Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/12/2023, 21:19

General

  • Target

    044a52b7c4b41c9724c7abef08920300.dll

  • Size

    1.7MB

  • MD5

    044a52b7c4b41c9724c7abef08920300

  • SHA1

    b23c372109b9d0b392d7b9fd5cdb1c25735f4047

  • SHA256

    9dfe843a61c3bd78c30380d5c132273913dcd3872a2a8649ffe93b4d43ed3445

  • SHA512

    7f70ce66d7bbb8955e787abc966be3dcc98c0496d9ef5c0212e89a9cc8029cbbf7d11e16c294b2f2323b2d612a16f276cdaffc13c14c379c7f8507a9ed069b03

  • SSDEEP

    12288:uVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:zfP7fWsK5z9A+WGAW+V5SB6Ct4bnb

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\044a52b7c4b41c9724c7abef08920300.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:4920
  • C:\Windows\system32\msdt.exe
    C:\Windows\system32\msdt.exe
    1⤵
      PID:4544
    • C:\Users\Admin\AppData\Local\bRu\mfpmp.exe
      C:\Users\Admin\AppData\Local\bRu\mfpmp.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:3912
    • C:\Windows\system32\mfpmp.exe
      C:\Windows\system32\mfpmp.exe
      1⤵
        PID:4120
      • C:\Windows\system32\SystemPropertiesAdvanced.exe
        C:\Windows\system32\SystemPropertiesAdvanced.exe
        1⤵
          PID:3992
        • C:\Users\Admin\AppData\Local\idfnX4Ny\SystemPropertiesAdvanced.exe
          C:\Users\Admin\AppData\Local\idfnX4Ny\SystemPropertiesAdvanced.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:2992
        • C:\Users\Admin\AppData\Local\MBTvBe\msdt.exe
          C:\Users\Admin\AppData\Local\MBTvBe\msdt.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:4864

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\TQgpskiO\SYSDM.CPL

          Filesize

          51KB

          MD5

          6c432773d1fb43322f688af16066bd17

          SHA1

          8c9c30a95887286166b54ba464cbcdae78db6e94

          SHA256

          de2ea0a4e5f78ebe413467c361b2889f8431d000833f2d8c1c0315035d8f72cc

          SHA512

          18c4d621a8bf2da7b7f4d613e7cae490e85004cf5d13d55c76b4290a8faa6d94627ff162b646bc0fa0d34835e51fe4f512d303f55ed19cf03562fe4f15ad43ce

        • C:\Users\Admin\AppData\Roaming\Microsoft\Vault\3vwN2tiAMAf\DUI70.dll

          Filesize

          2KB

          MD5

          533b215cc6ec1ef25762ab5b7074f352

          SHA1

          d354138b3c72f5130733824bcf3df31ae7c69231

          SHA256

          1369def94b7ff0171320c60dd68bb04a5e6389e697d24a9e182eca52423cd7d3

          SHA512

          a3bc810ad6cdf6c3d35267d381680ff50e61bf6e53144de1773dc6686fbfcca061f86c3d3716cb457a0e5fbf439c7a7d2cd58475a89f54a5e6703488efedd0b0

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Network Shortcuts\Ui2YAWytl\MFPlat.DLL

          Filesize

          124KB

          MD5

          2cc5329b04c58dbe82f9e74db823dad9

          SHA1

          4fe06b00b59901664d2d7a64c2eaf62ecb1b2fc9

          SHA256

          a3860495038d21f02cb2f823ba1127591ece5f35995effb02f21ea97f0260786

          SHA512

          5050e4f5e696ae6df71bd522f21548d18aa42965b82ad97b8e15e9b7a99a92dc497f45aaca3e6dd12be741defd92a8d5645195d290b62fddb7dcc2fdb6bfa7c8

        • memory/2992-108-0x0000000140000000-0x00000001401BA000-memory.dmp

          Filesize

          1.7MB

        • memory/2992-105-0x0000023FA4FE0000-0x0000023FA4FE7000-memory.dmp

          Filesize

          28KB

        • memory/2992-102-0x0000000140000000-0x00000001401BA000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-33-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-15-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-47-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-48-0x00007FFF70720000-0x00007FFF70730000-memory.dmp

          Filesize

          64KB

        • memory/3364-57-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-59-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-4-0x0000000002F70000-0x0000000002F71000-memory.dmp

          Filesize

          4KB

        • memory/3364-8-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-6-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-18-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-39-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-32-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-10-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-9-0x00007FFF6E88A000-0x00007FFF6E88B000-memory.dmp

          Filesize

          4KB

        • memory/3364-38-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-37-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-36-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-35-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-34-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-25-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-31-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-30-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-29-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-28-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-27-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-26-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-24-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-23-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-22-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-21-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-20-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-19-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-17-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-16-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-40-0x0000000002F50000-0x0000000002F57000-memory.dmp

          Filesize

          28KB

        • memory/3364-14-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-13-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-12-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3364-11-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/3912-70-0x0000029B18DE0000-0x0000029B18DE7000-memory.dmp

          Filesize

          28KB

        • memory/3912-74-0x0000000140000000-0x00000001401BB000-memory.dmp

          Filesize

          1.7MB

        • memory/3912-68-0x0000000140000000-0x00000001401BB000-memory.dmp

          Filesize

          1.7MB

        • memory/4864-85-0x0000000140000000-0x00000001401FF000-memory.dmp

          Filesize

          2.0MB

        • memory/4864-91-0x0000000140000000-0x00000001401FF000-memory.dmp

          Filesize

          2.0MB

        • memory/4864-88-0x0000022DB3B00000-0x0000022DB3B07000-memory.dmp

          Filesize

          28KB

        • memory/4920-0-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB

        • memory/4920-1-0x000002117D4E0000-0x000002117D4E7000-memory.dmp

          Filesize

          28KB

        • memory/4920-7-0x0000000140000000-0x00000001401B9000-memory.dmp

          Filesize

          1.7MB