Analysis

  • max time kernel
    136s
  • max time network
    166s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 07:17

General

  • Target

    11ece27856133435ff8c3f2f1c4b8b02.dll

  • Size

    3.5MB

  • MD5

    11ece27856133435ff8c3f2f1c4b8b02

  • SHA1

    beb6982acc8c475def5d020bbf27a683681a6c9f

  • SHA256

    f82e6e8bf49c6980ca60b9747725046747e4a9bea7334177db1e91ccfcb36874

  • SHA512

    ef2cdd6fda9afe492d16d3a966a16854cdf0e589e4e0314e9e3c29455150343253a72f1af56c97c51633a930f0f12f693c5f6e029e02e4487bb039c4b54f1c91

  • SSDEEP

    12288:nVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:OfP7fWsK5z9A+WGAW+V5SB6Ct4bnb

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\11ece27856133435ff8c3f2f1c4b8b02.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:4740
  • C:\Windows\system32\SystemPropertiesPerformance.exe
    C:\Windows\system32\SystemPropertiesPerformance.exe
    1⤵
      PID:4160
    • C:\Users\Admin\AppData\Local\iz1qzr\SystemPropertiesPerformance.exe
      C:\Users\Admin\AppData\Local\iz1qzr\SystemPropertiesPerformance.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2136
    • C:\Windows\system32\FileHistory.exe
      C:\Windows\system32\FileHistory.exe
      1⤵
        PID:1632
      • C:\Users\Admin\AppData\Local\0VMlZ\FileHistory.exe
        C:\Users\Admin\AppData\Local\0VMlZ\FileHistory.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:656
      • C:\Windows\system32\SndVol.exe
        C:\Windows\system32\SndVol.exe
        1⤵
          PID:1924
        • C:\Users\Admin\AppData\Local\v2DstN\SndVol.exe
          C:\Users\Admin\AppData\Local\v2DstN\SndVol.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:3372

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\0VMlZ\FileHistory.exe

                Filesize

                244KB

                MD5

                eeba3dd643ced2781ec1b7e3cd6fa246

                SHA1

                2d394173e603625e231633fc270072e854bac17b

                SHA256

                bee0799a52fe65b8dc291de32f0c8b03b5a067915b1868bc8ba2a1b139c90b87

                SHA512

                222d4fbc7ee57d75889698a0660996293a0143518fdecc1b222618796d76d40f2d3b00b071f92ab917ac8847f195d7de02df55b5e89dad8a80d110e464cd3271

              • C:\Users\Admin\AppData\Local\0VMlZ\UxTheme.dll

                Filesize

                3.5MB

                MD5

                55567c3f978ce2a63e5629c7ab19ff49

                SHA1

                36f96a6257879f0a342b2f63f87d78ba1cfbf25a

                SHA256

                963862bd5f48e65eb8ff8a43b11adb8efda6f4ecc8ef64b04e4654891b3ca9f1

                SHA512

                7bb02f67248df73a1a5c8f3927bab84f170295c1f3ff5e3605224d16eadf7f6a28018c21ec029cf3482a10540f7b00b123430d556bf64aaea62cf52d95ed8201

              • C:\Users\Admin\AppData\Local\iz1qzr\SYSDM.CPL

                Filesize

                3.5MB

                MD5

                2274c0f10748d2efd97fa5d603ee5dd7

                SHA1

                ebf7360d538fd84ae0ca8ed3324e380884556ae1

                SHA256

                cc4df6c3c1f075dbeb062da42b328887ab55def131c8816697e3ea8c2b3f5660

                SHA512

                f7f2a0354d653de5839e32da595c04b5887c86d2e665bbc5363619d1cb89b4c5fc8333eb471379f319dbfd7de79af3593b6c486269ac972cdf9221a60d2a0490

              • C:\Users\Admin\AppData\Local\iz1qzr\SYSDM.CPL

                Filesize

                1.1MB

                MD5

                05bc0db1262c3e479f2c940cc1156b34

                SHA1

                5b38ea29e2bc8f4cdb5486f3695023775190d146

                SHA256

                4f3d17e449031227e8ce6fa9d93695672de8fbf228e5c78aca0d63a9e039c742

                SHA512

                99309ac26b0b124bc4b42db57fbcd8a6b6990459b57678da200a483713b5d2f12a5d342c5b31a93a3d826c374f5ba0f34b19555d6008d52d7dd695aabb575473

              • C:\Users\Admin\AppData\Local\iz1qzr\SystemPropertiesPerformance.exe

                Filesize

                82KB

                MD5

                e4fbf7cab8669c7c9cef92205d2f2ffc

                SHA1

                adbfa782b7998720fa85678cc85863b961975e28

                SHA256

                b266318d45a4245556a2e39b763f2f11eca780969105f6f103e53dd0a492bb30

                SHA512

                c5c62578d04133352d6cb7b018df96a7b55c18d6111ab8bf2bfe232a3315a63b07047fa5b0b88551d152085776c66169b47566242c8c4c5e0333c55adc64e1b6

              • C:\Users\Admin\AppData\Local\v2DstN\SndVol.exe

                Filesize

                269KB

                MD5

                c5d939ac3f9d885c8355884199e36433

                SHA1

                b8f277549c23953e8683746e225e7af1c193ad70

                SHA256

                68b6ced01f5dfc2bc9556b005f4fff235a3d02449ad9f9e4de627c0e1424d605

                SHA512

                8488e7928e53085c00df096af2315490cd4b22ce2ce196b157dc0fbb820c5399a9dbd5dead40b24b99a4a32b6de66b4edc28339d7bacd9c1e7d5936604d1a4f0

              • C:\Users\Admin\AppData\Local\v2DstN\UxTheme.dll

                Filesize

                3.5MB

                MD5

                c02eed1a4262664079605d4d673b9178

                SHA1

                3c85895739dd80e3742bb430ff1949b90f0bc2b2

                SHA256

                5bfe328cf55e0121ff20f0b1293856fccd2da87be259c8b449d7a05ed41fc8d7

                SHA512

                87b3b7908bd509fa264b3eebc13c7da9a066084a2392361f4076d6bced0a5bb0e5f32576c8598c38e01da8703852f84dc65c3a2a6e9d2a9b59db107671ba19d9

              • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Btpzaqnqvnv.lnk

                Filesize

                969B

                MD5

                018e329bf5dc1b2df8722130e27e5e14

                SHA1

                0b37bfe35afa256e94af7cb5307d789862d05f03

                SHA256

                18fdb9db02ccf2815935e2cb4a3cd194f691092136337c3f123763d4a47f5d14

                SHA512

                216ef6e8e858f60e18669af6e2e4593f3b248ab0a82c76644f589183faf1db4044c1d5a56899ce834b8fdb62ad6c7bd835170f7bfbb0b5733a11cc1419968f99

              • memory/656-114-0x000001BEAF1E0000-0x000001BEAF1E7000-memory.dmp

                Filesize

                28KB

              • memory/2136-97-0x000002CCB76E0000-0x000002CCB76E7000-memory.dmp

                Filesize

                28KB

              • memory/3372-137-0x00000212CE2C0000-0x00000212CE2C7000-memory.dmp

                Filesize

                28KB

              • memory/3520-44-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-50-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-19-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-20-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-21-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-22-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-23-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-24-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-25-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-26-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-27-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-28-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-29-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-30-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-31-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-32-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-33-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-34-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-35-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-36-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-37-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-38-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-39-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-40-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-41-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-42-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-43-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-4-0x0000000002890000-0x0000000002891000-memory.dmp

                Filesize

                4KB

              • memory/3520-45-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-46-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-47-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-48-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-49-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-18-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-51-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-52-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-53-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-54-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-55-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-56-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-57-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-58-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-59-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-60-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-61-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-62-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-63-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-64-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-65-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-68-0x00000000027F0000-0x00000000027F7000-memory.dmp

                Filesize

                28KB

              • memory/3520-77-0x00007FFE50840000-0x00007FFE50850000-memory.dmp

                Filesize

                64KB

              • memory/3520-17-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-16-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-15-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-14-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-13-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-6-0x00007FFE4FA4A000-0x00007FFE4FA4B000-memory.dmp

                Filesize

                4KB

              • memory/3520-12-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-11-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-10-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-9-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/3520-7-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/4740-0-0x000001D80F8B0000-0x000001D80F8B7000-memory.dmp

                Filesize

                28KB

              • memory/4740-1-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB

              • memory/4740-8-0x0000000140000000-0x0000000140379000-memory.dmp

                Filesize

                3.5MB