Analysis

  • max time kernel
    154s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-en-20211104
  • submitted
    26-11-2021 09:29

General

  • Target

    64eadd3a1fe874e2299e3f3321a478a3bc1c2e530ae28fefc4927d1c7771bb92.dll

  • Size

    1.3MB

  • MD5

    e57e81a28fe78e44bb3ff92b0aa211b0

  • SHA1

    087ff74a9232abeabe0bdfd835690820fa990718

  • SHA256

    64eadd3a1fe874e2299e3f3321a478a3bc1c2e530ae28fefc4927d1c7771bb92

  • SHA512

    fb6451f71a29ba074c500cc9328503ab33d38f55536e50c3abcf0a78b8917520d0530c132c20c15f02083469504f73fb3416d6a3068fc32ba9ee5c0ed8ea5688

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\64eadd3a1fe874e2299e3f3321a478a3bc1c2e530ae28fefc4927d1c7771bb92.dll
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    PID:684
  • C:\Windows\system32\OptionalFeatures.exe
    C:\Windows\system32\OptionalFeatures.exe
    1⤵
      PID:1304
    • C:\Users\Admin\AppData\Local\4fdcv9c\OptionalFeatures.exe
      C:\Users\Admin\AppData\Local\4fdcv9c\OptionalFeatures.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1300
    • C:\Windows\system32\wusa.exe
      C:\Windows\system32\wusa.exe
      1⤵
        PID:828
      • C:\Users\Admin\AppData\Local\iodhsU5dq\wusa.exe
        C:\Users\Admin\AppData\Local\iodhsU5dq\wusa.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        • Suspicious behavior: GetForegroundWindowSpam
        PID:1064
      • C:\Windows\system32\Magnify.exe
        C:\Windows\system32\Magnify.exe
        1⤵
          PID:992
        • C:\Users\Admin\AppData\Local\6thnjqH5\Magnify.exe
          C:\Users\Admin\AppData\Local\6thnjqH5\Magnify.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          • Suspicious behavior: GetForegroundWindowSpam
          PID:1400

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Defense Evasion

        Modify Registry

        1
        T1112

        Discovery

        System Information Discovery

        1
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\4fdcv9c\OptionalFeatures.exe
          MD5

          eae7af6084667c8f05412ddf096167fc

          SHA1

          0dbe8aba001447030e48e8ad5466fd23481e6140

          SHA256

          01feebd3aca961f31ba4eac45347b105d1c5772627b08f5538047721b61ff9bc

          SHA512

          172a8accaa35a6c9f86713a330c5899dfeeffe3b43413a3d276fc16d45cd62ed9237aa6bff29cc60a2022fba8dcc156959723c041df4b7463436a3bdabef2a9d

        • C:\Users\Admin\AppData\Local\4fdcv9c\appwiz.cpl
          MD5

          a192cac6b4117caa95c757528cf4ef93

          SHA1

          cd38779e00af50fb88253bff2b11770fb0a23494

          SHA256

          d2c229bd70025b7448af0c1e209a49a739df71f67e2e377380d9ae0a6d610c07

          SHA512

          cbd0d4590cafe9b16c25e7e5fdd581c08cfc92e6f90a71b34215cc370f5a27002fb342b7a9ed43a9cab6e4ea255e4064da6f14640c0950623fff03e338b869d9

        • C:\Users\Admin\AppData\Local\6thnjqH5\Magnify.exe
          MD5

          233b45ddf77bd45e53872881cff1839b

          SHA1

          d4b8cafce4664bb339859a90a9dd1506f831756d

          SHA256

          adfd109ec03cd57e44dbd5fd1c4d8c47f8f58f887f690ba3c92f744b670fd75a

          SHA512

          6fb5f730633bfb2d063e6bc8cf37a7624bdcde2bd1d0c92b6b9a557484e7acf5d3a2be354808cade751f7ac5c5fe936e765f6494ef54b4fdb2725179f0d0fe39

        • C:\Users\Admin\AppData\Local\6thnjqH5\OLEACC.dll
          MD5

          86f3695f6faf81fa094166ce0e4ce9a3

          SHA1

          e2edbf0c6234c4aa329e31b352fb7903523e4406

          SHA256

          adfb9fbd9fd24753f0553a57bcbf837333de10b0648c9fed37183cbad32ef010

          SHA512

          5c6c9d9dc80c55e36a607d8933b585ff8588a3145b6410cb53966d4735229d4a7248f9ec5a1a65de64abf55cc2043059330e3cf7aea1557bb5f8090e596d404f

        • C:\Users\Admin\AppData\Local\iodhsU5dq\dpx.dll
          MD5

          477ab349446a6eef993bef28419fc090

          SHA1

          cfc4ad89b57df3302bcc26c3497c4908a2167bb1

          SHA256

          e640f2cbb64ad3e4a95b04c723ff877154dc409a724ff399bfb80530e29ad085

          SHA512

          b47920c03fc56cb0ec1a380be0b41513298d7115d721de815e09bdf6dc75d5fc47e12f217aca1cd108c0ceaa5a307b10d4c7a105f79d5cde888bc0498bea0ece

        • C:\Users\Admin\AppData\Local\iodhsU5dq\wusa.exe
          MD5

          c15b3d813f4382ade98f1892350f21c7

          SHA1

          a45c5abc6751bc8b9041e5e07923fa4fc1b4542b

          SHA256

          8f067da98eb3ea9f1db2f0063ff54e07d992fbf051779b467e222639be4127e3

          SHA512

          6d028fe81fe45d0ef291741513ecf939e412912647347d4d5bad89571f33e1084dc0fd26eb7313c7191f938c3f50243f453e2690e2475fc3f5539a20c2ff2f3c

        • \Users\Admin\AppData\Local\4fdcv9c\OptionalFeatures.exe
          MD5

          eae7af6084667c8f05412ddf096167fc

          SHA1

          0dbe8aba001447030e48e8ad5466fd23481e6140

          SHA256

          01feebd3aca961f31ba4eac45347b105d1c5772627b08f5538047721b61ff9bc

          SHA512

          172a8accaa35a6c9f86713a330c5899dfeeffe3b43413a3d276fc16d45cd62ed9237aa6bff29cc60a2022fba8dcc156959723c041df4b7463436a3bdabef2a9d

        • \Users\Admin\AppData\Local\4fdcv9c\appwiz.cpl
          MD5

          a192cac6b4117caa95c757528cf4ef93

          SHA1

          cd38779e00af50fb88253bff2b11770fb0a23494

          SHA256

          d2c229bd70025b7448af0c1e209a49a739df71f67e2e377380d9ae0a6d610c07

          SHA512

          cbd0d4590cafe9b16c25e7e5fdd581c08cfc92e6f90a71b34215cc370f5a27002fb342b7a9ed43a9cab6e4ea255e4064da6f14640c0950623fff03e338b869d9

        • \Users\Admin\AppData\Local\6thnjqH5\Magnify.exe
          MD5

          233b45ddf77bd45e53872881cff1839b

          SHA1

          d4b8cafce4664bb339859a90a9dd1506f831756d

          SHA256

          adfd109ec03cd57e44dbd5fd1c4d8c47f8f58f887f690ba3c92f744b670fd75a

          SHA512

          6fb5f730633bfb2d063e6bc8cf37a7624bdcde2bd1d0c92b6b9a557484e7acf5d3a2be354808cade751f7ac5c5fe936e765f6494ef54b4fdb2725179f0d0fe39

        • \Users\Admin\AppData\Local\6thnjqH5\OLEACC.dll
          MD5

          86f3695f6faf81fa094166ce0e4ce9a3

          SHA1

          e2edbf0c6234c4aa329e31b352fb7903523e4406

          SHA256

          adfb9fbd9fd24753f0553a57bcbf837333de10b0648c9fed37183cbad32ef010

          SHA512

          5c6c9d9dc80c55e36a607d8933b585ff8588a3145b6410cb53966d4735229d4a7248f9ec5a1a65de64abf55cc2043059330e3cf7aea1557bb5f8090e596d404f

        • \Users\Admin\AppData\Local\iodhsU5dq\dpx.dll
          MD5

          477ab349446a6eef993bef28419fc090

          SHA1

          cfc4ad89b57df3302bcc26c3497c4908a2167bb1

          SHA256

          e640f2cbb64ad3e4a95b04c723ff877154dc409a724ff399bfb80530e29ad085

          SHA512

          b47920c03fc56cb0ec1a380be0b41513298d7115d721de815e09bdf6dc75d5fc47e12f217aca1cd108c0ceaa5a307b10d4c7a105f79d5cde888bc0498bea0ece

        • \Users\Admin\AppData\Local\iodhsU5dq\wusa.exe
          MD5

          c15b3d813f4382ade98f1892350f21c7

          SHA1

          a45c5abc6751bc8b9041e5e07923fa4fc1b4542b

          SHA256

          8f067da98eb3ea9f1db2f0063ff54e07d992fbf051779b467e222639be4127e3

          SHA512

          6d028fe81fe45d0ef291741513ecf939e412912647347d4d5bad89571f33e1084dc0fd26eb7313c7191f938c3f50243f453e2690e2475fc3f5539a20c2ff2f3c

        • \Users\Admin\AppData\Roaming\Microsoft\SystemCertificates\My\CRLs\Ku0B\Magnify.exe
          MD5

          233b45ddf77bd45e53872881cff1839b

          SHA1

          d4b8cafce4664bb339859a90a9dd1506f831756d

          SHA256

          adfd109ec03cd57e44dbd5fd1c4d8c47f8f58f887f690ba3c92f744b670fd75a

          SHA512

          6fb5f730633bfb2d063e6bc8cf37a7624bdcde2bd1d0c92b6b9a557484e7acf5d3a2be354808cade751f7ac5c5fe936e765f6494ef54b4fdb2725179f0d0fe39

        • memory/684-55-0x000007FEFB6F1000-0x000007FEFB6F3000-memory.dmp
          Filesize

          8KB

        • memory/684-59-0x0000000000100000-0x0000000000107000-memory.dmp
          Filesize

          28KB

        • memory/684-56-0x0000000140000000-0x000000014014B000-memory.dmp
          Filesize

          1.3MB

        • memory/1064-90-0x0000000000000000-mapping.dmp
        • memory/1208-73-0x0000000140000000-0x000000014014B000-memory.dmp
          Filesize

          1.3MB

        • memory/1208-71-0x0000000140000000-0x000000014014B000-memory.dmp
          Filesize

          1.3MB

        • memory/1208-63-0x0000000140000000-0x000000014014B000-memory.dmp
          Filesize

          1.3MB

        • memory/1208-60-0x0000000002220000-0x0000000002221000-memory.dmp
          Filesize

          4KB

        • memory/1208-64-0x0000000140000000-0x000000014014B000-memory.dmp
          Filesize

          1.3MB

        • memory/1208-65-0x0000000140000000-0x000000014014B000-memory.dmp
          Filesize

          1.3MB

        • memory/1208-66-0x0000000140000000-0x000000014014B000-memory.dmp
          Filesize

          1.3MB

        • memory/1208-67-0x0000000140000000-0x000000014014B000-memory.dmp
          Filesize

          1.3MB

        • memory/1208-70-0x0000000140000000-0x000000014014B000-memory.dmp
          Filesize

          1.3MB

        • memory/1208-80-0x0000000077020000-0x0000000077022000-memory.dmp
          Filesize

          8KB

        • memory/1208-72-0x0000000140000000-0x000000014014B000-memory.dmp
          Filesize

          1.3MB

        • memory/1208-74-0x0000000140000000-0x000000014014B000-memory.dmp
          Filesize

          1.3MB

        • memory/1208-68-0x0000000140000000-0x000000014014B000-memory.dmp
          Filesize

          1.3MB

        • memory/1208-69-0x0000000140000000-0x000000014014B000-memory.dmp
          Filesize

          1.3MB

        • memory/1208-61-0x0000000140000000-0x000000014014B000-memory.dmp
          Filesize

          1.3MB

        • memory/1208-62-0x0000000140000000-0x000000014014B000-memory.dmp
          Filesize

          1.3MB

        • memory/1300-82-0x0000000000000000-mapping.dmp
        • memory/1400-99-0x0000000000000000-mapping.dmp
        • memory/1400-104-0x0000000140000000-0x000000014014C000-memory.dmp
          Filesize

          1.3MB