Resubmissions

Analysis

  • max time kernel
    150s
  • max time network
    67s
  • platform
    windows10_x64
  • resource
    win10v200722
  • submitted
    06-08-2020 16:20

General

  • Target

    DUI70.dll

  • Size

    1.2MB

  • MD5

    ca7f847ac49ea5ec058b9455bacbb326

  • SHA1

    9ea5760c8d7b2f1a479901677338e487e62aaad0

  • SHA256

    1bc4755b2828092f30c53c4099d2a1b118d1a68686a82b7c11ef12c6ae93f8d4

  • SHA512

    5e57d36b700f030c977213899b2d5e4421abcaf54a41ccb336067e52f779066916b58ff1c81441be8c4e69240106569d40371b6ba862e6d89cbeda1cc65d6818

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Loader 2 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Dridex Loader 'dmod' strings 2 IoCs

    Detects 'dmod' strings in Dridex loader.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 633 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\DUI70.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:3940
  • C:\Windows\system32\dpapimig.exe
    C:\Windows\system32\dpapimig.exe
    1⤵
      PID:1308
    • C:\Users\Admin\AppData\Local\jqTE\dpapimig.exe
      C:\Users\Admin\AppData\Local\jqTE\dpapimig.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:1392
    • C:\Windows\system32\wextract.exe
      C:\Windows\system32\wextract.exe
      1⤵
        PID:1660
      • C:\Users\Admin\AppData\Local\ahLBLO\wextract.exe
        C:\Users\Admin\AppData\Local\ahLBLO\wextract.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:1664
      • C:\Windows\system32\msra.exe
        C:\Windows\system32\msra.exe
        1⤵
          PID:3836
        • C:\Users\Admin\AppData\Local\f8XoiMQ\msra.exe
          C:\Users\Admin\AppData\Local\f8XoiMQ\msra.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:3868

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Defense Evasion

        Modify Registry

        1
        T1112

        Discovery

        System Information Discovery

        1
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\ahLBLO\VERSION.dll
          MD5

          711aaf60b9af895c5100fb0c2f6ddf4c

          SHA1

          6ce71e953948e96c70593b404a9fcc3515095b5d

          SHA256

          914d7ff908ced5d497260d400b71d75972f001c1467049d7f60c30fb8732acf0

          SHA512

          ee7f713bdb1996e6d5e8412c30b8ec600b6ff0bbb8190cd23dcef45399531345362fa8acdc567bb458d418117efd66f07c4d66781a962526762127467cb1e083

        • C:\Users\Admin\AppData\Local\ahLBLO\wextract.exe
          MD5

          e78764b49f5806ce029cd547004493c9

          SHA1

          8c1f3f989913bebf827a707c04754047507a8cf3

          SHA256

          ab519b1c2711219a9f262b23bf72343eec3c0df4c7ddd135d30d05e700ec302e

          SHA512

          71040e5f0d2d409efaba70a7daaebe7a4675cb19009436a826a679671cc0d7c960498364ec7a29fb163ce8dada65218b75bebb973e6c8b194734e01970fd3a6b

        • C:\Users\Admin\AppData\Local\f8XoiMQ\NDFAPI.DLL
          MD5

          475c944cda3c86d799768467b7cd1dc1

          SHA1

          68f4892df83a40f02d666923e098c7ee6eb793ea

          SHA256

          b7361b25d6a80989d1ff2dd1e36197dad3838387ef7df97123eb2654d6493bf4

          SHA512

          8387f0ec43e8797799d2736acaf2f2653257191eed7553e5c6441acf9a19c05f17533f243e9cf2bb3a742b33bdc2c964781867064896a2be324508cb99d4d2c0

        • C:\Users\Admin\AppData\Local\f8XoiMQ\msra.exe
          MD5

          b00eb640229462c7080dc17e5805dfc9

          SHA1

          28b438b47d145b17c94cbec39b204ced6eccb5f1

          SHA256

          529378155b8aa91ff47d1f015c96a373fdb12acef3811d2f8a7e3dff67fded3b

          SHA512

          e962f71be1f25787710b8cb92453bcc19ff38921d01b2c892a4c61bfa09959377a73a95a02c0a62b1c93aaef7d9b4a43c196ca76ac7c7327abe85340bf94b6d2

        • C:\Users\Admin\AppData\Local\jqTE\DUI70.dll
          MD5

          f4816d4c41f6ae0703c9825145bd67b8

          SHA1

          4cfcfaa412dc191fe94a996267ce02b8dad254f3

          SHA256

          1684bfd08ae1277573205648f48451fba1f975dbd1136cb82f4d96c0470ef20e

          SHA512

          7fd72a7a9ef92dc5e101acbd4da260d19ca836e8eac1243cd528224df4f03bd9ef32d9efa1c7a1cafa8ee28dcbe0bda0b4cd71fce108836df2c3197f89caaf4f

        • C:\Users\Admin\AppData\Local\jqTE\dpapimig.exe
          MD5

          a210dd05d1e941a1ec04b134f39ef036

          SHA1

          86b5493ecf8f456ae56ede4b013b934b892572e0

          SHA256

          3912f380049e362ca875ccb4fe064621197f0df999b35c593de382cf0c852988

          SHA512

          9648ed1088af13717479f4739ecdfd604b463582fe3a9db43761b446c61e93856309fd1f8c993962d426af566497b9c8f7eaa3a5af069a7a0f8fde8424111bf8

        • \Users\Admin\AppData\Local\ahLBLO\VERSION.dll
          MD5

          711aaf60b9af895c5100fb0c2f6ddf4c

          SHA1

          6ce71e953948e96c70593b404a9fcc3515095b5d

          SHA256

          914d7ff908ced5d497260d400b71d75972f001c1467049d7f60c30fb8732acf0

          SHA512

          ee7f713bdb1996e6d5e8412c30b8ec600b6ff0bbb8190cd23dcef45399531345362fa8acdc567bb458d418117efd66f07c4d66781a962526762127467cb1e083

        • \Users\Admin\AppData\Local\f8XoiMQ\NDFAPI.DLL
          MD5

          475c944cda3c86d799768467b7cd1dc1

          SHA1

          68f4892df83a40f02d666923e098c7ee6eb793ea

          SHA256

          b7361b25d6a80989d1ff2dd1e36197dad3838387ef7df97123eb2654d6493bf4

          SHA512

          8387f0ec43e8797799d2736acaf2f2653257191eed7553e5c6441acf9a19c05f17533f243e9cf2bb3a742b33bdc2c964781867064896a2be324508cb99d4d2c0

        • \Users\Admin\AppData\Local\jqTE\DUI70.dll
          MD5

          f4816d4c41f6ae0703c9825145bd67b8

          SHA1

          4cfcfaa412dc191fe94a996267ce02b8dad254f3

          SHA256

          1684bfd08ae1277573205648f48451fba1f975dbd1136cb82f4d96c0470ef20e

          SHA512

          7fd72a7a9ef92dc5e101acbd4da260d19ca836e8eac1243cd528224df4f03bd9ef32d9efa1c7a1cafa8ee28dcbe0bda0b4cd71fce108836df2c3197f89caaf4f

        • memory/1392-4-0x0000000000000000-mapping.dmp
        • memory/1664-9-0x0000000000000000-mapping.dmp
        • memory/3044-3-0x0000000140000000-0x0000000140138000-memory.dmp
          Filesize

          1.2MB

        • memory/3044-2-0x0000000140000000-0x0000000140138000-memory.dmp
          Filesize

          1.2MB

        • memory/3044-1-0x0000000001080000-0x0000000001081000-memory.dmp
          Filesize

          4KB

        • memory/3868-14-0x0000000000000000-mapping.dmp
        • memory/3940-0-0x0000000140000000-0x000000014008D000-memory.dmp
          Filesize

          564KB