Analysis
-
max time kernel
151s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
19-04-2022 04:18
Static task
static1
Behavioral task
behavioral1
Sample
30316f6ec4932f0788a2ecc6a93e5f7313121241d94caf544f314f1a2615fa46.dll
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
30316f6ec4932f0788a2ecc6a93e5f7313121241d94caf544f314f1a2615fa46.dll
Resource
win10v2004-20220414-en
General
-
Target
30316f6ec4932f0788a2ecc6a93e5f7313121241d94caf544f314f1a2615fa46.dll
-
Size
969KB
-
MD5
cfc7e196da21d39bd421129550403f36
-
SHA1
fbf099967e30871fc4f12c9b448b988aefbeafb5
-
SHA256
30316f6ec4932f0788a2ecc6a93e5f7313121241d94caf544f314f1a2615fa46
-
SHA512
29ed93906917a1d12151e561a93118fc4278787f6cd7b471136ff22643b1da032441d86b8687c445352774c32dc7cc563ec4759f51b24ac13a8d6dc81ed6ab6a
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1256-59-0x0000000002A40000-0x0000000002A41000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
SystemPropertiesAdvanced.exeperfmon.exeMagnify.exepid process 588 SystemPropertiesAdvanced.exe 1068 perfmon.exe 1960 Magnify.exe -
Loads dropped DLL 7 IoCs
Processes:
SystemPropertiesAdvanced.exeperfmon.exeMagnify.exepid process 1256 588 SystemPropertiesAdvanced.exe 1256 1068 perfmon.exe 1256 1960 Magnify.exe 1256 -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Windows\CurrentVersion\Run\Gcehmtlftxqmyqm = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\SendTo\\i9LGdf\\perfmon.exe" -
Processes:
rundll32.exeSystemPropertiesAdvanced.exeperfmon.exeMagnify.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA SystemPropertiesAdvanced.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA perfmon.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Magnify.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exeSystemPropertiesAdvanced.exeperfmon.exepid process 904 rundll32.exe 904 rundll32.exe 904 rundll32.exe 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 588 SystemPropertiesAdvanced.exe 588 SystemPropertiesAdvanced.exe 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1256 1068 perfmon.exe 1068 perfmon.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
description pid process target process PID 1256 wrote to memory of 592 1256 SystemPropertiesAdvanced.exe PID 1256 wrote to memory of 592 1256 SystemPropertiesAdvanced.exe PID 1256 wrote to memory of 592 1256 SystemPropertiesAdvanced.exe PID 1256 wrote to memory of 588 1256 SystemPropertiesAdvanced.exe PID 1256 wrote to memory of 588 1256 SystemPropertiesAdvanced.exe PID 1256 wrote to memory of 588 1256 SystemPropertiesAdvanced.exe PID 1256 wrote to memory of 1680 1256 perfmon.exe PID 1256 wrote to memory of 1680 1256 perfmon.exe PID 1256 wrote to memory of 1680 1256 perfmon.exe PID 1256 wrote to memory of 1068 1256 perfmon.exe PID 1256 wrote to memory of 1068 1256 perfmon.exe PID 1256 wrote to memory of 1068 1256 perfmon.exe PID 1256 wrote to memory of 576 1256 Magnify.exe PID 1256 wrote to memory of 576 1256 Magnify.exe PID 1256 wrote to memory of 576 1256 Magnify.exe PID 1256 wrote to memory of 1960 1256 Magnify.exe PID 1256 wrote to memory of 1960 1256 Magnify.exe PID 1256 wrote to memory of 1960 1256 Magnify.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\30316f6ec4932f0788a2ecc6a93e5f7313121241d94caf544f314f1a2615fa46.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\SystemPropertiesAdvanced.exeC:\Windows\system32\SystemPropertiesAdvanced.exe1⤵
-
C:\Users\Admin\AppData\Local\kUm\SystemPropertiesAdvanced.exeC:\Users\Admin\AppData\Local\kUm\SystemPropertiesAdvanced.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\perfmon.exeC:\Windows\system32\perfmon.exe1⤵
-
C:\Users\Admin\AppData\Local\xz4QE6\perfmon.exeC:\Users\Admin\AppData\Local\xz4QE6\perfmon.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\system32\Magnify.exeC:\Windows\system32\Magnify.exe1⤵
-
C:\Users\Admin\AppData\Local\wMuEb\Magnify.exeC:\Users\Admin\AppData\Local\wMuEb\Magnify.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\kUm\SYSDM.CPLFilesize
970KB
MD55c83e7ddb1f799369cfe2dfd621c92f5
SHA145d9c4beb8f9321fcd7a6a25fe57174821a02961
SHA2565017e4ded65a3dde8c061b64ce37f455f91bc9ca73e5700f4bfa85193f1822a6
SHA512d270747361e50bb4b50e6a1fc0cce02f932714744e05f5b1c92f7df1d02475f6659c8ccfb756091f805b3d1a5b286c7e8eb77ced6dd0249bd2f76d69c1d9b8d5
-
C:\Users\Admin\AppData\Local\kUm\SystemPropertiesAdvanced.exeFilesize
80KB
MD525dc1e599591871c074a68708206e734
SHA127a9dffa92d979d39c07d889fada536c062dac77
SHA256a13b2ba5892c11c731869410b1e3dd2f250d70ff9efd513a9f260ab506dd42ef
SHA512f7da9ce4c3e8aea9095fcc977084c042f85df48fca0b58fb136dfd835ce69b5b1e68f3c11eeb14c617ffcec7011ffc7e5d5a948f49dde653a2348b28e10adb72
-
C:\Users\Admin\AppData\Local\wMuEb\Magnify.exeFilesize
637KB
MD5233b45ddf77bd45e53872881cff1839b
SHA1d4b8cafce4664bb339859a90a9dd1506f831756d
SHA256adfd109ec03cd57e44dbd5fd1c4d8c47f8f58f887f690ba3c92f744b670fd75a
SHA5126fb5f730633bfb2d063e6bc8cf37a7624bdcde2bd1d0c92b6b9a557484e7acf5d3a2be354808cade751f7ac5c5fe936e765f6494ef54b4fdb2725179f0d0fe39
-
C:\Users\Admin\AppData\Local\wMuEb\Magnify.exeFilesize
637KB
MD5233b45ddf77bd45e53872881cff1839b
SHA1d4b8cafce4664bb339859a90a9dd1506f831756d
SHA256adfd109ec03cd57e44dbd5fd1c4d8c47f8f58f887f690ba3c92f744b670fd75a
SHA5126fb5f730633bfb2d063e6bc8cf37a7624bdcde2bd1d0c92b6b9a557484e7acf5d3a2be354808cade751f7ac5c5fe936e765f6494ef54b4fdb2725179f0d0fe39
-
C:\Users\Admin\AppData\Local\wMuEb\dwmapi.dllFilesize
971KB
MD530255a2045fd63625bd4fb23c5593abe
SHA1feab1a140f650c225c0cf3aee18e36ed5481d559
SHA2566b45d8cea2d5e8c1ab45b6ed61c428eaf9365a4cf0c9ab981ccfb871673e7fdd
SHA512ea3138514c9fa6daaa3247a89d048ecdaaf10220e40d89779389224767131a835c2d8a86c3ed713f0ac7c7705ec2ac554d8f5f02e7cd63b1571d21d8b938392f
-
C:\Users\Admin\AppData\Local\xz4QE6\Secur32.dllFilesize
973KB
MD555630297883cc907856f1b1aa1dcd9c0
SHA194854b535539b03776a01eacdbe226ed1a416238
SHA256f3eb702091453d6b15bee47af7ac5e3c3e388203eeb649e5e25a8a6466e9672b
SHA512f4d76049cd10ac2607205477ad3eacb5a8a3da772bb1aea136e8fc45d905e27dde1d01f24f5e48f3c9e69adf6bd4cadbf5163d70d62b5017f41e1749a3e28d76
-
C:\Users\Admin\AppData\Local\xz4QE6\perfmon.exeFilesize
168KB
MD53eb98cff1c242167df5fdbc6441ce3c5
SHA1730b27a1c92e8df1e60db5a6fc69ea1b24f68a69
SHA2566d8d5a244bb5a23c95653853fec3d04d2bdd2df5cff8cffb9848bddeb6adb081
SHA512f42be2a52d97fd1db2ed5a1a1a81a186a0aab41204980a103df33a4190632ba03f3cbb88fcea8da7ed9a5e15f60732d49a924b025fe6d3e623195ec1d37dfb35
-
\Users\Admin\AppData\Local\kUm\SYSDM.CPLFilesize
970KB
MD55c83e7ddb1f799369cfe2dfd621c92f5
SHA145d9c4beb8f9321fcd7a6a25fe57174821a02961
SHA2565017e4ded65a3dde8c061b64ce37f455f91bc9ca73e5700f4bfa85193f1822a6
SHA512d270747361e50bb4b50e6a1fc0cce02f932714744e05f5b1c92f7df1d02475f6659c8ccfb756091f805b3d1a5b286c7e8eb77ced6dd0249bd2f76d69c1d9b8d5
-
\Users\Admin\AppData\Local\kUm\SystemPropertiesAdvanced.exeFilesize
80KB
MD525dc1e599591871c074a68708206e734
SHA127a9dffa92d979d39c07d889fada536c062dac77
SHA256a13b2ba5892c11c731869410b1e3dd2f250d70ff9efd513a9f260ab506dd42ef
SHA512f7da9ce4c3e8aea9095fcc977084c042f85df48fca0b58fb136dfd835ce69b5b1e68f3c11eeb14c617ffcec7011ffc7e5d5a948f49dde653a2348b28e10adb72
-
\Users\Admin\AppData\Local\wMuEb\Magnify.exeFilesize
637KB
MD5233b45ddf77bd45e53872881cff1839b
SHA1d4b8cafce4664bb339859a90a9dd1506f831756d
SHA256adfd109ec03cd57e44dbd5fd1c4d8c47f8f58f887f690ba3c92f744b670fd75a
SHA5126fb5f730633bfb2d063e6bc8cf37a7624bdcde2bd1d0c92b6b9a557484e7acf5d3a2be354808cade751f7ac5c5fe936e765f6494ef54b4fdb2725179f0d0fe39
-
\Users\Admin\AppData\Local\wMuEb\dwmapi.dllFilesize
971KB
MD530255a2045fd63625bd4fb23c5593abe
SHA1feab1a140f650c225c0cf3aee18e36ed5481d559
SHA2566b45d8cea2d5e8c1ab45b6ed61c428eaf9365a4cf0c9ab981ccfb871673e7fdd
SHA512ea3138514c9fa6daaa3247a89d048ecdaaf10220e40d89779389224767131a835c2d8a86c3ed713f0ac7c7705ec2ac554d8f5f02e7cd63b1571d21d8b938392f
-
\Users\Admin\AppData\Local\xz4QE6\Secur32.dllFilesize
973KB
MD555630297883cc907856f1b1aa1dcd9c0
SHA194854b535539b03776a01eacdbe226ed1a416238
SHA256f3eb702091453d6b15bee47af7ac5e3c3e388203eeb649e5e25a8a6466e9672b
SHA512f4d76049cd10ac2607205477ad3eacb5a8a3da772bb1aea136e8fc45d905e27dde1d01f24f5e48f3c9e69adf6bd4cadbf5163d70d62b5017f41e1749a3e28d76
-
\Users\Admin\AppData\Local\xz4QE6\perfmon.exeFilesize
168KB
MD53eb98cff1c242167df5fdbc6441ce3c5
SHA1730b27a1c92e8df1e60db5a6fc69ea1b24f68a69
SHA2566d8d5a244bb5a23c95653853fec3d04d2bdd2df5cff8cffb9848bddeb6adb081
SHA512f42be2a52d97fd1db2ed5a1a1a81a186a0aab41204980a103df33a4190632ba03f3cbb88fcea8da7ed9a5e15f60732d49a924b025fe6d3e623195ec1d37dfb35
-
\Users\Admin\AppData\Roaming\Mozilla\SystemExtensionsDev\gbl23\Magnify.exeFilesize
637KB
MD5233b45ddf77bd45e53872881cff1839b
SHA1d4b8cafce4664bb339859a90a9dd1506f831756d
SHA256adfd109ec03cd57e44dbd5fd1c4d8c47f8f58f887f690ba3c92f744b670fd75a
SHA5126fb5f730633bfb2d063e6bc8cf37a7624bdcde2bd1d0c92b6b9a557484e7acf5d3a2be354808cade751f7ac5c5fe936e765f6494ef54b4fdb2725179f0d0fe39
-
memory/588-87-0x0000000140000000-0x00000001400FB000-memory.dmpFilesize
1004KB
-
memory/588-91-0x00000000000F0000-0x00000000000F7000-memory.dmpFilesize
28KB
-
memory/588-82-0x0000000000000000-mapping.dmp
-
memory/588-86-0x000007FEFB871000-0x000007FEFB873000-memory.dmpFilesize
8KB
-
memory/904-58-0x0000000000190000-0x0000000000197000-memory.dmpFilesize
28KB
-
memory/904-54-0x0000000140000000-0x00000001400FA000-memory.dmpFilesize
1000KB
-
memory/1068-102-0x0000000000280000-0x0000000000287000-memory.dmpFilesize
28KB
-
memory/1068-93-0x0000000000000000-mapping.dmp
-
memory/1256-70-0x0000000140000000-0x00000001400FA000-memory.dmpFilesize
1000KB
-
memory/1256-69-0x0000000140000000-0x00000001400FA000-memory.dmpFilesize
1000KB
-
memory/1256-62-0x0000000140000000-0x00000001400FA000-memory.dmpFilesize
1000KB
-
memory/1256-79-0x0000000002A20000-0x0000000002A27000-memory.dmpFilesize
28KB
-
memory/1256-63-0x0000000140000000-0x00000001400FA000-memory.dmpFilesize
1000KB
-
memory/1256-61-0x0000000140000000-0x00000001400FA000-memory.dmpFilesize
1000KB
-
memory/1256-64-0x0000000140000000-0x00000001400FA000-memory.dmpFilesize
1000KB
-
memory/1256-68-0x0000000140000000-0x00000001400FA000-memory.dmpFilesize
1000KB
-
memory/1256-65-0x0000000140000000-0x00000001400FA000-memory.dmpFilesize
1000KB
-
memory/1256-67-0x0000000140000000-0x00000001400FA000-memory.dmpFilesize
1000KB
-
memory/1256-60-0x0000000140000000-0x00000001400FA000-memory.dmpFilesize
1000KB
-
memory/1256-59-0x0000000002A40000-0x0000000002A41000-memory.dmpFilesize
4KB
-
memory/1256-66-0x0000000140000000-0x00000001400FA000-memory.dmpFilesize
1000KB
-
memory/1256-80-0x00000000771D0000-0x00000000771D2000-memory.dmpFilesize
8KB
-
memory/1960-114-0x0000000001AD0000-0x0000000001AD7000-memory.dmpFilesize
28KB
-
memory/1960-104-0x0000000000000000-mapping.dmp