Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2024 07:32
Static task
static1
Behavioral task
behavioral1
Sample
582465ca47042194af55732c39ecd86302618b932f5b6608c9b1b825c112042f.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
582465ca47042194af55732c39ecd86302618b932f5b6608c9b1b825c112042f.dll
Resource
win10v2004-20241007-en
General
-
Target
582465ca47042194af55732c39ecd86302618b932f5b6608c9b1b825c112042f.dll
-
Size
696KB
-
MD5
0a3cf587cfebb06a98eb27d2200ddf2a
-
SHA1
cb58b536bfb54b7ee2795a8939361465a8cb262e
-
SHA256
582465ca47042194af55732c39ecd86302618b932f5b6608c9b1b825c112042f
-
SHA512
806a83b20039618e181ccb87f9658cdb6dd25cef4b59d3bfc7c3a65381f1b67440e015dfe4f756f3c7e05ec05f3bba06732e32e51ddabc1295b803254ab9fd0f
-
SSDEEP
12288:BqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:BqGBHTxvt+g2gYed
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3416-4-0x0000000002550000-0x0000000002551000-memory.dmp dridex_stager_shellcode -
Processes:
resource yara_rule behavioral2/memory/4940-1-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral2/memory/3416-34-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral2/memory/3416-23-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral2/memory/4940-37-0x0000000140000000-0x00000001400AE000-memory.dmp dridex_payload behavioral2/memory/3000-44-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral2/memory/3000-49-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral2/memory/8-65-0x0000000140000000-0x00000001400AF000-memory.dmp dridex_payload behavioral2/memory/3256-77-0x0000000140000000-0x00000001400F4000-memory.dmp dridex_payload behavioral2/memory/3256-80-0x0000000140000000-0x00000001400F4000-memory.dmp dridex_payload -
Executes dropped EXE 3 IoCs
Processes:
sigverif.exeMagnify.exebdechangepin.exepid process 3000 sigverif.exe 8 Magnify.exe 3256 bdechangepin.exe -
Loads dropped DLL 3 IoCs
Processes:
sigverif.exeMagnify.exebdechangepin.exepid process 3000 sigverif.exe 8 Magnify.exe 3256 bdechangepin.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Pzfwfhktmuesbir = "C:\\Users\\Admin\\AppData\\Roaming\\MICROS~1\\TEMPLA~1\\LIVECO~1\\16\\User\\DOCUME~1\\WONgJsl\\Magnify.exe" -
Processes:
rundll32.exesigverif.exeMagnify.exebdechangepin.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA sigverif.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Magnify.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA bdechangepin.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Modifies registry class 2 IoCs
Processes:
description ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid process 4940 rundll32.exe 4940 rundll32.exe 4940 rundll32.exe 4940 rundll32.exe 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 3416 -
Suspicious use of AdjustPrivilegeToken 20 IoCs
Processes:
description pid process Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 Token: SeShutdownPrivilege 3416 Token: SeCreatePagefilePrivilege 3416 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid process 3416 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid process target process PID 3416 wrote to memory of 4036 3416 sigverif.exe PID 3416 wrote to memory of 4036 3416 sigverif.exe PID 3416 wrote to memory of 3000 3416 sigverif.exe PID 3416 wrote to memory of 3000 3416 sigverif.exe PID 3416 wrote to memory of 3572 3416 Magnify.exe PID 3416 wrote to memory of 3572 3416 Magnify.exe PID 3416 wrote to memory of 8 3416 Magnify.exe PID 3416 wrote to memory of 8 3416 Magnify.exe PID 3416 wrote to memory of 2664 3416 bdechangepin.exe PID 3416 wrote to memory of 2664 3416 bdechangepin.exe PID 3416 wrote to memory of 3256 3416 bdechangepin.exe PID 3416 wrote to memory of 3256 3416 bdechangepin.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\582465ca47042194af55732c39ecd86302618b932f5b6608c9b1b825c112042f.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:4940
-
C:\Windows\system32\sigverif.exeC:\Windows\system32\sigverif.exe1⤵PID:4036
-
C:\Users\Admin\AppData\Local\CGV\sigverif.exeC:\Users\Admin\AppData\Local\CGV\sigverif.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3000
-
C:\Windows\system32\Magnify.exeC:\Windows\system32\Magnify.exe1⤵PID:3572
-
C:\Users\Admin\AppData\Local\gaxabfI\Magnify.exeC:\Users\Admin\AppData\Local\gaxabfI\Magnify.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:8
-
C:\Windows\system32\bdechangepin.exeC:\Windows\system32\bdechangepin.exe1⤵PID:2664
-
C:\Users\Admin\AppData\Local\0tAgRDGR\bdechangepin.exeC:\Users\Admin\AppData\Local\0tAgRDGR\bdechangepin.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:3256
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
976KB
MD57564340a5fa9bc942722f6f59f029a5f
SHA11a087609f99c107e852830918847a552d54a26b2
SHA256aa65d05347a73976793653504d3a7108dd6b14d9f081a38fb295d37bca40fa40
SHA51210fadf05b7661acfb36a3ee8a058fbf26897d00c29f7d791648e5226858bbc1d997b91d77844d7a3a5eaabe3307cf331c37d9b0a448183d3e179fe52987a0157
-
Filesize
373KB
MD5601a28eb2d845d729ddd7330cbae6fd6
SHA15cf9f6f9135c903d42a7756c638333db8621e642
SHA2564d43f37576a0ebbaf97024cd5597d968ffe59c871b483554aea302dccb7253f6
SHA5121687044612ceb705f79c806b176f885fd01449251b0097c2df70280b7d10a2b830ee30ac0f645a7e8d8067892f6562d933624de694295e22318863260222859d
-
Filesize
700KB
MD546dbe39a155d6471914eba4d3a0a40d3
SHA1f62d08d877c86a7f513ab60415d831fffdf9b1ab
SHA256183e7d9ee2fadbef6e37e44abbab4d019f80f65ca3ad5baa1d11ef4855f23df2
SHA51289fcae61dcdf39b0dc8669cb55730c10cde8c23aad5eab8748c75132547be5548b578bb9d85257349ed3f09815d25cece8881648dbb38e02a5d0af9893e4c556
-
Filesize
77KB
MD52151a535274b53ba8a728e542cbc07a8
SHA1a2304c0f2616a7d12298540dce459dd9ccf07443
SHA256064de47877b00dc35886e829a697e4adb3d3cfdf294ddba13b6009a0f415b1bd
SHA512e6fd520ee1bd80a5fe8a7c2ae6446dcaabd4e335a602c36356f85305abef751b7dffa7eaac1ec13c105ccd8c3e9070bd32ed4b14bc8a9e52dc5f47b936d69a9f
-
Filesize
700KB
MD5e88bf970ee6de43cc05b054d1715215b
SHA10ef8702505e525b51a0fe40dde237d7ed04f01b6
SHA256eef51e3ea0076b278b369101d8d25b7a725a8cdd4a7be5608a873cca8c2ab087
SHA512d2a3657bec11d3e752bf23c76a9ec255f7af21235abf26b89d014a9e16f69ada0c7f9c393cfe3cd935631c5be73b4455c94b31d6302f7eef5a90085365c4e0c7
-
Filesize
639KB
MD54029890c147e3b4c6f41dfb5f9834d42
SHA110d08b3f6dabe8171ca2dd52e5737e3402951c75
SHA25657137f784594793dc0669042ccd3a71ddbfedeb77da6d97173d82613e08add4d
SHA512dbdc60f8692f13c23dbed0b76e9c6758a5b413bd6aaf4e4d0ba74e69c0871eb759da95c3f85a31d972388b545dcf3bb8abbcbedd29a1e7e48c065130b98b893d
-
Filesize
1KB
MD5f12b54f847fa0a3ee2be5c0a66d51aa6
SHA1ab78b30aaa736f32f944858b174b563e83cdd41f
SHA2563b10e96901ee5b129f0a7326110f30dc7f38b263388c6fe141599c39ce4ace9c
SHA51227c91543f37748d1ccdfbc48682b84a30e5f722e3aa0bfa6fc38ed72b9af0a7761db457827775b4cf25538bb3d4a176d8004f9ca7851b11abe5000dd652805f7