Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    04-08-2024 21:14

General

  • Target

    05b76b5a9bd812690471e49f77601b60N.dll

  • Size

    1.3MB

  • MD5

    05b76b5a9bd812690471e49f77601b60

  • SHA1

    a937bc2cae7cb618db8c71dccb6ffa84f668577e

  • SHA256

    2f31806a63ab5c10dae9614dcb8702ecf21f9cc6a91262cc75934dae299b534e

  • SHA512

    547485b7dc94388f7333988d9086d504c134b79f4e99124e53c5f0f172071abf98af1d7c2f49a7b854de69c2395703d5a763c5390e615de0962b41389bfd1251

  • SSDEEP

    12288:JZgJtlQepQn+NDo7nIgegQCLDF/B9wvj/cLvVZFuwM+:JZK6F7nVeRmDFJivohZFV

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\05b76b5a9bd812690471e49f77601b60N.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:1648
  • C:\Windows\system32\rdpshell.exe
    C:\Windows\system32\rdpshell.exe
    1⤵
      PID:2380
    • C:\Users\Admin\AppData\Local\FKcNywV8K\rdpshell.exe
      C:\Users\Admin\AppData\Local\FKcNywV8K\rdpshell.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious behavior: EnumeratesProcesses
      PID:2784
    • C:\Windows\system32\iexpress.exe
      C:\Windows\system32\iexpress.exe
      1⤵
        PID:2744
      • C:\Users\Admin\AppData\Local\zW0Bxxd\iexpress.exe
        C:\Users\Admin\AppData\Local\zW0Bxxd\iexpress.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        • Suspicious behavior: EnumeratesProcesses
        PID:2568
      • C:\Windows\system32\msinfo32.exe
        C:\Windows\system32\msinfo32.exe
        1⤵
          PID:3044
        • C:\Users\Admin\AppData\Local\UP5\msinfo32.exe
          C:\Users\Admin\AppData\Local\UP5\msinfo32.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:2840

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\FKcNywV8K\WTSAPI32.dll

          Filesize

          1.3MB

          MD5

          e9ade447bf86cdf0b647199d5fbc3868

          SHA1

          09ae70d08d4fd8a266194ad4e0d0debced32040e

          SHA256

          b4ae53f382ac3c264c6812406e9f4a7ae73bcead47bb67ffe2c7946ecfe658e4

          SHA512

          dcedd4f942a2551721c06e572c0fa349a9acc5322647078e79288f41cc34b4d14e7423ae5485ff431a2e8d6157749e64dc3bbcf1b9b7559538f7776e0e89da88

        • C:\Users\Admin\AppData\Local\UP5\MFC42u.dll

          Filesize

          1.3MB

          MD5

          244d1b740d0047f72d2d1544bd89b5b3

          SHA1

          f7e2bb6fde20cbe25a5ce09132625f2006d28ccf

          SHA256

          314383c7f67c3c82ba6ac12fe0d9526d27e95ce4fb748398f35925a575e64b6b

          SHA512

          e436138d45a9dccd0f5cf0fb9962e5193608a6cf7c21fd74992103884f42d178eac693605ec3740bc346b8e741b470b76ce583467d5ba4b84fe5d643d36d4e75

        • C:\Users\Admin\AppData\Local\UP5\msinfo32.exe

          Filesize

          370KB

          MD5

          d291620d4c51c5f5ffa62ccdc52c5c13

          SHA1

          2081c97f15b1c2a2eadce366baf3c510da553cc7

          SHA256

          76e959dd7db31726c040d46cfa86b681479967aea36db5f625e80bd36422e8ae

          SHA512

          75f9bcce4c596dae1f4d78e13d9d53b0c31988d2170c3d9f5db352b8c8a1c8ca58f4a002b30a4b328b8f4769008b750b8a1c9fda44a582e11c3adc38345c334b

        • C:\Users\Admin\AppData\Local\zW0Bxxd\VERSION.dll

          Filesize

          1.3MB

          MD5

          9f14e19a5e8fc2a5722309b757d6560a

          SHA1

          f4ef89adcd80232023cafcff18ee00bd6a748c91

          SHA256

          64e473a0669d75daf61797f1d0a4522d1575ca42f6213fd0085e57b3032a5c42

          SHA512

          d1bb3bf9d007cecd0e3adbceaadeba222194c665f448466d1fc93db5b143a6d9209cf56187c2a1b9ae9998e127056a53a249e9b63f578052f767e7bd9277e0ec

        • C:\Users\Admin\AppData\Local\zW0Bxxd\iexpress.exe

          Filesize

          163KB

          MD5

          46fd16f9b1924a2ea8cd5c6716cc654f

          SHA1

          99284bc91cf829e9602b4b95811c1d72977700b6

          SHA256

          9f993a1f6a133fa8375eab99bf1710471dd13ef177ef713acf8921fb4ff565a3

          SHA512

          52c91043f514f3f8ce07f8e60357786eb7236fcf6cdcccca0dd76000b9a23d6b138cebcdec53b01823cb2313ec850fc7bece326ec01d44ed33f4052b789b7629

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Ngqpewzrrtyksiv.lnk

          Filesize

          1KB

          MD5

          e1a469f8870a6d6ee2afc31afecb9004

          SHA1

          32d025938c96be4d2fd0280fe125f63741ccb6c1

          SHA256

          9fd9ca3209aca51caea1a3ecac85d9b9578dab16179bc22657e2455f7cccf34e

          SHA512

          129575c910b05f1ebadc07a3afdcfd7d9c684069ddf87ffea7f80deff7336908d2f7bff1307d711d19c2964ecf340a5f0e7a2a22d7cf9dbb6668533dd98eb452

        • \Users\Admin\AppData\Local\FKcNywV8K\rdpshell.exe

          Filesize

          292KB

          MD5

          a62dfcea3a58ba8fcf32f831f018fe3f

          SHA1

          75f7690b19866f2c2b3dd3bfdff8a1c6fa8e958b

          SHA256

          f8346a44f12e5b1ca6beaae5fbdf5f7f494ba204379c21d1875b03ba6da6152e

          SHA512

          9a3df5be95017c23ab144302d2275654e86193e2cd94957d5f72bda3cb171ec2a6da14e6631a7fd4fd053b4529f4083aa287ada57484ad0ee01a8e5b2b54c603

        • memory/1176-27-0x0000000140000000-0x000000014014E000-memory.dmp

          Filesize

          1.3MB

        • memory/1176-15-0x0000000140000000-0x000000014014E000-memory.dmp

          Filesize

          1.3MB

        • memory/1176-38-0x0000000077421000-0x0000000077422000-memory.dmp

          Filesize

          4KB

        • memory/1176-29-0x0000000140000000-0x000000014014E000-memory.dmp

          Filesize

          1.3MB

        • memory/1176-28-0x0000000140000000-0x000000014014E000-memory.dmp

          Filesize

          1.3MB

        • memory/1176-4-0x0000000077216000-0x0000000077217000-memory.dmp

          Filesize

          4KB

        • memory/1176-44-0x0000000140000000-0x000000014014E000-memory.dmp

          Filesize

          1.3MB

        • memory/1176-26-0x0000000140000000-0x000000014014E000-memory.dmp

          Filesize

          1.3MB

        • memory/1176-25-0x0000000140000000-0x000000014014E000-memory.dmp

          Filesize

          1.3MB

        • memory/1176-24-0x0000000140000000-0x000000014014E000-memory.dmp

          Filesize

          1.3MB

        • memory/1176-23-0x0000000140000000-0x000000014014E000-memory.dmp

          Filesize

          1.3MB

        • memory/1176-22-0x0000000140000000-0x000000014014E000-memory.dmp

          Filesize

          1.3MB

        • memory/1176-21-0x0000000140000000-0x000000014014E000-memory.dmp

          Filesize

          1.3MB

        • memory/1176-20-0x0000000140000000-0x000000014014E000-memory.dmp

          Filesize

          1.3MB

        • memory/1176-19-0x0000000140000000-0x000000014014E000-memory.dmp

          Filesize

          1.3MB

        • memory/1176-18-0x0000000140000000-0x000000014014E000-memory.dmp

          Filesize

          1.3MB

        • memory/1176-17-0x0000000140000000-0x000000014014E000-memory.dmp

          Filesize

          1.3MB

        • memory/1176-16-0x0000000140000000-0x000000014014E000-memory.dmp

          Filesize

          1.3MB

        • memory/1176-14-0x0000000140000000-0x000000014014E000-memory.dmp

          Filesize

          1.3MB

        • memory/1176-13-0x0000000140000000-0x000000014014E000-memory.dmp

          Filesize

          1.3MB

        • memory/1176-12-0x0000000140000000-0x000000014014E000-memory.dmp

          Filesize

          1.3MB

        • memory/1176-39-0x0000000077580000-0x0000000077582000-memory.dmp

          Filesize

          8KB

        • memory/1176-10-0x0000000140000000-0x000000014014E000-memory.dmp

          Filesize

          1.3MB

        • memory/1176-9-0x0000000140000000-0x000000014014E000-memory.dmp

          Filesize

          1.3MB

        • memory/1176-37-0x00000000024B0000-0x00000000024B7000-memory.dmp

          Filesize

          28KB

        • memory/1176-36-0x0000000140000000-0x000000014014E000-memory.dmp

          Filesize

          1.3MB

        • memory/1176-50-0x0000000140000000-0x000000014014E000-memory.dmp

          Filesize

          1.3MB

        • memory/1176-54-0x0000000140000000-0x000000014014E000-memory.dmp

          Filesize

          1.3MB

        • memory/1176-30-0x0000000140000000-0x000000014014E000-memory.dmp

          Filesize

          1.3MB

        • memory/1176-8-0x0000000140000000-0x000000014014E000-memory.dmp

          Filesize

          1.3MB

        • memory/1176-7-0x0000000140000000-0x000000014014E000-memory.dmp

          Filesize

          1.3MB

        • memory/1176-90-0x0000000077216000-0x0000000077217000-memory.dmp

          Filesize

          4KB

        • memory/1176-5-0x00000000024D0000-0x00000000024D1000-memory.dmp

          Filesize

          4KB

        • memory/1648-11-0x000007FEF6CB0000-0x000007FEF6DFE000-memory.dmp

          Filesize

          1.3MB

        • memory/1648-3-0x0000000001D90000-0x0000000001D97000-memory.dmp

          Filesize

          28KB

        • memory/1648-0-0x000007FEF6CB0000-0x000007FEF6DFE000-memory.dmp

          Filesize

          1.3MB

        • memory/2568-80-0x000007FEF6790000-0x000007FEF68DF000-memory.dmp

          Filesize

          1.3MB

        • memory/2568-85-0x000007FEF6790000-0x000007FEF68DF000-memory.dmp

          Filesize

          1.3MB

        • memory/2784-68-0x000007FEF72D0000-0x000007FEF741F000-memory.dmp

          Filesize

          1.3MB

        • memory/2784-65-0x0000000000090000-0x0000000000097000-memory.dmp

          Filesize

          28KB

        • memory/2784-62-0x000007FEF72D0000-0x000007FEF741F000-memory.dmp

          Filesize

          1.3MB

        • memory/2840-98-0x000007FEF6CA0000-0x000007FEF6DF5000-memory.dmp

          Filesize

          1.3MB

        • memory/2840-103-0x000007FEF6CA0000-0x000007FEF6DF5000-memory.dmp

          Filesize

          1.3MB