Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/07/2024, 06:52

General

  • Target

    a4572e7d4e5c1548ceb7216066e8c131a2c41b7717d6ef89f1d43c8e68816b94.dll

  • Size

    824KB

  • MD5

    afd56972bd23300ceff79144c07af499

  • SHA1

    3b28fc603adc5770fecd90803728632de3da95e0

  • SHA256

    a4572e7d4e5c1548ceb7216066e8c131a2c41b7717d6ef89f1d43c8e68816b94

  • SHA512

    ba1df4f52018052a4382521c05e114bf9e566b22d297e05ef11385ac070c8b458ff8d860b4ffd4f0b620a8ac676623f8de155e264b9cf291bc77aea00ac73517

  • SSDEEP

    12288:5Bim9Tnts08FbKuPcA8NAc1l/XkGaZKoRQIpRX2/0Ak2ng/Zi66wNdufAdN:b/nts0Q9K/0ooRQIxAk2wi0N/

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 11 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a4572e7d4e5c1548ceb7216066e8c131a2c41b7717d6ef89f1d43c8e68816b94.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:1480
  • C:\Windows\system32\CameraSettingsUIHost.exe
    C:\Windows\system32\CameraSettingsUIHost.exe
    1⤵
      PID:4912
    • C:\Users\Admin\AppData\Local\oiJcaaJE\CameraSettingsUIHost.exe
      C:\Users\Admin\AppData\Local\oiJcaaJE\CameraSettingsUIHost.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2628
    • C:\Windows\system32\GamePanel.exe
      C:\Windows\system32\GamePanel.exe
      1⤵
        PID:736
      • C:\Users\Admin\AppData\Local\0Bo\GamePanel.exe
        C:\Users\Admin\AppData\Local\0Bo\GamePanel.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:1892
      • C:\Windows\system32\BitLockerWizard.exe
        C:\Windows\system32\BitLockerWizard.exe
        1⤵
          PID:3252
        • C:\Users\Admin\AppData\Local\RpyZx9\BitLockerWizard.exe
          C:\Users\Admin\AppData\Local\RpyZx9\BitLockerWizard.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:3736

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\0Bo\GamePanel.exe

          Filesize

          1.2MB

          MD5

          266f6a62c16f6a889218800762b137be

          SHA1

          31b9bd85a37bf0cbb38a1c30147b83671458fa72

          SHA256

          71f8f11f26f3a7c1498373f20f0f4cc960513d0383fe24906eeb1bc9678beecd

          SHA512

          b21d9b0656ab6bd3b158922722a332f07096ddd4215c802776c5807c9cf6ece40082dd986ea6867bdc8d22878ce035a5c8dfcc26cfae94aeee059701b6bf1e68

        • C:\Users\Admin\AppData\Local\0Bo\dxgi.dll

          Filesize

          828KB

          MD5

          594e6d813cd69dcebc61a91ed8f20ac3

          SHA1

          e3d1514e56f1c252b8ce23ea4a4597be4db4ac33

          SHA256

          9c2e1b711af02f6674f9adc176b8c512452fd3cb824002f432b399395044cdd4

          SHA512

          1307e677a0632099256cd302601f77ab9298d861f7385d0d756d1407b8ef3ceb464b8e3a5313a9b628fa7dde590c939bc1a38a1c1fe51c1044465ad0cf18f858

        • C:\Users\Admin\AppData\Local\RpyZx9\BitLockerWizard.exe

          Filesize

          100KB

          MD5

          6d30c96f29f64b34bc98e4c81d9b0ee8

          SHA1

          4a3adc355f02b9c69bdbe391bfb01469dee15cf0

          SHA256

          7758227642702e645af5e84d1c0e5690e07687c8209072a2c5f79379299edf74

          SHA512

          25471b0ac7156d9ee9d12181020039bf551ba3efe252b656030c12d93b8db2648a18bdf762740f2a5cd8e43640e4bd4e8742310dea15823fc76b9e1c126876b8

        • C:\Users\Admin\AppData\Local\RpyZx9\FVEWIZ.dll

          Filesize

          828KB

          MD5

          11572e3d1e6cd623985eb632f8875fb5

          SHA1

          3aa3578ad26b16f33a5a436bae5e4084afdb0c83

          SHA256

          30af41879ac94d491c708f34480f0c5cca097df1f7e0bdae3aa8783dfee1f3fb

          SHA512

          89ad5e6428f6ff969eb0a1c5e1f1f1e7db492d4d32d5cc29cdf8d82bc4b51ecc1152afc64b6f545037b05469ead697d918eb37b71bd03d26fba7d7180aeb58a2

        • C:\Users\Admin\AppData\Local\oiJcaaJE\CameraSettingsUIHost.exe

          Filesize

          31KB

          MD5

          9e98636523a653c7a648f37be229cf69

          SHA1

          bd4da030e7cf4d55b7c644dfacd26b152e6a14c4

          SHA256

          3bf20bc5a208dfa1ea26a042fd0010b1268dcfedc94ed775f11890bc1d95e717

          SHA512

          41966166e2ddfe40e6f4e6da26bc490775caac9997465c6dd94ba6a664d3a797ffc2aa5684c95702e8657e5cea62a46a75aee3e7d5e07a47dcaaa5c4da565e78

        • C:\Users\Admin\AppData\Local\oiJcaaJE\DUI70.dll

          Filesize

          1.1MB

          MD5

          15b887f57772f8e77d1117c8de39caf2

          SHA1

          7df0455ad3a68071158619c78666020a21a8263e

          SHA256

          a824f760f0ff6f03fde778300ac42c699456935044a3c0af4a043124e68f0996

          SHA512

          991ca853d0b0617017ddd2cc2885a94d9a3994ea4abd1b178f52f499b1421a63a0f33320746e4411dc968e6b7a160a001434adab9aa35f264562f40036aae559

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Jvqpxdxetujh.lnk

          Filesize

          1KB

          MD5

          5a0c9575db124f5a3496f1667798de94

          SHA1

          6583495787f3d34e9b4cea929180724adb3737fe

          SHA256

          6037d590f9854306ab9a208b20144b2549af5559d9c67332789ee6150ca7ef4e

          SHA512

          de9d68760f2ed3b9d100fa849ab15849da3b53a11e37d289dbe6f4bd1d5f79aaeede5924b2347660adbf2a91ef0cfcffdb69d0fa4c489a9028257b3fdbc98abf

        • memory/1480-0-0x00007FFF08890000-0x00007FFF0895E000-memory.dmp

          Filesize

          824KB

        • memory/1480-2-0x000002AF22A10000-0x000002AF22A17000-memory.dmp

          Filesize

          28KB

        • memory/1480-52-0x00007FFF08890000-0x00007FFF0895E000-memory.dmp

          Filesize

          824KB

        • memory/1892-78-0x0000021DF0DB0000-0x0000021DF0DB7000-memory.dmp

          Filesize

          28KB

        • memory/1892-76-0x00007FFEFA0C0000-0x00007FFEFA18F000-memory.dmp

          Filesize

          828KB

        • memory/1892-81-0x00007FFEFA0C0000-0x00007FFEFA18F000-memory.dmp

          Filesize

          828KB

        • memory/2628-64-0x00007FFEFA110000-0x00007FFEFA224000-memory.dmp

          Filesize

          1.1MB

        • memory/2628-61-0x0000015C3EB40000-0x0000015C3EB47000-memory.dmp

          Filesize

          28KB

        • memory/2628-59-0x00007FFEFA110000-0x00007FFEFA224000-memory.dmp

          Filesize

          1.1MB

        • memory/3520-28-0x0000000140000000-0x00000001400CE000-memory.dmp

          Filesize

          824KB

        • memory/3520-6-0x0000000140000000-0x00000001400CE000-memory.dmp

          Filesize

          824KB

        • memory/3520-19-0x0000000140000000-0x00000001400CE000-memory.dmp

          Filesize

          824KB

        • memory/3520-18-0x0000000140000000-0x00000001400CE000-memory.dmp

          Filesize

          824KB

        • memory/3520-17-0x0000000140000000-0x00000001400CE000-memory.dmp

          Filesize

          824KB

        • memory/3520-16-0x0000000140000000-0x00000001400CE000-memory.dmp

          Filesize

          824KB

        • memory/3520-15-0x0000000140000000-0x00000001400CE000-memory.dmp

          Filesize

          824KB

        • memory/3520-13-0x0000000140000000-0x00000001400CE000-memory.dmp

          Filesize

          824KB

        • memory/3520-12-0x0000000140000000-0x00000001400CE000-memory.dmp

          Filesize

          824KB

        • memory/3520-11-0x0000000140000000-0x00000001400CE000-memory.dmp

          Filesize

          824KB

        • memory/3520-10-0x0000000140000000-0x00000001400CE000-memory.dmp

          Filesize

          824KB

        • memory/3520-9-0x0000000140000000-0x00000001400CE000-memory.dmp

          Filesize

          824KB

        • memory/3520-8-0x0000000140000000-0x00000001400CE000-memory.dmp

          Filesize

          824KB

        • memory/3520-7-0x0000000140000000-0x00000001400CE000-memory.dmp

          Filesize

          824KB

        • memory/3520-30-0x0000000140000000-0x00000001400CE000-memory.dmp

          Filesize

          824KB

        • memory/3520-27-0x0000000140000000-0x00000001400CE000-memory.dmp

          Filesize

          824KB

        • memory/3520-14-0x0000000140000000-0x00000001400CE000-memory.dmp

          Filesize

          824KB

        • memory/3520-21-0x0000000140000000-0x00000001400CE000-memory.dmp

          Filesize

          824KB

        • memory/3520-23-0x0000000140000000-0x00000001400CE000-memory.dmp

          Filesize

          824KB

        • memory/3520-24-0x0000000140000000-0x00000001400CE000-memory.dmp

          Filesize

          824KB

        • memory/3520-25-0x0000000140000000-0x00000001400CE000-memory.dmp

          Filesize

          824KB

        • memory/3520-26-0x0000000140000000-0x00000001400CE000-memory.dmp

          Filesize

          824KB

        • memory/3520-38-0x0000000140000000-0x00000001400CE000-memory.dmp

          Filesize

          824KB

        • memory/3520-39-0x00007FFF17AE0000-0x00007FFF17AF0000-memory.dmp

          Filesize

          64KB

        • memory/3520-49-0x0000000140000000-0x00000001400CE000-memory.dmp

          Filesize

          824KB

        • memory/3520-40-0x00007FFF17AD0000-0x00007FFF17AE0000-memory.dmp

          Filesize

          64KB

        • memory/3520-37-0x0000000000EF0000-0x0000000000EF7000-memory.dmp

          Filesize

          28KB

        • memory/3520-29-0x0000000140000000-0x00000001400CE000-memory.dmp

          Filesize

          824KB

        • memory/3520-22-0x0000000140000000-0x00000001400CE000-memory.dmp

          Filesize

          824KB

        • memory/3520-20-0x0000000140000000-0x00000001400CE000-memory.dmp

          Filesize

          824KB

        • memory/3520-3-0x0000000002D30000-0x0000000002D31000-memory.dmp

          Filesize

          4KB

        • memory/3520-5-0x00007FFF178FA000-0x00007FFF178FB000-memory.dmp

          Filesize

          4KB

        • memory/3736-96-0x00007FFEFA160000-0x00007FFEFA22F000-memory.dmp

          Filesize

          828KB

        • memory/3736-92-0x00007FFEFA160000-0x00007FFEFA22F000-memory.dmp

          Filesize

          828KB