Analysis

  • max time kernel
    150s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    19-04-2022 04:19

General

  • Target

    9496ab1084d795dec40c7033b9ca84335347b3c45491e2ba3da457bd2088a053.dll

  • Size

    1.4MB

  • MD5

    1ac4db4a4dcdf80d076fadd6f0047bc0

  • SHA1

    8afc736ef712c980d04b45c539f72e4f3dedbdf4

  • SHA256

    9496ab1084d795dec40c7033b9ca84335347b3c45491e2ba3da457bd2088a053

  • SHA512

    6d61d7ef13757472e9417577fd225fb966dc8be12c7a6e028a9bc84f069a0af277fa6734610393a93c3351dda8f354e0fd33ef042ce5ff5503216ab16557998c

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Modifies Installed Components in the registry 2 TTPs
  • Drops file in Windows directory 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of FindShellTrayWindow 25 IoCs
  • Suspicious use of SendNotifyMessage 17 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\9496ab1084d795dec40c7033b9ca84335347b3c45491e2ba3da457bd2088a053.dll
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1592
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2032
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x58c
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:656

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1204-60-0x0000000002910000-0x0000000002911000-memory.dmp
    Filesize

    4KB

  • memory/1592-54-0x000007FEFBD01000-0x000007FEFBD03000-memory.dmp
    Filesize

    8KB

  • memory/1592-55-0x0000000140000000-0x0000000140176000-memory.dmp
    Filesize

    1.5MB

  • memory/1592-59-0x0000000000120000-0x0000000000127000-memory.dmp
    Filesize

    28KB