Analysis

  • max time kernel
    0s
  • max time network
    66s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/01/2024, 09:54

General

  • Target

    1e1aa7febb7d18e4661e01e2cc9d0d0a.dll

  • Size

    1.4MB

  • MD5

    1e1aa7febb7d18e4661e01e2cc9d0d0a

  • SHA1

    0b3314d2273e4210b325f774e6bab6f22bcacdfb

  • SHA256

    aa9807d6e31b92125ea437d3aa692a5a764a70f931c6f19595ff63066443abd5

  • SHA512

    ef55806c2268d4de5134c92b3e6caaba71304cf281daffa35752fa806dd42bf40d0a5502de2531723c5faa44c5d6d56db7e2a37c93045d21029a96c6ce5e31cf

  • SSDEEP

    12288:4VI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:tfP7fWsK5z9A+WGAW+V5SB6Ct4bnb

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1e1aa7febb7d18e4661e01e2cc9d0d0a.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:5068
  • C:\Windows\system32\upfc.exe
    C:\Windows\system32\upfc.exe
    1⤵
      PID:1952
    • C:\Users\Admin\AppData\Local\w89Du\systemreset.exe
      C:\Users\Admin\AppData\Local\w89Du\systemreset.exe
      1⤵
        PID:3004
      • C:\Windows\system32\systemreset.exe
        C:\Windows\system32\systemreset.exe
        1⤵
          PID:1348
        • C:\Users\Admin\AppData\Local\0GtA\mblctr.exe
          C:\Users\Admin\AppData\Local\0GtA\mblctr.exe
          1⤵
            PID:1764
          • C:\Windows\system32\mblctr.exe
            C:\Windows\system32\mblctr.exe
            1⤵
              PID:3728
            • C:\Users\Admin\AppData\Local\ogoZq4jN\upfc.exe
              C:\Users\Admin\AppData\Local\ogoZq4jN\upfc.exe
              1⤵
                PID:4724

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/1764-81-0x0000000140000000-0x0000000140169000-memory.dmp

                Filesize

                1.4MB

              • memory/1764-83-0x0000015060000000-0x0000015060007000-memory.dmp

                Filesize

                28KB

              • memory/1764-88-0x0000000140000000-0x0000000140169000-memory.dmp

                Filesize

                1.4MB

              • memory/3004-107-0x0000000140000000-0x0000000140169000-memory.dmp

                Filesize

                1.4MB

              • memory/3004-102-0x0000029F312D0000-0x0000029F312D7000-memory.dmp

                Filesize

                28KB

              • memory/3004-100-0x0000029F31280000-0x0000029F313E9000-memory.dmp

                Filesize

                1.4MB

              • memory/3480-19-0x0000000140000000-0x0000000140168000-memory.dmp

                Filesize

                1.4MB

              • memory/3480-18-0x0000000140000000-0x0000000140168000-memory.dmp

                Filesize

                1.4MB

              • memory/3480-43-0x00007FFB321E0000-0x00007FFB321F0000-memory.dmp

                Filesize

                64KB

              • memory/3480-54-0x0000000140000000-0x0000000140168000-memory.dmp

                Filesize

                1.4MB

              • memory/3480-5-0x00000000090C0000-0x00000000090C1000-memory.dmp

                Filesize

                4KB

              • memory/3480-7-0x0000000140000000-0x0000000140168000-memory.dmp

                Filesize

                1.4MB

              • memory/3480-35-0x0000000140000000-0x0000000140168000-memory.dmp

                Filesize

                1.4MB

              • memory/3480-33-0x0000000140000000-0x0000000140168000-memory.dmp

                Filesize

                1.4MB

              • memory/3480-26-0x0000000140000000-0x0000000140168000-memory.dmp

                Filesize

                1.4MB

              • memory/3480-17-0x0000000140000000-0x0000000140168000-memory.dmp

                Filesize

                1.4MB

              • memory/3480-9-0x0000000140000000-0x0000000140168000-memory.dmp

                Filesize

                1.4MB

              • memory/3480-10-0x00007FFB30A7A000-0x00007FFB30A7B000-memory.dmp

                Filesize

                4KB

              • memory/3480-11-0x0000000140000000-0x0000000140168000-memory.dmp

                Filesize

                1.4MB

              • memory/3480-52-0x0000000140000000-0x0000000140168000-memory.dmp

                Filesize

                1.4MB

              • memory/3480-34-0x00000000090A0000-0x00000000090A7000-memory.dmp

                Filesize

                28KB

              • memory/3480-32-0x0000000140000000-0x0000000140168000-memory.dmp

                Filesize

                1.4MB

              • memory/3480-31-0x0000000140000000-0x0000000140168000-memory.dmp

                Filesize

                1.4MB

              • memory/3480-30-0x0000000140000000-0x0000000140168000-memory.dmp

                Filesize

                1.4MB

              • memory/3480-29-0x0000000140000000-0x0000000140168000-memory.dmp

                Filesize

                1.4MB

              • memory/3480-28-0x0000000140000000-0x0000000140168000-memory.dmp

                Filesize

                1.4MB

              • memory/3480-27-0x0000000140000000-0x0000000140168000-memory.dmp

                Filesize

                1.4MB

              • memory/3480-25-0x0000000140000000-0x0000000140168000-memory.dmp

                Filesize

                1.4MB

              • memory/3480-24-0x0000000140000000-0x0000000140168000-memory.dmp

                Filesize

                1.4MB

              • memory/3480-23-0x0000000140000000-0x0000000140168000-memory.dmp

                Filesize

                1.4MB

              • memory/3480-22-0x0000000140000000-0x0000000140168000-memory.dmp

                Filesize

                1.4MB

              • memory/3480-21-0x0000000140000000-0x0000000140168000-memory.dmp

                Filesize

                1.4MB

              • memory/3480-20-0x0000000140000000-0x0000000140168000-memory.dmp

                Filesize

                1.4MB

              • memory/3480-12-0x0000000140000000-0x0000000140168000-memory.dmp

                Filesize

                1.4MB

              • memory/3480-42-0x0000000140000000-0x0000000140168000-memory.dmp

                Filesize

                1.4MB

              • memory/3480-16-0x0000000140000000-0x0000000140168000-memory.dmp

                Filesize

                1.4MB

              • memory/3480-15-0x0000000140000000-0x0000000140168000-memory.dmp

                Filesize

                1.4MB

              • memory/3480-14-0x0000000140000000-0x0000000140168000-memory.dmp

                Filesize

                1.4MB

              • memory/3480-13-0x0000000140000000-0x0000000140168000-memory.dmp

                Filesize

                1.4MB

              • memory/4724-64-0x0000000140000000-0x0000000140169000-memory.dmp

                Filesize

                1.4MB

              • memory/4724-66-0x0000021E907A0000-0x0000021E907A7000-memory.dmp

                Filesize

                28KB

              • memory/4724-70-0x0000000140000000-0x0000000140169000-memory.dmp

                Filesize

                1.4MB

              • memory/5068-2-0x0000016090950000-0x0000016090957000-memory.dmp

                Filesize

                28KB

              • memory/5068-1-0x0000000140000000-0x0000000140168000-memory.dmp

                Filesize

                1.4MB

              • memory/5068-0-0x0000000140000000-0x0000000140168000-memory.dmp

                Filesize

                1.4MB

              • memory/5068-8-0x0000000140000000-0x0000000140168000-memory.dmp

                Filesize

                1.4MB