Analysis

  • max time kernel
    151s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 16:48

General

  • Target

    f7e4cd098d36760819259c353ee7c0d9.dll

  • Size

    3.8MB

  • MD5

    f7e4cd098d36760819259c353ee7c0d9

  • SHA1

    22f6c0c60280a9153990d61d21919e2f1ecadbb1

  • SHA256

    a6a2651b94c935293541f8f92998be8d30f6e0ace01ff02fc931dc834bee9882

  • SHA512

    375e2848b9b1ad6bd6ac38d204bc45dad430e2e61a2c943d23b0257e240bd802f730af4c5fc208eec6cb90a4ccfb027b4c5114c5c2992ee20b1c082571ae23b4

  • SSDEEP

    12288:aVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:HfP7fWsK5z9A+WGAW+V5SB6Ct4bnb

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\f7e4cd098d36760819259c353ee7c0d9.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:1480
  • C:\Windows\system32\spreview.exe
    C:\Windows\system32\spreview.exe
    1⤵
      PID:2888
    • C:\Users\Admin\AppData\Local\tQF2OpN\spreview.exe
      C:\Users\Admin\AppData\Local\tQF2OpN\spreview.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2996
    • C:\Windows\system32\xpsrchvw.exe
      C:\Windows\system32\xpsrchvw.exe
      1⤵
        PID:892
      • C:\Users\Admin\AppData\Local\hNW9fX6K\xpsrchvw.exe
        C:\Users\Admin\AppData\Local\hNW9fX6K\xpsrchvw.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:1620
      • C:\Windows\system32\msdtc.exe
        C:\Windows\system32\msdtc.exe
        1⤵
          PID:2420
        • C:\Users\Admin\AppData\Local\V9Hr\msdtc.exe
          C:\Users\Admin\AppData\Local\V9Hr\msdtc.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:2968

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\V9Hr\VERSION.dll

                Filesize

                6KB

                MD5

                25accd6f9cdfba761871d0c88b035be6

                SHA1

                32da2c5d41c939b8f708cde08ce98a1922325409

                SHA256

                00bfe17e6f73e89bad392857ff96616373095701a31980836a82dabea0e04e91

                SHA512

                7dd193a59f2ce32c6fe409aecc6262b66c54f51ea90002016c046d8c0d24b052185250ab7076030de5d127a5120cea7d6de0fa23e49fc862aaa25b7e9ee83690

              • C:\Users\Admin\AppData\Local\V9Hr\msdtc.exe

                Filesize

                47KB

                MD5

                2e88833496888c60b454094781dec33f

                SHA1

                5aabd230d0bf79389226bc51135e30368803c915

                SHA256

                e5890107fd3b94c93c7c68f5e5bb4d7989e97ac14bb1c6ef7954b5ac2e319423

                SHA512

                dcbe1b2e557f19c7ae2b5016a5b196b31c46990bf6ab02de6e1c6e43f0803efbb5550be6e7277b6938b92ed6be3d9adff45a6ce409b8ff680335f60503a76c36

              • C:\Users\Admin\AppData\Local\V9Hr\msdtc.exe

                Filesize

                37KB

                MD5

                e16bb9da49d880af2c9dfdbb9524e764

                SHA1

                a70932a44595fc332166b53e10aa0835d159266b

                SHA256

                5f5e5de07138970c9a6c33c4c04f056087f4a3248c43570becd4a2936cf24865

                SHA512

                44932762f9ebef12727b3ca9a689ea8cf82f30f3859be00016b20191d446e4c83f3857017e85a6462076d4ac5c13c93c6615fc7c934db5f054dda9a13cbc89f3

              • C:\Users\Admin\AppData\Local\hNW9fX6K\WINMM.dll

                Filesize

                1KB

                MD5

                ff44f4fd312483538601165f8d0e934f

                SHA1

                d1fefb86a84078b1de3b971178458289fd723386

                SHA256

                ceb15cffba2552fca35934b7a6d00387f1f9e79a90950043a94be31078808fa2

                SHA512

                dec6fc651ab8d20ebfb2de1bcf0376ead8471b3ec48f344c2cfaa6e76bff1e294c8f525018e3a59497203a6effb4316736a57722e075923b852edf6aeba75598

              • C:\Users\Admin\AppData\Local\hNW9fX6K\xpsrchvw.exe

                Filesize

                61KB

                MD5

                baa7563adfa7d743031f4c0b031f5083

                SHA1

                60e1979f0462241c45e9d2cd869f6aec75d0cb23

                SHA256

                878a9c8580bdb9e57784be0ebd3e2f6db4e3b6c9e9ae86a9f492307910b42ce4

                SHA512

                6b950b1036a2427da776be9cf3b594648eaa32eb09dd034613954cd39068fc0ffbfeae7c03d1221b3753ec998c1a9dacff4e36552107e463e3daa402af20bd9d

              • C:\Users\Admin\AppData\Local\hNW9fX6K\xpsrchvw.exe

                Filesize

                73KB

                MD5

                7540460b1f5d83f336890635cf71b24f

                SHA1

                70d1450233fede584fff94ee3a674909633cad66

                SHA256

                9d764d9dcb74a745518c92e079335d2ada0886ef7fa5712e8baa9ddc5a547493

                SHA512

                3c0302307e2467531dfd2e0781ef1870db9c859b5583fe4462555a25f4822f9c40282bdc923122a472ee6fe9e95d58635b1893c7aa5c1b4c7125c41731e50a19

              • C:\Users\Admin\AppData\Local\tQF2OpN\VERSION.dll

                Filesize

                125KB

                MD5

                66020df9bd6e12b52957b2ba0c7a941f

                SHA1

                04d450b9f6b5bc8f9de9d693acb70bd83d2f3b39

                SHA256

                986c4ac9a3e35b9be7e859174856da88b6b1e8ab1a810f6841a133fb741850a6

                SHA512

                655387796e67f00283f5a345d2eee4ac2c12bcd19e2dd520f05aed144ea046b87ab64f0e43417e93a6e79bc2be2e74778301c44d5bf9f0c505e27ccb55cd771e

              • C:\Users\Admin\AppData\Local\tQF2OpN\spreview.exe

                Filesize

                130KB

                MD5

                d52f78ad36d471738240146c6c76c6e5

                SHA1

                ebfd27625e3b26768ace5f82595f5df3b7e1fcfc

                SHA256

                6dd387e9e5d0014c564e9d12134152487a6b5e68e3f3b6942f598efcfbcb1356

                SHA512

                d2b914ca19dea12dd95b30692fe390d1a9ee90c2f45bdc4832670d695e7bbe42fbcac37b96ec769ad493a26947f4a00d31618b65f251d3d72cf60b70e303ac41

              • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Hbeids.lnk

                Filesize

                1017B

                MD5

                66d17e1b0375e65ac502b6e66476f34c

                SHA1

                47c86e02cc39c26bcf450d3166331d6b92211907

                SHA256

                690c813f26896198cbb8feb393b01bd777039958016a53fb91d398fa67af202a

                SHA512

                07ea20b5b187dd8ca47b8e06d146d40252acc2015c4690e5908df8c6dddbe33f992c1def8d1abac0866d0a42c78d17bf9883b5275e1a6992703d66a3cffa6adf

              • C:\Users\Admin\AppData\Roaming\Microsoft\Protect\S-1-5-21-3308111660-3636268597-2291490419-1000\4EeWTa\WINMM.dll

                Filesize

                96KB

                MD5

                883f23981021d0880384ba2e5d931bdb

                SHA1

                962b6f90581a8ca1abc80edc9b306f80ee1a2268

                SHA256

                0bbd1ddd054848d2b7c08cdd2d813ae858af761fd68b2a544a079884c2d5b462

                SHA512

                d02d91a52e5189315f3545012e2328168a72fe268981a64683acf61cddaf231a50c440561039876762d1a3d92b26002f4b913851add3c6db4ac3f743167b6ba7

              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\L55iqKFd\VERSION.dll

                Filesize

                239KB

                MD5

                7c7adce8a7bc06c1651ade81d11ff3d8

                SHA1

                8da46a91f08ac968bfe2affb17b8fb6b5e36ddaa

                SHA256

                2f0b24691c73f0d819391ad6bd6426af4441d6d18d2af9672dd75bacfd3de1bf

                SHA512

                c29c9e111fe8442fc0980781ee5b0273b87e57b00471b299ae38f83d183cfa8095a35bdb69cbc07a3fbf245340f764cf7ea775bf6ee3e63b21831edf453d9ce4

              • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\L55iqKFd\spreview.exe

                Filesize

                107KB

                MD5

                15e3bd775866454759a3e09e57dccd36

                SHA1

                9c95c7fca9d4b5c2a1d34339e226eb432a428004

                SHA256

                d5d662a208a81063f3ae7c40f4d2161dc34f63db06c4af2ace85a3ab27255051

                SHA512

                e90c995ff6868656858a5ffa28b180298a5083f844e54fa1b6bfc260382e81d976e8f561cab5b74655586b53d749f6a4339cc91801603436b41ac8dea9e32ee0

              • \Users\Admin\AppData\Local\V9Hr\VERSION.dll

                Filesize

                85KB

                MD5

                4da7440c440e81e157b7b4fd47dfe5a8

                SHA1

                cc456fc82365d3e480412cfe54e9e2839af23614

                SHA256

                348e4617c3608ed729d373366293bb02cc9faafe6f041e5902fc508e86b640ab

                SHA512

                e1579e0a712717742d903f7d818b80be7888e7322e938623c0ca7ddb4c0eae8ac3d06ee9117e0a784e274da7eac14ab82256c8fe9483af885bea2d7c269f350f

              • \Users\Admin\AppData\Local\V9Hr\msdtc.exe

                Filesize

                101KB

                MD5

                e247a2ba0f5fb731c0130e557e29f4a5

                SHA1

                0c490e2b5d2129281a2eb9cc37eb823aebcc83b4

                SHA256

                eb894267ed639a77c94266bea70f9c1c9078c956281fb646fe4ef44ece1a7119

                SHA512

                1796d0bb586e3dcbe6cb76bd77daf7ad5e1cfd09ce9679faa6e38fbd4208984ec87e1ece63339d330d9f548ff38bcfe448dd3c9cb964517f864eb69491e28d62

              • \Users\Admin\AppData\Local\hNW9fX6K\WINMM.dll

                Filesize

                4KB

                MD5

                7e3ec4fb58d900f599e384cdf707f890

                SHA1

                ab9f445e516905e31101999476b9c1a1d1d27d19

                SHA256

                054d000074532d5cdad0dfc97a353cc5514103b8a3fc4979655d78064effb886

                SHA512

                e9cde36a253ed95d58a00828e8385e0d9f87923f3d64aa1069fc1bd32e2aae5099bd172b7c4699856618f1f9d325ac9b3bcaa854e395e1160c44c96407f01ac7

              • \Users\Admin\AppData\Local\hNW9fX6K\xpsrchvw.exe

                Filesize

                45KB

                MD5

                103391d5f114da716b7bf73f3e1fdb7f

                SHA1

                146937de05f7b933230e73cba3a2b8b73e3b0a76

                SHA256

                2cd9fe5e746ff2c9b3c76b82ee1ec358af33332f0c16f067e230b12bf8f3b73f

                SHA512

                86d022403411e176850285b75db3fdc836921584dcb0059056a746274d15ecce40b0de6a98ee1fc8d9c67990851eb17ad009aae19b9f50d2b0937cfc1ca12223

              • \Users\Admin\AppData\Local\tQF2OpN\VERSION.dll

                Filesize

                65KB

                MD5

                119778ce6b919e7e2e09b5c1f0241a24

                SHA1

                9a95f393f86ec5f8171d1d829932a3e6d33804d7

                SHA256

                c96d9520e75ec1ca151fef1c0c9304fd90337ce57849ac29886f70f4182b97a1

                SHA512

                1ae05a915b06f8091832b8ef03f842122a7d18fd5f66da204b3a340db3ff33c403806ac7a84d1c1ebe40d9f510802c47f686b53b80530ba4959c5bc475ffc642

              • \Users\Admin\AppData\Local\tQF2OpN\spreview.exe

                Filesize

                69KB

                MD5

                b6e74675420947ec064e945204549910

                SHA1

                0d05d27ba1b422f0ebb1774f145f9c11208bad19

                SHA256

                739e929cde5a6ba38369a6561e595f8a42fc1cf0a82f6943c682fe34df3e6e47

                SHA512

                fb2dfafac8fc09e3180836a13daddaafe0c0597c090baca595f85512299d8aa316dca8aa10a2798ded02c4624106f5310a70f5d53118d6e3b2bb65d281fb9666

              • \Users\Admin\AppData\Roaming\Microsoft\Crypto\RIN6h6JGn\msdtc.exe

                Filesize

                85KB

                MD5

                e34baffdbd3c5dd2fdae15e0b2fcb366

                SHA1

                5971a7bc95bc6e3547601d3094f41e8c78e4de4b

                SHA256

                eeff4d73eccde1719d0d94772201020041437827d4788d8a85eac4b849abfb84

                SHA512

                cd69d2a5bcd37ce7ff9f5e828d1b0ca17fccc642b5e13fb56dd96507cba8659b84f70d16e4c81977aba4997e806cdcda31b1c658a638dd26e612ede601eb197b

              • memory/1220-41-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-22-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-4-0x0000000077616000-0x0000000077617000-memory.dmp

                Filesize

                4KB

              • memory/1220-42-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-43-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-45-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-47-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-48-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-49-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-50-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-51-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-52-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-53-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-54-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-46-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-55-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-56-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-57-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-44-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-58-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-59-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-60-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-62-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-63-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-61-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-64-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-65-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-38-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-69-0x0000000002920000-0x0000000002927000-memory.dmp

                Filesize

                28KB

              • memory/1220-37-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-35-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-32-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-33-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-25-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-24-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-40-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-21-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-20-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-77-0x0000000077821000-0x0000000077822000-memory.dmp

                Filesize

                4KB

              • memory/1220-17-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-16-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-15-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-12-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-10-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-9-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-78-0x0000000077980000-0x0000000077982000-memory.dmp

                Filesize

                8KB

              • memory/1220-39-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-36-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-34-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-27-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-5-0x0000000002950000-0x0000000002951000-memory.dmp

                Filesize

                4KB

              • memory/1220-31-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-30-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-28-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-29-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-167-0x0000000077616000-0x0000000077617000-memory.dmp

                Filesize

                4KB

              • memory/1220-26-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-23-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-19-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-18-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-11-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-8-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-14-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1220-13-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1480-7-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1480-1-0x0000000140000000-0x00000001403C4000-memory.dmp

                Filesize

                3.8MB

              • memory/1480-0-0x00000000001A0000-0x00000000001A7000-memory.dmp

                Filesize

                28KB

              • memory/1620-122-0x00000000001B0000-0x00000000001B7000-memory.dmp

                Filesize

                28KB

              • memory/2968-146-0x0000000000180000-0x0000000000187000-memory.dmp

                Filesize

                28KB

              • memory/2996-105-0x0000000000190000-0x0000000000197000-memory.dmp

                Filesize

                28KB