Analysis

  • max time kernel
    169s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2023 17:04

General

  • Target

    faff1cecdbec225f5f4a12f2afa66915.dll

  • Size

    1.4MB

  • MD5

    faff1cecdbec225f5f4a12f2afa66915

  • SHA1

    0bc116efeeab88744b461d8c7979c4bade196f55

  • SHA256

    aa794827c5c65b5416d7f2454cb2376816a74c9e0d5d6ed83daadf07ad335ff1

  • SHA512

    83a90171fcd5581fd0747b3d106674c8e2935613fe906cea4dd627f3f6c420810e576a42995dfa670e06dd35c84aca7217dfa14a89c131bedd25797be6ae72c4

  • SSDEEP

    12288:DVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:SfP7fWsK5z9A+WGAW+V5SB6Ct4bnb

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\faff1cecdbec225f5f4a12f2afa66915.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2968
  • C:\Windows\system32\cttune.exe
    C:\Windows\system32\cttune.exe
    1⤵
      PID:2304
    • C:\Users\Admin\AppData\Local\NSJB\cttune.exe
      C:\Users\Admin\AppData\Local\NSJB\cttune.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:524
    • C:\Windows\system32\osk.exe
      C:\Windows\system32\osk.exe
      1⤵
        PID:1000
      • C:\Users\Admin\AppData\Local\DfF\osk.exe
        C:\Users\Admin\AppData\Local\DfF\osk.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:1260
      • C:\Windows\system32\EhStorAuthn.exe
        C:\Windows\system32\EhStorAuthn.exe
        1⤵
          PID:2204
        • C:\Users\Admin\AppData\Local\ZSKffg\EhStorAuthn.exe
          C:\Users\Admin\AppData\Local\ZSKffg\EhStorAuthn.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:1044

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/524-72-0x0000000140000000-0x000000014016B000-memory.dmp

          Filesize

          1.4MB

        • memory/524-71-0x00000000000F0000-0x00000000000F7000-memory.dmp

          Filesize

          28KB

        • memory/524-76-0x0000000140000000-0x000000014016B000-memory.dmp

          Filesize

          1.4MB

        • memory/1044-124-0x0000000140000000-0x000000014016B000-memory.dmp

          Filesize

          1.4MB

        • memory/1044-119-0x0000000000370000-0x0000000000377000-memory.dmp

          Filesize

          28KB

        • memory/1204-28-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/1204-23-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/1204-34-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/1204-46-0x0000000077210000-0x0000000077212000-memory.dmp

          Filesize

          8KB

        • memory/1204-43-0x00000000770B1000-0x00000000770B2000-memory.dmp

          Filesize

          4KB

        • memory/1204-42-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/1204-53-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/1204-41-0x0000000002990000-0x0000000002997000-memory.dmp

          Filesize

          28KB

        • memory/1204-27-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/1204-19-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/1204-10-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/1204-62-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/1204-59-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/1204-32-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/1204-31-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/1204-30-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/1204-29-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/1204-147-0x0000000076EA6000-0x0000000076EA7000-memory.dmp

          Filesize

          4KB

        • memory/1204-26-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/1204-25-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/1204-24-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/1204-33-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/1204-22-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/1204-21-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/1204-20-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/1204-18-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/1204-17-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/1204-16-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/1204-15-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/1204-14-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/1204-13-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/1204-12-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/1204-11-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/1204-9-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/1204-4-0x0000000076EA6000-0x0000000076EA7000-memory.dmp

          Filesize

          4KB

        • memory/1204-7-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/1204-5-0x00000000029B0000-0x00000000029B1000-memory.dmp

          Filesize

          4KB

        • memory/1260-95-0x0000000000180000-0x0000000000187000-memory.dmp

          Filesize

          28KB

        • memory/1260-100-0x0000000140000000-0x000000014016B000-memory.dmp

          Filesize

          1.4MB

        • memory/2968-8-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/2968-0-0x0000000140000000-0x000000014016A000-memory.dmp

          Filesize

          1.4MB

        • memory/2968-1-0x0000000000190000-0x0000000000197000-memory.dmp

          Filesize

          28KB