835KB
MD570400e78b71bc8efdd063570428ae531
SHA1cd86ecd008914fdd0389ac2dc00fe92d87746096
SHA25691333f3282a2420359ae9d3adf537688741d21e964f021e2b152ab293447f289
SHA51253005dda237fb23af79f54779c74a09835ad4cad3ca7b9dcec80e3793a60dd262f45b910bef96ab9c8e69d0c6990fea6ca5fee85d7f8425db523ae658372959e
-
C:\Users\Admin\AppData\Local\Icb\WTSAPI32.dllFilesize
696KB
MD589865e3ef73bef7782564b7c8ec93ec7
SHA1bed5019fac15d3b137676d619c6261eacf22bb5e
SHA256d5bbeece79238b1e6399338db9fbd3556f9ccd0076ad6d6f4aeb922b83f6e5af
SHA512ea85183196dfb8307f3636027940c825b2ca682f62826bddf546b7445758f10a09336ef0520fded957e6eb88bcc018efd83a1c8fea5381555e9858bb59d05b50
-
C:\Users\Admin\AppData\Local\Icb\WTSAPI32.dllFilesize
696KB
MD589865e3ef73bef7782564b7c8ec93ec7
SHA1bed5019fac15d3b137676d619c6261eacf22bb5e
SHA256d5bbeece79238b1e6399338db9fbd3556f9ccd0076ad6d6f4aeb922b83f6e5af
SHA512ea85183196dfb8307f3636027940c825b2ca682f62826bddf546b7445758f10a09336ef0520fded957e6eb88bcc018efd83a1c8fea5381555e9858bb59d05b50
-
C:\Users\Admin\AppData\Local\cXz5a0QTo\DUI70.dllFilesize
970KB
MD51d055d0b5ded379e9a85e8c6e834eb3e
SHA1ec1cf5d9765701d263a7d7360d8c99ae6851c9e9
SHA2562e9c41cc953c7a5b4b9dc1a9a957089b5ed365b1dc1121ad4c49ca48efa5ce29
SHA5129bf57249fe2a4b8c7c6516a6c763f1592ef66348ea88339ca6a4807124121d0acda8e80088449592031ddc2478b3784c3bde3e3de52dd110f5e91a0ae5f9d2ba
-
C:\Users\Admin\AppData\Local\cXz5a0QTo\DUI70.dllFilesize
970KB
MD51d055d0b5ded379e9a85e8c6e834eb3e
SHA1ec1cf5d9765701d263a7d7360d8c99ae6851c9e9
SHA2562e9c41cc953c7a5b4b9dc1a9a957089b5ed365b1dc1121ad4c49ca48efa5ce29
SHA5129bf57249fe2a4b8c7c6516a6c763f1592ef66348ea88339ca6a4807124121d0acda8e80088449592031ddc2478b3784c3bde3e3de52dd110f5e91a0ae5f9d2ba
-
C:\Users\Admin\AppData\Local\cXz5a0QTo\dpapimig.exeFilesize
76KB
MD5b6d6477a0c90a81624c6a8548026b4d0
SHA1e6eac6941d27f76bbd306c2938c0a962dbf1ced1
SHA256a8147d08b82609c72d588a0a604cd3c1f2076befcc719d282c7cbd6525ae89eb
SHA51272ec8b79e3438f0f981129a323ad39db84df7dd14a796a820bdbc74ea8fa13eee843d1ea030a0c1caeda2e2d69952f14a821a73825b38dd9415047aca597b1fe
-
C:\Users\Admin\AppData\Local\laSEY\SYSDM.CPLFilesize
694KB
MD5c81529057238b704712f0eec79bf4476
SHA192c17517b7838fa0773d186d90827b0243d431c0
SHA25618a50aba0057acd6c4be3b93667604e07879de37477f70fa54a5c554ae9e395f
SHA51258964f9aec9d7ec5545ad73f60d6d260aceb1b904c956cd6e750512ddeee5d672574c432a4e910c9b440430d171923d7ad32821077044fa02dd67cceaec6611f
-
C:\Users\Admin\AppData\Local\laSEY\SYSDM.CPLFilesize
694KB
MD5c81529057238b704712f0eec79bf4476
SHA192c17517b7838fa0773d186d90827b0243d431c0
SHA25618a50aba0057acd6c4be3b93667604e07879de37477f70fa54a5c554ae9e395f
SHA51258964f9aec9d7ec5545ad73f60d6d260aceb1b904c956cd6e750512ddeee5d672574c432a4e910c9b440430d171923d7ad32821077044fa02dd67cceaec6611f
-
C:\Users\Admin\AppData\Local\laSEY\SystemPropertiesProtection.exeFilesize
82KB
MD526640d2d4fa912fc9a354ef6cfe500ff
SHA1a343fd82659ce2d8de3beb587088867cf2ab8857
SHA256a8ddf1b17b0cbc96a7eaedb0003aa7b1631da09ebfe85b387f8f630222511b37
SHA51226162a3d9d4a8e3290dbcf6fe387b5c48ab1d9552aa02a38954649d877f408cb282e57580f81e15128e3a41da0eb58328d1d6253e1b57232f9a8cecdd99991dc
-
memory/1564-175-0x0000021C848A0000-0x0000021C848A7000-memory.dmpFilesize
28KB
-
memory/1564-168-0x0000000000000000-mapping.dmp
-
memory/2084-137-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/2084-151-0x00007FF883B30000-0x00007FF883B40000-memory.dmpFilesize
64KB
-
memory/2084-139-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/2084-150-0x0000000000E50000-0x0000000000E57000-memory.dmpFilesize
28KB
-
memory/2084-138-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/2084-135-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/2084-134-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/2084-140-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/2084-141-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/2084-136-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/2320-160-0x0000000000000000-mapping.dmp
-
memory/2320-164-0x0000000140000000-0x00000001400B3000-memory.dmpFilesize
716KB
-
memory/2320-167-0x000001E52F750000-0x000001E52F757000-memory.dmpFilesize
28KB
-
memory/4964-130-0x0000000140000000-0x00000001400B2000-memory.dmpFilesize
712KB
-
memory/4964-133-0x00000138756F0000-0x00000138756F7000-memory.dmpFilesize
28KB
-
memory/4968-159-0x000002518AB10000-0x000002518AB17000-memory.dmpFilesize
28KB
-
memory/4968-156-0x0000000140000000-0x00000001400F8000-memory.dmpFilesize
992KB
-
memory/4968-152-0x0000000000000000-mapping.dmp