Analysis

  • max time kernel
    61s
  • max time network
    25s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    21/10/2023, 19:35

General

  • Target

    NEAS.1f0b38d9dc62745336ed59f23ef9d930_JC.dll

  • Size

    3.7MB

  • MD5

    1f0b38d9dc62745336ed59f23ef9d930

  • SHA1

    ca7103f7e63dc73d6539dc31a6f1f897ffee4411

  • SHA256

    f7ecbb2280d3798f34c6d54d342aaa1ee2be6fb909570643712fb9285456517e

  • SHA512

    9d383d343322f11f70a4255f2062dffcc77ea2af2ea31575941dcbf7dd7886bd938c1111385028098e1184568919986714cd57722da442397cc64924636d93e0

  • SSDEEP

    24576:P8uea4w467D5/0ypyFYELW8xFZmMXJZA:FXyFYELpT

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 2 IoCs

    Detects Dridex x64 core DLL in memory.

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 28 IoCs
  • Suspicious use of SendNotifyMessage 20 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\NEAS.1f0b38d9dc62745336ed59f23ef9d930_JC.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2188
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Modifies Installed Components in the registry
    • Loads dropped DLL
    • Adds Run key to start application
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\Windows\system32\BdeUISrv.exe
      C:\Windows\system32\BdeUISrv.exe
      2⤵
        PID:2292
      • C:\Users\Admin\AppData\Local\TVmOxg\BdeUISrv.exe
        C:\Users\Admin\AppData\Local\TVmOxg\BdeUISrv.exe
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:2108
      • C:\Windows\system32\DeviceDisplayObjectProvider.exe
        C:\Windows\system32\DeviceDisplayObjectProvider.exe
        2⤵
          PID:1668
        • C:\Users\Admin\AppData\Local\7P33kn\DeviceDisplayObjectProvider.exe
          C:\Users\Admin\AppData\Local\7P33kn\DeviceDisplayObjectProvider.exe
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:2960
        • C:\Windows\system32\recdisc.exe
          C:\Windows\system32\recdisc.exe
          2⤵
            PID:340
          • C:\Users\Admin\AppData\Local\aMgy\recdisc.exe
            C:\Users\Admin\AppData\Local\aMgy\recdisc.exe
            2⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Checks whether UAC is enabled
            PID:1236

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\7P33kn\DeviceDisplayObjectProvider.exe

                Filesize

                109KB

                MD5

                7e2eb3a4ae11190ef4c8a9b9a9123234

                SHA1

                72e98687a8d28614e2131c300403c2822856e865

                SHA256

                8481a8ec19cb656ce328c877d5817d317203ba34424a2e9d169ddce5bf2cd2b0

                SHA512

                18b1a0637f48929972a463d441182307725ebf1410dd461a1966bd040ac5dcced138155b7c713bfc924ea2f7b39527a084a08b44fa24c3eb9c654871f99caabf

              • C:\Users\Admin\AppData\Local\7P33kn\DeviceDisplayObjectProvider.exe

                Filesize

                109KB

                MD5

                7e2eb3a4ae11190ef4c8a9b9a9123234

                SHA1

                72e98687a8d28614e2131c300403c2822856e865

                SHA256

                8481a8ec19cb656ce328c877d5817d317203ba34424a2e9d169ddce5bf2cd2b0

                SHA512

                18b1a0637f48929972a463d441182307725ebf1410dd461a1966bd040ac5dcced138155b7c713bfc924ea2f7b39527a084a08b44fa24c3eb9c654871f99caabf

              • C:\Users\Admin\AppData\Local\7P33kn\XmlLite.dll

                Filesize

                3.7MB

                MD5

                0cf7cc466b43fcb8b532328dbb546bc6

                SHA1

                08a1d5bec9bad973dbb2ae9a559f7fb05c49727b

                SHA256

                d600cc97baf84d20585f615ad2be886289989b9d2b53817d3a1ca75abe6141f7

                SHA512

                03ae0da8f40d9de0d16edab4c81539c06490ef6ccf73e59052eb3778e24e98de7fc782878537dfbdfee13f4946753bada65d45b2af78fc540cd2e6d66c163d94

              • C:\Users\Admin\AppData\Local\TVmOxg\BdeUISrv.exe

                Filesize

                47KB

                MD5

                1da6b19be5d4949c868a264bc5e74206

                SHA1

                d5ee86ba03a03ef8c93d93accafe40461084c839

                SHA256

                00330a0e0eb1dbb6ee84997963f8e15c7c15c1df787f1c7f109609d7b31bd35c

                SHA512

                9cee858c55eb0852e5bad53a675a094ae591b46b07afe9fb4224cac32e0be577fe36c1ed3e9f6bda4d4eb0c924a773d00e3181cd97f07e24c6c68c70f2b002c6

              • C:\Users\Admin\AppData\Local\TVmOxg\BdeUISrv.exe

                Filesize

                47KB

                MD5

                1da6b19be5d4949c868a264bc5e74206

                SHA1

                d5ee86ba03a03ef8c93d93accafe40461084c839

                SHA256

                00330a0e0eb1dbb6ee84997963f8e15c7c15c1df787f1c7f109609d7b31bd35c

                SHA512

                9cee858c55eb0852e5bad53a675a094ae591b46b07afe9fb4224cac32e0be577fe36c1ed3e9f6bda4d4eb0c924a773d00e3181cd97f07e24c6c68c70f2b002c6

              • C:\Users\Admin\AppData\Local\TVmOxg\WTSAPI32.dll

                Filesize

                3.7MB

                MD5

                d35b609bc1e574cb1d859ae8b9ca8f37

                SHA1

                d8ee5136308eb4c9573896cd397f8a68e425f12a

                SHA256

                27b96744c082f7e2cbf8533b4bed4d519ebfca4a47ea4687e41595475fd3b5b8

                SHA512

                dac8a3bdc999e3ad8468defabc6fe15b28af0dc192fc246c61ad084c920311f59a2853c22c6e6a03ea7f78c25ddc993463624933a16b19aec5ceadfb884484b0

              • C:\Users\Admin\AppData\Local\aMgy\ReAgent.dll

                Filesize

                3.7MB

                MD5

                bd765fda0819d88b07132ca03d996223

                SHA1

                315516d2e7611f8ef903b94ccc2d5f0968ecf8ec

                SHA256

                8e33bcbaaf758fa6d2bcbe21f227ce5e19126b78ac336d31ac7254c3d35d489f

                SHA512

                cc25285ebf2d4dc246e8d29074ccea049ace4f998e21aef70237181730be01377800995d87e1b2d514b8a29ffd78e555665d65f2f21d4d384b898396a1e36af8

              • C:\Users\Admin\AppData\Local\aMgy\recdisc.exe

                Filesize

                232KB

                MD5

                f3b306179f1840c0813dc6771b018358

                SHA1

                dec7ce3c13f7a684cb52ae6007c99cf03afef005

                SHA256

                dcaeb590394b42d180e23e3cef4dd135513395b026e0ed489aec49848b85b8f0

                SHA512

                9f9ec4c2ca6373bd738bf415d059f3536390e46e5b0a560e9ee1b190407a6d0f481c38664c51b834a9e72d8878f71c3c19e427e3a6b5ca4ec6b02d1156eb9ef4

              • C:\Users\Admin\AppData\Local\aMgy\recdisc.exe

                Filesize

                232KB

                MD5

                f3b306179f1840c0813dc6771b018358

                SHA1

                dec7ce3c13f7a684cb52ae6007c99cf03afef005

                SHA256

                dcaeb590394b42d180e23e3cef4dd135513395b026e0ed489aec49848b85b8f0

                SHA512

                9f9ec4c2ca6373bd738bf415d059f3536390e46e5b0a560e9ee1b190407a6d0f481c38664c51b834a9e72d8878f71c3c19e427e3a6b5ca4ec6b02d1156eb9ef4

              • \Users\Admin\AppData\Local\7P33kn\DeviceDisplayObjectProvider.exe

                Filesize

                109KB

                MD5

                7e2eb3a4ae11190ef4c8a9b9a9123234

                SHA1

                72e98687a8d28614e2131c300403c2822856e865

                SHA256

                8481a8ec19cb656ce328c877d5817d317203ba34424a2e9d169ddce5bf2cd2b0

                SHA512

                18b1a0637f48929972a463d441182307725ebf1410dd461a1966bd040ac5dcced138155b7c713bfc924ea2f7b39527a084a08b44fa24c3eb9c654871f99caabf

              • \Users\Admin\AppData\Local\7P33kn\XmlLite.dll

                Filesize

                3.7MB

                MD5

                0cf7cc466b43fcb8b532328dbb546bc6

                SHA1

                08a1d5bec9bad973dbb2ae9a559f7fb05c49727b

                SHA256

                d600cc97baf84d20585f615ad2be886289989b9d2b53817d3a1ca75abe6141f7

                SHA512

                03ae0da8f40d9de0d16edab4c81539c06490ef6ccf73e59052eb3778e24e98de7fc782878537dfbdfee13f4946753bada65d45b2af78fc540cd2e6d66c163d94

              • \Users\Admin\AppData\Local\TVmOxg\BdeUISrv.exe

                Filesize

                47KB

                MD5

                1da6b19be5d4949c868a264bc5e74206

                SHA1

                d5ee86ba03a03ef8c93d93accafe40461084c839

                SHA256

                00330a0e0eb1dbb6ee84997963f8e15c7c15c1df787f1c7f109609d7b31bd35c

                SHA512

                9cee858c55eb0852e5bad53a675a094ae591b46b07afe9fb4224cac32e0be577fe36c1ed3e9f6bda4d4eb0c924a773d00e3181cd97f07e24c6c68c70f2b002c6

              • \Users\Admin\AppData\Local\TVmOxg\WTSAPI32.dll

                Filesize

                3.7MB

                MD5

                d35b609bc1e574cb1d859ae8b9ca8f37

                SHA1

                d8ee5136308eb4c9573896cd397f8a68e425f12a

                SHA256

                27b96744c082f7e2cbf8533b4bed4d519ebfca4a47ea4687e41595475fd3b5b8

                SHA512

                dac8a3bdc999e3ad8468defabc6fe15b28af0dc192fc246c61ad084c920311f59a2853c22c6e6a03ea7f78c25ddc993463624933a16b19aec5ceadfb884484b0

              • \Users\Admin\AppData\Local\aMgy\ReAgent.dll

                Filesize

                3.7MB

                MD5

                bd765fda0819d88b07132ca03d996223

                SHA1

                315516d2e7611f8ef903b94ccc2d5f0968ecf8ec

                SHA256

                8e33bcbaaf758fa6d2bcbe21f227ce5e19126b78ac336d31ac7254c3d35d489f

                SHA512

                cc25285ebf2d4dc246e8d29074ccea049ace4f998e21aef70237181730be01377800995d87e1b2d514b8a29ffd78e555665d65f2f21d4d384b898396a1e36af8

              • \Users\Admin\AppData\Local\aMgy\recdisc.exe

                Filesize

                232KB

                MD5

                f3b306179f1840c0813dc6771b018358

                SHA1

                dec7ce3c13f7a684cb52ae6007c99cf03afef005

                SHA256

                dcaeb590394b42d180e23e3cef4dd135513395b026e0ed489aec49848b85b8f0

                SHA512

                9f9ec4c2ca6373bd738bf415d059f3536390e46e5b0a560e9ee1b190407a6d0f481c38664c51b834a9e72d8878f71c3c19e427e3a6b5ca4ec6b02d1156eb9ef4

              • \Users\Admin\AppData\Roaming\Adobe\Flash Player\J8gFAsBUtna\recdisc.exe

                Filesize

                232KB

                MD5

                f3b306179f1840c0813dc6771b018358

                SHA1

                dec7ce3c13f7a684cb52ae6007c99cf03afef005

                SHA256

                dcaeb590394b42d180e23e3cef4dd135513395b026e0ed489aec49848b85b8f0

                SHA512

                9f9ec4c2ca6373bd738bf415d059f3536390e46e5b0a560e9ee1b190407a6d0f481c38664c51b834a9e72d8878f71c3c19e427e3a6b5ca4ec6b02d1156eb9ef4

              • memory/1180-47-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-54-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-20-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-21-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-22-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-23-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-24-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-25-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-26-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-30-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-29-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-28-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-27-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-31-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-32-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-39-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-40-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-38-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-37-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-36-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-35-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-34-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-33-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-41-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-42-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-44-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-43-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-45-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-3-0x0000000077AB6000-0x0000000077AB7000-memory.dmp

                Filesize

                4KB

              • memory/1180-4-0x0000000002210000-0x0000000002211000-memory.dmp

                Filesize

                4KB

              • memory/1180-48-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-49-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-50-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-51-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-52-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-19-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-53-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-55-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-57-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-56-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-58-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-60-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-61-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-59-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-63-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-62-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-64-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-65-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-6-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-13-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-14-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-12-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-11-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-18-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-17-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-16-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-10-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-15-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-7-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-8-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1180-9-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/1236-233-0x00000000000E0000-0x00000000000E7000-memory.dmp

                Filesize

                28KB

              • memory/2108-199-0x0000000000170000-0x0000000000177000-memory.dmp

                Filesize

                28KB

              • memory/2188-0-0x0000000000110000-0x0000000000117000-memory.dmp

                Filesize

                28KB

              • memory/2188-46-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/2188-1-0x0000000140000000-0x00000001403AD000-memory.dmp

                Filesize

                3.7MB

              • memory/2604-191-0x0000000077A50000-0x0000000077B6F000-memory.dmp

                Filesize

                1.1MB

              • memory/2604-190-0x0000000004420000-0x0000000004421000-memory.dmp

                Filesize

                4KB

              • memory/2604-160-0x0000000004AE0000-0x0000000004AE7000-memory.dmp

                Filesize

                28KB

              • memory/2604-75-0x0000000077A50000-0x0000000077B6F000-memory.dmp

                Filesize

                1.1MB

              • memory/2604-74-0x0000000004420000-0x0000000004421000-memory.dmp

                Filesize

                4KB

              • memory/2960-216-0x0000000000070000-0x0000000000077000-memory.dmp

                Filesize

                28KB