Analysis
-
max time kernel
152s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
19-04-2022 04:17
Static task
static1
Behavioral task
behavioral1
Sample
3c7bd82f6f0bc019c1188e929bd012ec14f8be0671f3e678c0836d01a007994d.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
3c7bd82f6f0bc019c1188e929bd012ec14f8be0671f3e678c0836d01a007994d.dll
Resource
win10v2004-20220414-en
General
-
Target
3c7bd82f6f0bc019c1188e929bd012ec14f8be0671f3e678c0836d01a007994d.dll
-
Size
967KB
-
MD5
9634f1a7a6036a22b6ad86a1a671ad58
-
SHA1
2b8e333675aaa8b8211cbbd56bcf8996d0380b92
-
SHA256
3c7bd82f6f0bc019c1188e929bd012ec14f8be0671f3e678c0836d01a007994d
-
SHA512
b73d2053f4ee906be366ae8631833cc9ce5837234768f7796cfb4f3c5eccebb78767191f16165303cddfec4706ed9669c348d7e2bafe1d98d8a1e62c7e8ff61a
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
dxgiadaptercache.exerdpinit.exeeudcedit.exepid process 2288 dxgiadaptercache.exe 1476 rdpinit.exe 2340 eudcedit.exe -
Loads dropped DLL 4 IoCs
Processes:
dxgiadaptercache.exerdpinit.exeeudcedit.exepid process 2288 dxgiadaptercache.exe 2288 dxgiadaptercache.exe 1476 rdpinit.exe 2340 eudcedit.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1081944012-3634099177-1681222835-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Erihzxqqayujs = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Crypto\\RSA\\S-1-5-21-1081944012-3634099177-1681222835-1000\\wLjUnl\\rdpinit.exe" -
Processes:
rundll32.exedxgiadaptercache.exerdpinit.exeeudcedit.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA dxgiadaptercache.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rdpinit.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA eudcedit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 5080 rundll32.exe 5080 rundll32.exe 5080 rundll32.exe 5080 rundll32.exe 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 2940 -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
pid process 2940 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 2940 wrote to memory of 1644 2940 dxgiadaptercache.exe PID 2940 wrote to memory of 1644 2940 dxgiadaptercache.exe PID 2940 wrote to memory of 2288 2940 dxgiadaptercache.exe PID 2940 wrote to memory of 2288 2940 dxgiadaptercache.exe PID 2940 wrote to memory of 3388 2940 rdpinit.exe PID 2940 wrote to memory of 3388 2940 rdpinit.exe PID 2940 wrote to memory of 1476 2940 rdpinit.exe PID 2940 wrote to memory of 1476 2940 rdpinit.exe PID 2940 wrote to memory of 4548 2940 eudcedit.exe PID 2940 wrote to memory of 4548 2940 eudcedit.exe PID 2940 wrote to memory of 2340 2940 eudcedit.exe PID 2940 wrote to memory of 2340 2940 eudcedit.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3c7bd82f6f0bc019c1188e929bd012ec14f8be0671f3e678c0836d01a007994d.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\dxgiadaptercache.exeC:\Windows\system32\dxgiadaptercache.exe1⤵
-
C:\Users\Admin\AppData\Local\lqW2\dxgiadaptercache.exeC:\Users\Admin\AppData\Local\lqW2\dxgiadaptercache.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\rdpinit.exeC:\Windows\system32\rdpinit.exe1⤵
-
C:\Users\Admin\AppData\Local\Tu6ndvaGf\rdpinit.exeC:\Users\Admin\AppData\Local\Tu6ndvaGf\rdpinit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
-
C:\Windows\system32\eudcedit.exeC:\Windows\system32\eudcedit.exe1⤵
-
C:\Users\Admin\AppData\Local\edOdH\eudcedit.exeC:\Users\Admin\AppData\Local\edOdH\eudcedit.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Tu6ndvaGf\dwmapi.dllFilesize
969KB
MD5b8ae87e5a1e1e1b907454a3d461f78cd
SHA188d8dbd7e36d36967d6cf658c2dd995aab55bd9a
SHA256c62df0a30356110511f0fbf548fb0438e85fc358583afac6f28dfcbdfe094e6b
SHA51273e88c5c186f71807289215d9e44a3411e438a266e3fc20719acf252953306ae5928458d0ead914fa9b9f984fb37dc48a3998cd6ab85539968f0b93dc76edf65
-
C:\Users\Admin\AppData\Local\Tu6ndvaGf\dwmapi.dllFilesize
969KB
MD5b8ae87e5a1e1e1b907454a3d461f78cd
SHA188d8dbd7e36d36967d6cf658c2dd995aab55bd9a
SHA256c62df0a30356110511f0fbf548fb0438e85fc358583afac6f28dfcbdfe094e6b
SHA51273e88c5c186f71807289215d9e44a3411e438a266e3fc20719acf252953306ae5928458d0ead914fa9b9f984fb37dc48a3998cd6ab85539968f0b93dc76edf65
-
C:\Users\Admin\AppData\Local\Tu6ndvaGf\rdpinit.exeFilesize
343KB
MD5b0ecd76d99c5f5134aeb52460add6f80
SHA151462078092c9d6b7fa2b9544ffe0a49eb258106
SHA25651251863097f7c80ef59606152ec59e7522881c8e3886c194c43f56bcab92e1b
SHA51216855c7db48b26297c78d37d52ad03f6af0f5a58e333e17ad83b34f5e8b200c5517c6481043af0ecf1b962af2378f38600bd968592f4e1018b5a1b9400adb367
-
C:\Users\Admin\AppData\Local\edOdH\MFC42u.dllFilesize
995KB
MD5d48ff166a96d02718a8733b56c7a97cd
SHA1b5fc1c096d4fe226600875db58e071e02d866195
SHA25644c1d3fe2082f04f785c382c568510da2abd5775a6ba1d64e1cf4a9d9c3534e7
SHA51217b47b497e1915406b6b780d4c2cec579b757a575756360d850b845e6928e87c2d51c5fe74df4a542aa46d2554b30a88c14eff13fbc0c0340cf1ba89621d6336
-
C:\Users\Admin\AppData\Local\edOdH\MFC42u.dllFilesize
995KB
MD5d48ff166a96d02718a8733b56c7a97cd
SHA1b5fc1c096d4fe226600875db58e071e02d866195
SHA25644c1d3fe2082f04f785c382c568510da2abd5775a6ba1d64e1cf4a9d9c3534e7
SHA51217b47b497e1915406b6b780d4c2cec579b757a575756360d850b845e6928e87c2d51c5fe74df4a542aa46d2554b30a88c14eff13fbc0c0340cf1ba89621d6336
-
C:\Users\Admin\AppData\Local\edOdH\eudcedit.exeFilesize
365KB
MD5a9de6557179d371938fbe52511b551ce
SHA1def460b4028788ded82dc55c36cb0df28599fd5f
SHA25683c8d1a7582b24b4bbc0d453c813487185c2b05c483bd1759ef647a7e7e92dfe
SHA5125790cac8dae16a785b48f790e6645b137f211c1587fb64ea88e743b846ff3a886324afcfef4bebc61f869023b9a22ba925c461dfb2e12497b70f501e6b79153c
-
C:\Users\Admin\AppData\Local\lqW2\dxgi.dllFilesize
968KB
MD5e366b0a9625da56102acffd6292d0fb3
SHA184cf1d85e03c8151d4867ac9c61a534f1ad9a128
SHA256f14d371e6bb2c7b5cd2565244a9791b5a2485d1521a9c2ef8a47cdce88632503
SHA512c4ca0772bf68fb1b89b3472238c9c1fa3cceeb811d6c0fa935c9ee5c339c358f7810bc59b29763a2387895c4b892ed90416abf55367bb94f7eafc92af89c7e13
-
C:\Users\Admin\AppData\Local\lqW2\dxgi.dllFilesize
968KB
MD5e366b0a9625da56102acffd6292d0fb3
SHA184cf1d85e03c8151d4867ac9c61a534f1ad9a128
SHA256f14d371e6bb2c7b5cd2565244a9791b5a2485d1521a9c2ef8a47cdce88632503
SHA512c4ca0772bf68fb1b89b3472238c9c1fa3cceeb811d6c0fa935c9ee5c339c358f7810bc59b29763a2387895c4b892ed90416abf55367bb94f7eafc92af89c7e13
-
C:\Users\Admin\AppData\Local\lqW2\dxgi.dllFilesize
968KB
MD5e366b0a9625da56102acffd6292d0fb3
SHA184cf1d85e03c8151d4867ac9c61a534f1ad9a128
SHA256f14d371e6bb2c7b5cd2565244a9791b5a2485d1521a9c2ef8a47cdce88632503
SHA512c4ca0772bf68fb1b89b3472238c9c1fa3cceeb811d6c0fa935c9ee5c339c358f7810bc59b29763a2387895c4b892ed90416abf55367bb94f7eafc92af89c7e13
-
C:\Users\Admin\AppData\Local\lqW2\dxgiadaptercache.exeFilesize
230KB
MD5e62f89130b7253f7780a862ed9aff294
SHA1b031e64a36e93f95f2061be5b0383069efac2070
SHA2564bea9f741fe4ca9d6262477849896b9fa6377326d11af044561c31bde2d994b5
SHA51205649d38a0b5d825bb8442549427b0ff77b139c9dd297b04d6c0fb1415504c95ed750cd79efea2ff514abfc5d1003e6251a3cd871d352dcea06be0cdeb0304f7
-
memory/1476-172-0x0000021516BB0000-0x0000021516BB7000-memory.dmpFilesize
28KB
-
memory/1476-164-0x0000000000000000-mapping.dmp
-
memory/2288-155-0x0000000000000000-mapping.dmp
-
memory/2288-160-0x0000000140000000-0x00000001400FA000-memory.dmpFilesize
1000KB
-
memory/2340-181-0x00000165A3430000-0x00000165A3437000-memory.dmpFilesize
28KB
-
memory/2340-177-0x0000000140000000-0x0000000140100000-memory.dmpFilesize
1024KB
-
memory/2340-173-0x0000000000000000-mapping.dmp
-
memory/2940-143-0x0000000140000000-0x00000001400F9000-memory.dmpFilesize
996KB
-
memory/2940-138-0x0000000140000000-0x00000001400F9000-memory.dmpFilesize
996KB
-
memory/2940-154-0x00007FFA17D30000-0x00007FFA17D40000-memory.dmpFilesize
64KB
-
memory/2940-141-0x0000000140000000-0x00000001400F9000-memory.dmpFilesize
996KB
-
memory/2940-140-0x0000000140000000-0x00000001400F9000-memory.dmpFilesize
996KB
-
memory/2940-135-0x0000000140000000-0x00000001400F9000-memory.dmpFilesize
996KB
-
memory/2940-139-0x0000000140000000-0x00000001400F9000-memory.dmpFilesize
996KB
-
memory/2940-142-0x0000000140000000-0x00000001400F9000-memory.dmpFilesize
996KB
-
memory/2940-145-0x0000000140000000-0x00000001400F9000-memory.dmpFilesize
996KB
-
memory/2940-137-0x0000000140000000-0x00000001400F9000-memory.dmpFilesize
996KB
-
memory/2940-136-0x0000000140000000-0x00000001400F9000-memory.dmpFilesize
996KB
-
memory/2940-144-0x00000000015B0000-0x00000000015B7000-memory.dmpFilesize
28KB
-
memory/5080-134-0x000002358E610000-0x000002358E617000-memory.dmpFilesize
28KB
-
memory/5080-130-0x0000000140000000-0x00000001400F9000-memory.dmpFilesize
996KB