Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    28s
  • max time network
    36s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/07/2024, 17:47

General

  • Target

    necurs.exe

  • Size

    1008KB

  • MD5

    6e05e84c7a993880409d7a0324c10e74

  • SHA1

    4cac8146d54c5e47ec1c31a04c3cafdec9fbf209

  • SHA256

    ffb1150bbb28d53f325b00445be935cd657c1d8061ba73e91af5b343b6c0d438

  • SHA512

    4a4fa48ce31abea8cab4ca176f9d5be4b1b9b9c45c574f2e3605eaf04fd2fbd3da37d464300b2954623b0b9d377cff0a47d082b7fc1cc82a6d3eeab87555d43a

  • SSDEEP

    24576:XiB1Q0SPpqqUGB9Qe5k04Q9RGuRUEy3FKEdeybpk/w:XJ/PMq3B9Qet1pyVbNbGo

Malware Config

Extracted

Family

dridex

C2

0.79.198.234:6811

59.14.232.108:13510

153.85.116.88:34145

109.165.79.26:57028

3.48.31.250:32970

198.99.233.8:64668

4.144.183.219:57415

170.9.63.116:12621

82.190.146.50:8956

110.106.233.26:61144

231.170.120.138:36240

104.89.112.76:49715

14.217.137.57:20854

108.38.229.252:62814

53.121.3.237:39876

97.219.18.138:20575

120.178.203.178:46408

220.127.249.215:18420

172.217.87.204:28067

175.53.142.26:45560

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Loader 4 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Modifies registry class 10 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\necurs.exe
    "C:\Users\Admin\AppData\Local\Temp\necurs.exe"
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4280
    • C:\Windows\system32\browserexport.exe
      C:\Windows\system32\browserexport.exe
      2⤵
        PID:704
      • C:\Windows\system32\browser_broker.exe
        C:\Windows\system32\browser_broker.exe
        2⤵
          PID:2100
        • C:\Windows\system32\calc.exe
          C:\Windows\system32\calc.exe
          2⤵
            PID:2704
          • C:\Windows\system32\CameraSettingsUIHost.exe
            C:\Windows\system32\CameraSettingsUIHost.exe
            2⤵
              PID:3128
            • C:\Windows\SysWOW64\schtasks.exe
              C:\Windows\system32\schtasks.exe /create /F /TN "Ljlkwqtqf" /TR "C:\Users\Admin\AppData\Roaming\1XLo8y\CameraSettingsUIHost.exe" /RU Admin /SC minute /MO 60
              2⤵
              • Scheduled Task/Job: Scheduled Task
              PID:2260
            • C:\Windows\SysWOW64\schtasks.exe
              C:\Windows\system32\schtasks.exe /run /TN "Ljlkwqtqf"
              2⤵
                PID:4932
            • C:\Windows\System32\rundll32.exe
              C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
              1⤵
                PID:3228
              • C:\Users\Admin\AppData\Local\Temp\necurs.exe
                "C:\Users\Admin\AppData\Local\Temp\necurs.exe"
                1⤵
                • Checks whether UAC is enabled
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4432
                • C:\Windows\system32\services.exe
                  C:\Windows\system32\services.exe
                  2⤵
                    PID:2636
                  • C:\Windows\system32\sessionmsg.exe
                    C:\Windows\system32\sessionmsg.exe
                    2⤵
                      PID:1280
                    • C:\Windows\SysWOW64\schtasks.exe
                      C:\Windows\system32\schtasks.exe /create /F /TN "Ljlkwqtqf" /TR "C:\Users\Admin\AppData\Roaming\g9R6\sessionmsg.exe" /RU Admin /SC minute /MO 60
                      2⤵
                      • Scheduled Task/Job: Scheduled Task
                      PID:4272
                    • C:\Windows\SysWOW64\schtasks.exe
                      C:\Windows\system32\schtasks.exe /run /TN "Ljlkwqtqf"
                      2⤵
                        PID:184
                    • C:\Users\Admin\AppData\Local\Temp\necurs.exe
                      "C:\Users\Admin\AppData\Local\Temp\necurs.exe"
                      1⤵
                      • Checks whether UAC is enabled
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2708
                    • C:\Users\Admin\AppData\Local\Temp\necurs.exe
                      "C:\Users\Admin\AppData\Local\Temp\necurs.exe"
                      1⤵
                      • Checks whether UAC is enabled
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:4496
                      • C:\Windows\system32\TokenBrokerCookies.exe
                        C:\Windows\system32\TokenBrokerCookies.exe
                        2⤵
                          PID:2588
                        • C:\Windows\system32\tpmvscmgrsvr.exe
                          C:\Windows\system32\tpmvscmgrsvr.exe
                          2⤵
                            PID:3736
                          • C:\Windows\system32\TSTheme.exe
                            C:\Windows\system32\TSTheme.exe
                            2⤵
                              PID:4412
                            • C:\Windows\system32\TSWbPrxy.exe
                              C:\Windows\system32\TSWbPrxy.exe
                              2⤵
                                PID:1612
                              • C:\Windows\system32\ucsvc.exe
                                C:\Windows\system32\ucsvc.exe
                                2⤵
                                  PID:2520
                                • C:\Windows\system32\UIMgrBroker.exe
                                  C:\Windows\system32\UIMgrBroker.exe
                                  2⤵
                                    PID:3212
                                  • C:\Windows\system32\unregmp2.exe
                                    C:\Windows\system32\unregmp2.exe
                                    2⤵
                                      PID:2892
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      C:\Windows\system32\schtasks.exe /create /F /TN "Ljlkwqtqf" /TR "C:\Users\Admin\AppData\Roaming\aXIx\unregmp2.exe" /RU Admin /SC minute /MO 60
                                      2⤵
                                      • Scheduled Task/Job: Scheduled Task
                                      PID:4260
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      C:\Windows\system32\schtasks.exe /run /TN "Ljlkwqtqf"
                                      2⤵
                                        PID:4204
                                    • C:\Users\Admin\AppData\Roaming\1XLo8y\CameraSettingsUIHost.exe
                                      C:\Users\Admin\AppData\Roaming\1XLo8y\CameraSettingsUIHost.exe
                                      1⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Checks whether UAC is enabled
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:1268
                                    • C:\Users\Admin\AppData\Roaming\aXIx\unregmp2.exe
                                      C:\Users\Admin\AppData\Roaming\aXIx\unregmp2.exe
                                      1⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Checks whether UAC is enabled
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:2780
                                    • C:\Users\Admin\AppData\Roaming\g9R6\sessionmsg.exe
                                      C:\Users\Admin\AppData\Roaming\g9R6\sessionmsg.exe
                                      1⤵
                                        PID:3972

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Roaming\1XLo8y\CameraSettingsUIHost.exe

                                        Filesize

                                        31KB

                                        MD5

                                        9e98636523a653c7a648f37be229cf69

                                        SHA1

                                        bd4da030e7cf4d55b7c644dfacd26b152e6a14c4

                                        SHA256

                                        3bf20bc5a208dfa1ea26a042fd0010b1268dcfedc94ed775f11890bc1d95e717

                                        SHA512

                                        41966166e2ddfe40e6f4e6da26bc490775caac9997465c6dd94ba6a664d3a797ffc2aa5684c95702e8657e5cea62a46a75aee3e7d5e07a47dcaaa5c4da565e78

                                      • C:\Users\Admin\AppData\Roaming\1XLo8y\DUI70.dll

                                        Filesize

                                        972KB

                                        MD5

                                        2cb92fedd3d1c1159d4690016f095681

                                        SHA1

                                        57823745e4f2a17553cb7acf7d11b90870ca36f1

                                        SHA256

                                        458968e3795b832e977c9adfa2a18b4c784380a19ed92439fd41ff9af04d437b

                                        SHA512

                                        820475d44d983a3b7db72f1285180f4c51e54c1b4755d04eeedc82164261a570d963696b43b05e09a52da118b97822408f79bd48980db07f9581e02cbc079c3b

                                      • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3642458265-1901903390-453309326-1000\0f5007522459c86e95ffcc62f32308f1_5bcbec04-14ea-4af4-ad61-da8ce2826342

                                        Filesize

                                        1KB

                                        MD5

                                        950ebe96859f7ad2194cce45ba32bede

                                        SHA1

                                        ec77126b84fba5f858a84cde4373e1724c86d481

                                        SHA256

                                        1db92b26f408ddb6f3ac47574cd49cf4dc131efa8090477bf6d0a5feea4bdf1c

                                        SHA512

                                        4755508c6a9fb44d196c2fb4de3cd229b5526f48e1baf0057db858930d5e940c0e7c2c62cfc1e66e558987f2e93d11abeded72c709020df80c0b773607c33d8b

                                      • C:\Users\Admin\AppData\Roaming\aXIx\VERSION.dll

                                        Filesize

                                        692KB

                                        MD5

                                        578e0d415a769435a4e11c25b224e852

                                        SHA1

                                        ef09b8b865fa3cfe1bb324abb283c50d326bb3eb

                                        SHA256

                                        f4c44e7c8989d453cf33f595fc31c94217326933757084872b004f1085c8c593

                                        SHA512

                                        c0d513543498f6549b2efe78c83bc5f982b989f3d2caa92e9e2866d3b4c150b5e2bb94a510ca1412f8cacc6e5cd86784d1bd4aafab54a74a9306cd0fccad8247

                                      • C:\Users\Admin\AppData\Roaming\aXIx\unregmp2.exe

                                        Filesize

                                        259KB

                                        MD5

                                        a6fc8ce566dec7c5873cb9d02d7b874e

                                        SHA1

                                        a30040967f75df85a1e3927bdce159b102011a61

                                        SHA256

                                        21f41fea24dddc8a32f902af7b0387a53a745013429d8fd3f5fa6916eadc839d

                                        SHA512

                                        f83e17dd305eb1bc24cca1f197e2440f9b501eafb9c9d44ede7c88b1520030a87d059bdcb8eadeac1eaedabcbc4fe50206821965d73f0f6671e27edd55c01cbc

                                      • C:\Users\Admin\AppData\Roaming\g9R6\DUser.dll

                                        Filesize

                                        700KB

                                        MD5

                                        c320690c016d5d7898fed331c3c1882e

                                        SHA1

                                        997a27e93e141822146aee06adf8656c30e3d31f

                                        SHA256

                                        5b2b9dc6cd47941df95f9ad403042859ee05311f38c561827568d0cfc8c1d76d

                                        SHA512

                                        aa9fad891320857509c45d6793d7e34905f3694f9e35e8df95fe01cc112a5d5b427ba679a84aeb9d823ada999cca550736337637fcf669d14c6aeb6c8f773a91

                                      • C:\Users\Admin\AppData\Roaming\g9R6\sessionmsg.exe

                                        Filesize

                                        85KB

                                        MD5

                                        480f710806b68dfe478ca1ec7d7e79cc

                                        SHA1

                                        b4fc97fed2dbff9c4874cb65ede7b50699db37cd

                                        SHA256

                                        2416cd4aa577dbb2f8790a61e36fbab2b30bff81a4e1f67a5151c2fec29585bc

                                        SHA512

                                        29d3d234ebc45049a533b6a91b246ac043a56b9af67276aaf493b014ae34d73000f99a6b0c0b85d2dfb7fba54811cf8bbdfd167a9eed01a8617b7f05bf2971db

                                      • memory/1268-49-0x00007FFD675A0000-0x00007FFD67693000-memory.dmp

                                        Filesize

                                        972KB

                                      • memory/1268-24-0x00007FFD675A0000-0x00007FFD67693000-memory.dmp

                                        Filesize

                                        972KB

                                      • memory/2708-9-0x00000000009D0000-0x00000000009D6000-memory.dmp

                                        Filesize

                                        24KB

                                      • memory/2708-78-0x0000000001DE0000-0x0000000001EDC000-memory.dmp

                                        Filesize

                                        1008KB

                                      • memory/2780-81-0x00007FFD675F0000-0x00007FFD6769D000-memory.dmp

                                        Filesize

                                        692KB

                                      • memory/2780-76-0x00007FFD675F0000-0x00007FFD6769D000-memory.dmp

                                        Filesize

                                        692KB

                                      • memory/3472-31-0x0000000140000000-0x00000001400F3000-memory.dmp

                                        Filesize

                                        972KB

                                      • memory/3472-67-0x0000000140000000-0x00000001400F3000-memory.dmp

                                        Filesize

                                        972KB

                                      • memory/3472-57-0x0000000140000000-0x00000001400F3000-memory.dmp

                                        Filesize

                                        972KB

                                      • memory/3472-60-0x0000000140000000-0x00000001400F3000-memory.dmp

                                        Filesize

                                        972KB

                                      • memory/3472-38-0x0000000140000000-0x00000001400F3000-memory.dmp

                                        Filesize

                                        972KB

                                      • memory/3472-37-0x0000000140000000-0x00000001400F3000-memory.dmp

                                        Filesize

                                        972KB

                                      • memory/3472-34-0x0000000140000000-0x00000001400F3000-memory.dmp

                                        Filesize

                                        972KB

                                      • memory/3472-33-0x0000000140000000-0x00000001400F3000-memory.dmp

                                        Filesize

                                        972KB

                                      • memory/3472-32-0x0000000140000000-0x00000001400F3000-memory.dmp

                                        Filesize

                                        972KB

                                      • memory/3472-87-0x0000000140000000-0x00000001400AD000-memory.dmp

                                        Filesize

                                        692KB

                                      • memory/3472-30-0x0000000140000000-0x00000001400F3000-memory.dmp

                                        Filesize

                                        972KB

                                      • memory/3472-29-0x0000000140000000-0x00000001400F3000-memory.dmp

                                        Filesize

                                        972KB

                                      • memory/3472-36-0x0000000140000000-0x00000001400F3000-memory.dmp

                                        Filesize

                                        972KB

                                      • memory/3472-86-0x0000000140000000-0x00000001400AD000-memory.dmp

                                        Filesize

                                        692KB

                                      • memory/3472-45-0x0000000140000000-0x00000001400F3000-memory.dmp

                                        Filesize

                                        972KB

                                      • memory/3472-55-0x0000000140000000-0x00000001400F3000-memory.dmp

                                        Filesize

                                        972KB

                                      • memory/3472-35-0x0000000140000000-0x00000001400F3000-memory.dmp

                                        Filesize

                                        972KB

                                      • memory/3472-28-0x0000000140000000-0x00000001400F3000-memory.dmp

                                        Filesize

                                        972KB

                                      • memory/3472-26-0x0000000008B30000-0x0000000008B31000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/3472-89-0x0000000140000000-0x00000001400AD000-memory.dmp

                                        Filesize

                                        692KB

                                      • memory/3472-88-0x0000000140000000-0x00000001400AD000-memory.dmp

                                        Filesize

                                        692KB

                                      • memory/3472-85-0x0000000140000000-0x00000001400AD000-memory.dmp

                                        Filesize

                                        692KB

                                      • memory/3472-82-0x0000000140000000-0x00000001400AD000-memory.dmp

                                        Filesize

                                        692KB

                                      • memory/3472-84-0x0000000140000000-0x00000001400AD000-memory.dmp

                                        Filesize

                                        692KB

                                      • memory/3472-83-0x0000000140000000-0x00000001400AD000-memory.dmp

                                        Filesize

                                        692KB

                                      • memory/4280-4-0x0000000001DE0000-0x0000000001EDC000-memory.dmp

                                        Filesize

                                        1008KB

                                      • memory/4280-1-0x0000000001DE0000-0x0000000001EDC000-memory.dmp

                                        Filesize

                                        1008KB

                                      • memory/4280-0-0x0000000000FE0000-0x0000000000FE6000-memory.dmp

                                        Filesize

                                        24KB

                                      • memory/4432-72-0x0000000001DE0000-0x0000000001EDC000-memory.dmp

                                        Filesize

                                        1008KB

                                      • memory/4432-6-0x0000000001860000-0x0000000001866000-memory.dmp

                                        Filesize

                                        24KB

                                      • memory/4496-14-0x0000000000A60000-0x0000000000A66000-memory.dmp

                                        Filesize

                                        24KB