Analysis
-
max time kernel
153s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
19-04-2022 04:17
Static task
static1
Behavioral task
behavioral1
Sample
6aafd2dd448fa8e982695f250298f2e9c0927d4d90f80c57e6d57d69abed9a14.dll
Resource
win7-20220414-en
General
-
Target
6aafd2dd448fa8e982695f250298f2e9c0927d4d90f80c57e6d57d69abed9a14.dll
-
Size
965KB
-
MD5
8c626b0730876bc39bfad224fb742d3f
-
SHA1
b998aa15b53814de5407c2048440786dbcecd572
-
SHA256
6aafd2dd448fa8e982695f250298f2e9c0927d4d90f80c57e6d57d69abed9a14
-
SHA512
4ec780d3061245e18cb36268df014325142c9894ce59e33fcd9a87605afcfb872aa0aa53f09a76a2152004d7a0a20ab3e3438b952756c1bf4004b3b442082092
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3152-135-0x0000000000BB0000-0x0000000000BB1000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
DevicePairingWizard.exeSystemSettingsRemoveDevice.exesessionmsg.exepid process 4060 DevicePairingWizard.exe 4448 SystemSettingsRemoveDevice.exe 4388 sessionmsg.exe -
Loads dropped DLL 3 IoCs
Processes:
DevicePairingWizard.exeSystemSettingsRemoveDevice.exesessionmsg.exepid process 4060 DevicePairingWizard.exe 4448 SystemSettingsRemoveDevice.exe 4388 sessionmsg.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Eqzhtortkjjc = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\Windows\\STARTM~1\\Programs\\ADMINI~1\\XVpWT8\\SYSTEM~1.EXE" -
Processes:
rundll32.exeDevicePairingWizard.exeSystemSettingsRemoveDevice.exesessionmsg.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA DevicePairingWizard.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemSettingsRemoveDevice.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sessionmsg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 3308 rundll32.exe 3308 rundll32.exe 3308 rundll32.exe 3308 rundll32.exe 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 3152 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 3152 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3152 wrote to memory of 3664 3152 DevicePairingWizard.exe PID 3152 wrote to memory of 3664 3152 DevicePairingWizard.exe PID 3152 wrote to memory of 4060 3152 DevicePairingWizard.exe PID 3152 wrote to memory of 4060 3152 DevicePairingWizard.exe PID 3152 wrote to memory of 2624 3152 SystemSettingsRemoveDevice.exe PID 3152 wrote to memory of 2624 3152 SystemSettingsRemoveDevice.exe PID 3152 wrote to memory of 4448 3152 SystemSettingsRemoveDevice.exe PID 3152 wrote to memory of 4448 3152 SystemSettingsRemoveDevice.exe PID 3152 wrote to memory of 1552 3152 sessionmsg.exe PID 3152 wrote to memory of 1552 3152 sessionmsg.exe PID 3152 wrote to memory of 4388 3152 sessionmsg.exe PID 3152 wrote to memory of 4388 3152 sessionmsg.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\6aafd2dd448fa8e982695f250298f2e9c0927d4d90f80c57e6d57d69abed9a14.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\DevicePairingWizard.exeC:\Windows\system32\DevicePairingWizard.exe1⤵
-
C:\Users\Admin\AppData\Local\OeSJioUR\DevicePairingWizard.exeC:\Users\Admin\AppData\Local\OeSJioUR\DevicePairingWizard.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\SystemSettingsRemoveDevice.exeC:\Windows\system32\SystemSettingsRemoveDevice.exe1⤵
-
C:\Users\Admin\AppData\Local\wip3OUL\SystemSettingsRemoveDevice.exeC:\Users\Admin\AppData\Local\wip3OUL\SystemSettingsRemoveDevice.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\sessionmsg.exeC:\Windows\system32\sessionmsg.exe1⤵
-
C:\Users\Admin\AppData\Local\mu0EXJWD\sessionmsg.exeC:\Users\Admin\AppData\Local\mu0EXJWD\sessionmsg.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\OeSJioUR\DevicePairingWizard.exeFilesize
93KB
MD5d0e40a5a0c7dad2d6e5040d7fbc37533
SHA1b0eabbd37a97a1abcd90bd56394f5c45585699eb
SHA2562adaf3a5d3fde149626e3fef0e943c7029a135c04688acf357b2d8d04c81981b
SHA5121191c2efcadd53b74d085612025c44b6cd54dd69493632950e30ada650d5ed79e3468c138f389cd3bc21ea103059a63eb38d9d919a62d932a38830c93f57731f
-
C:\Users\Admin\AppData\Local\OeSJioUR\MFC42u.dllFilesize
992KB
MD5ac5013d45f3676057404c6b2ee1fa2f2
SHA14763f46bd762c7355b01b8a01715dd2d3abc8917
SHA2564f0ff54eed993a5db85157185e044cb70eae8ab491bc27e65ed618922d2f27b2
SHA5120db060badf534c2b97b2c8026214eb4baac17ca56ade601c1d25336d3d1da2bef59c681563810a0f94cebdb88a661d5bd7d24c84a7c25f4dc9cb99198848def1
-
C:\Users\Admin\AppData\Local\OeSJioUR\MFC42u.dllFilesize
992KB
MD5ac5013d45f3676057404c6b2ee1fa2f2
SHA14763f46bd762c7355b01b8a01715dd2d3abc8917
SHA2564f0ff54eed993a5db85157185e044cb70eae8ab491bc27e65ed618922d2f27b2
SHA5120db060badf534c2b97b2c8026214eb4baac17ca56ade601c1d25336d3d1da2bef59c681563810a0f94cebdb88a661d5bd7d24c84a7c25f4dc9cb99198848def1
-
C:\Users\Admin\AppData\Local\mu0EXJWD\DUser.dllFilesize
969KB
MD5d9544f2067fb5aa86c7df553af2d2d8f
SHA12ac5150422c51bd897eba74b2d64efb37645b75b
SHA256aac8e50a567b9f97a8450e55c04e4688a682ffa3e0e6f1c3c8c142104c2a5555
SHA512cc54dfb92b49086600b5d2a557dbe42c618b2f3536ccba1debfe23202489eee57dceb096bd1e2ea9d61700be551b9055b1e43590c5099a7c29629b3a55356c5f
-
C:\Users\Admin\AppData\Local\mu0EXJWD\DUser.dllFilesize
969KB
MD5d9544f2067fb5aa86c7df553af2d2d8f
SHA12ac5150422c51bd897eba74b2d64efb37645b75b
SHA256aac8e50a567b9f97a8450e55c04e4688a682ffa3e0e6f1c3c8c142104c2a5555
SHA512cc54dfb92b49086600b5d2a557dbe42c618b2f3536ccba1debfe23202489eee57dceb096bd1e2ea9d61700be551b9055b1e43590c5099a7c29629b3a55356c5f
-
C:\Users\Admin\AppData\Local\mu0EXJWD\sessionmsg.exeFilesize
85KB
MD5480f710806b68dfe478ca1ec7d7e79cc
SHA1b4fc97fed2dbff9c4874cb65ede7b50699db37cd
SHA2562416cd4aa577dbb2f8790a61e36fbab2b30bff81a4e1f67a5151c2fec29585bc
SHA51229d3d234ebc45049a533b6a91b246ac043a56b9af67276aaf493b014ae34d73000f99a6b0c0b85d2dfb7fba54811cf8bbdfd167a9eed01a8617b7f05bf2971db
-
C:\Users\Admin\AppData\Local\wip3OUL\DUI70.dllFilesize
1.2MB
MD5ba213aea01ba76410c695341b077e456
SHA1bafda39f014a3eac8571032ca9b98b487cd01b7a
SHA256001e8cb1ba603c0371bca0b6fc4b1a6d8fd54b7fb3bc6b174153fd53c488194c
SHA512d99c08f96cc348099487bcbae9d40937dbdf3fb21cfcc657e9386d270c6ed88c84f45609acd3c0ecad6c0fe3f0c8ad4651b2e82ce137e9136b6ef1480cce5b41
-
C:\Users\Admin\AppData\Local\wip3OUL\DUI70.dllFilesize
1.2MB
MD5ba213aea01ba76410c695341b077e456
SHA1bafda39f014a3eac8571032ca9b98b487cd01b7a
SHA256001e8cb1ba603c0371bca0b6fc4b1a6d8fd54b7fb3bc6b174153fd53c488194c
SHA512d99c08f96cc348099487bcbae9d40937dbdf3fb21cfcc657e9386d270c6ed88c84f45609acd3c0ecad6c0fe3f0c8ad4651b2e82ce137e9136b6ef1480cce5b41
-
C:\Users\Admin\AppData\Local\wip3OUL\SystemSettingsRemoveDevice.exeFilesize
39KB
MD57853f1c933690bb7c53c67151cbddeb0
SHA1d47a1ad0ccba4c988c8ffc5cbf9636fd4f4fa6e6
SHA2569500731b2a3442f11dfd08a8adfe027e7f32ef5834c628eed4b78be74168470d
SHA512831993d610539d44422d769de6561a4622e1b9cb3d73253774b6cecabf57654a74cd88b4ebe20921585ea96d977225b9501f02a0f6a1fc7d2cad6824fd539304
-
memory/3152-141-0x0000000140000000-0x00000001400F9000-memory.dmpFilesize
996KB
-
memory/3152-142-0x0000000140000000-0x00000001400F9000-memory.dmpFilesize
996KB
-
memory/3152-144-0x0000000140000000-0x00000001400F9000-memory.dmpFilesize
996KB
-
memory/3152-145-0x0000000140000000-0x00000001400F9000-memory.dmpFilesize
996KB
-
memory/3152-154-0x00007FFED8ABC000-0x00007FFED8ABD000-memory.dmpFilesize
4KB
-
memory/3152-155-0x00007FFED8A8C000-0x00007FFED8A8D000-memory.dmpFilesize
4KB
-
memory/3152-156-0x0000000000B80000-0x0000000000B87000-memory.dmpFilesize
28KB
-
memory/3152-157-0x00007FFED89D0000-0x00007FFED89E0000-memory.dmpFilesize
64KB
-
memory/3152-138-0x0000000140000000-0x00000001400F9000-memory.dmpFilesize
996KB
-
memory/3152-137-0x0000000140000000-0x00000001400F9000-memory.dmpFilesize
996KB
-
memory/3152-139-0x0000000140000000-0x00000001400F9000-memory.dmpFilesize
996KB
-
memory/3152-135-0x0000000000BB0000-0x0000000000BB1000-memory.dmpFilesize
4KB
-
memory/3152-140-0x0000000140000000-0x00000001400F9000-memory.dmpFilesize
996KB
-
memory/3152-143-0x0000000140000000-0x00000001400F9000-memory.dmpFilesize
996KB
-
memory/3152-136-0x0000000140000000-0x00000001400F9000-memory.dmpFilesize
996KB
-
memory/3308-130-0x0000000140000000-0x00000001400F9000-memory.dmpFilesize
996KB
-
memory/3308-134-0x000001A3B4500000-0x000001A3B4507000-memory.dmpFilesize
28KB
-
memory/4060-165-0x00000299A88A0000-0x00000299A88A7000-memory.dmpFilesize
28KB
-
memory/4060-162-0x0000000140000000-0x0000000140100000-memory.dmpFilesize
1024KB
-
memory/4060-158-0x0000000000000000-mapping.dmp
-
memory/4388-176-0x0000000000000000-mapping.dmp
-
memory/4388-180-0x0000000140000000-0x00000001400FB000-memory.dmpFilesize
1004KB
-
memory/4388-184-0x000001C71D500000-0x000001C71D507000-memory.dmpFilesize
28KB
-
memory/4448-171-0x0000000140000000-0x000000014013F000-memory.dmpFilesize
1.2MB
-
memory/4448-175-0x000001DEDFCD0000-0x000001DEDFCD7000-memory.dmpFilesize
28KB
-
memory/4448-167-0x0000000000000000-mapping.dmp