Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-01-2024 09:39

General

  • Target

    6cf99878a472700f873bfe4ba861b27e.dll

  • Size

    1.6MB

  • MD5

    6cf99878a472700f873bfe4ba861b27e

  • SHA1

    0b3c08f07d5cdc9b5d916ac6588361d426bc0d5f

  • SHA256

    770fabafd2e9368ab8dfdcce39b8dfde8df9439be93f5fc9184c90206dae4d16

  • SHA512

    bed1c895105fca948804d5cdb88b5146a13d03eb1dde422c21810e055a94ec7a10898b2d0b79827a0dbd404fc8b50f7474b0f5acb759bf0d843d4d56cc4d1513

  • SSDEEP

    12288:4VI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:tfP7fWsK5z9A+WGAW+V5SB6Ct4bnb

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\6cf99878a472700f873bfe4ba861b27e.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:3952
  • C:\Windows\system32\quickassist.exe
    C:\Windows\system32\quickassist.exe
    1⤵
      PID:2060
    • C:\Users\Admin\AppData\Local\85KW\quickassist.exe
      C:\Users\Admin\AppData\Local\85KW\quickassist.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:1160
    • C:\Windows\system32\DWWIN.EXE
      C:\Windows\system32\DWWIN.EXE
      1⤵
        PID:928
      • C:\Users\Admin\AppData\Local\FqtjT5EE6\DWWIN.EXE
        C:\Users\Admin\AppData\Local\FqtjT5EE6\DWWIN.EXE
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:4048
      • C:\Windows\system32\mblctr.exe
        C:\Windows\system32\mblctr.exe
        1⤵
          PID:1812
        • C:\Users\Admin\AppData\Local\nGSSjjB\mblctr.exe
          C:\Users\Admin\AppData\Local\nGSSjjB\mblctr.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:3260

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\85KW\UxTheme.dll

          Filesize

          1.6MB

          MD5

          f0023d97c9b777bac1f115ac01afed64

          SHA1

          4d9558a9e07b2c8575aab6cfef2787b1e7d64433

          SHA256

          a43125a1c812376d5bf61ab9cc38c2933335f7a9c2a340392bf1e1007a140223

          SHA512

          672fc416ad2d3f169877160670f952e2f6bd9d15ba5e7089dbc229e1a02fc1064190b1d561a956af7861ab55eb84e57b078ec3ceb7e010a2e47b1d53e103f8f7

        • C:\Users\Admin\AppData\Local\85KW\quickassist.exe

          Filesize

          665KB

          MD5

          d1216f9b9a64fd943539cc2b0ddfa439

          SHA1

          6fad9aeb7780bdfd88a9a5a73b35b3e843605e6c

          SHA256

          c1e8fda00da574e8759ba262d76b6edc1d5f4a80620730ef0be7527e0d803db2

          SHA512

          c5fd7d81d1d478056fcbed0ba887ce551832f0104e7c31753c3c8760b4d63f38324f74e996684042acc8f9682fce8a8c85172741a868257e87d5e0f988c4e567

        • C:\Users\Admin\AppData\Local\FqtjT5EE6\DWWIN.EXE

          Filesize

          229KB

          MD5

          444cc4d3422a0fdd45c1b78070026c60

          SHA1

          97162ff341fff1ec54b827ec02f8b86fd2d41a97

          SHA256

          4b3f620272e709ce3e01ae5b19ef0300bd476f2da6412637f703bbaded2821f0

          SHA512

          21742d330a6a5763ea41a8fed4d71b98e4a1b4c685675c4cfeb7253033c3a208c23902caf0efdf470a85e0770cb8fac8af0eb6d3a8511445b0570054b42d5553

        • C:\Users\Admin\AppData\Local\FqtjT5EE6\wer.dll

          Filesize

          1.6MB

          MD5

          6e2870da5d8fcb41cb744071f4c5adae

          SHA1

          03cf0a58405c394baf8021d5a0702f18801c699e

          SHA256

          61a54e740f5fb0620408b131a424fe4271799e5b2c9553bd2a531f2bc60bd4db

          SHA512

          6f6765ca268535e1cc584c5950890fea3def6cd740eaee6112467ea868d261c291973625a2a573089b33d6eabe024fc0cded0ff5cc7c316d6993ed179dc57ea8

        • C:\Users\Admin\AppData\Local\nGSSjjB\WINMM.dll

          Filesize

          1.6MB

          MD5

          239f513539b485b114d9a0815ae4afe9

          SHA1

          762bda55c5556f8972fb65856244dbff6fc20e47

          SHA256

          27ed7ff3725fac4d5eb83234e880e544dd3c2696edcd84f20b25921409d4a9d0

          SHA512

          3d3a6ba168afb20a01834966329f2d683e380e2aee124b79def7ff9eab10592515fc61eae4de7d09131552b84eaa020299975ee004b813311a9a5035fe0122b4

        • C:\Users\Admin\AppData\Local\nGSSjjB\mblctr.exe

          Filesize

          790KB

          MD5

          d3db14eabb2679e08020bcd0c96fa9f6

          SHA1

          578dca7aad29409634064579d269e61e1f07d9dd

          SHA256

          3baa1dc0756ebb0c2c70a31be7147863d8d8ba056c1aa7f979307f8790d1ff69

          SHA512

          14dc895ae458ff0ca13d9c27aa5b4cfc906d338603d43389bb5f4429be593a587818855d1fe938f9ebebf46467fb0c1ab28247e8f9f5357098e8b822ecd8fffe

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Btpzaqnqvnv.lnk

          Filesize

          1KB

          MD5

          3251cc23f2eeaa910c71ee60cfed9ffa

          SHA1

          03cf67d9afcdab0055d0cd443031053a15e1fe0d

          SHA256

          2e1cbdcfabec6a5183e49064abbb92a8f2f18702dd4aaa7d219a218f0a104dbb

          SHA512

          d3767959d706215a971535633f03c3ad459fece525907e3345658d055c8db37c6d0f0dbbc1d108d8789b7c35a0a399d43ceed52923a2adab5fac7e3185ca43e5

        • memory/1160-88-0x0000000140000000-0x0000000140193000-memory.dmp

          Filesize

          1.6MB

        • memory/1160-81-0x0000000140000000-0x0000000140193000-memory.dmp

          Filesize

          1.6MB

        • memory/1160-82-0x000002B253350000-0x000002B253357000-memory.dmp

          Filesize

          28KB

        • memory/1160-80-0x0000000140000000-0x0000000140193000-memory.dmp

          Filesize

          1.6MB

        • memory/3260-120-0x00000221EEDD0000-0x00000221EEDD7000-memory.dmp

          Filesize

          28KB

        • memory/3260-118-0x0000000140000000-0x0000000140194000-memory.dmp

          Filesize

          1.6MB

        • memory/3260-126-0x0000000140000000-0x0000000140194000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-39-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-48-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-21-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-7-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-9-0x00007FFE42BBA000-0x00007FFE42BBB000-memory.dmp

          Filesize

          4KB

        • memory/3440-24-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-25-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-26-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-27-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-28-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-29-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-30-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-31-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-33-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-32-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-34-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-35-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-36-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-37-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-38-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-5-0x0000000003680000-0x0000000003681000-memory.dmp

          Filesize

          4KB

        • memory/3440-40-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-41-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-42-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-43-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-44-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-45-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-46-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-47-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-23-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-49-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-50-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-52-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-51-0x0000000002F30000-0x0000000002F37000-memory.dmp

          Filesize

          28KB

        • memory/3440-59-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-60-0x00007FFE44340000-0x00007FFE44350000-memory.dmp

          Filesize

          64KB

        • memory/3440-69-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-71-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-15-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-20-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-19-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-18-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-17-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-16-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-8-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-14-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-10-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-11-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-12-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3440-13-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3952-22-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3952-0-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/3952-2-0x000001E417E10000-0x000001E417E17000-memory.dmp

          Filesize

          28KB

        • memory/3952-1-0x0000000140000000-0x0000000140192000-memory.dmp

          Filesize

          1.6MB

        • memory/4048-107-0x0000000140000000-0x0000000140194000-memory.dmp

          Filesize

          1.6MB

        • memory/4048-99-0x0000000140000000-0x0000000140194000-memory.dmp

          Filesize

          1.6MB

        • memory/4048-101-0x00000298BB6D0000-0x00000298BB6D7000-memory.dmp

          Filesize

          28KB