Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/08/2024, 21:15

General

  • Target

    3d8aaef7ac5e11347cccaf0609c0a340N.dll

  • Size

    892KB

  • MD5

    3d8aaef7ac5e11347cccaf0609c0a340

  • SHA1

    804e66f0e767d99513fee66120a02cf34c99c563

  • SHA256

    f2d3547486c1256d9dee8136cb89334f3850dd225c50af407f9f6fb66745d997

  • SHA512

    b2d86426d7e485d14dfa7ac9080ef36d8141e7e55d04aa11cc94a8238998e5c6cff80bc1644052d87e9a4ab542fd4feedf7e2b5a1b02558a4f21a4872b300dee

  • SSDEEP

    12288:VGVNJAvuPFUl/faxmVlBLXKCgFfEK7JRLeHlX//ve7:43JAvRl/fKQKCgFfx4P/va

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\3d8aaef7ac5e11347cccaf0609c0a340N.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    PID:628
  • C:\Windows\system32\usocoreworker.exe
    C:\Windows\system32\usocoreworker.exe
    1⤵
      PID:4568
    • C:\Users\Admin\AppData\Local\tX31cuk\usocoreworker.exe
      C:\Users\Admin\AppData\Local\tX31cuk\usocoreworker.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious behavior: GetForegroundWindowSpam
      PID:3092
    • C:\Windows\system32\mmc.exe
      C:\Windows\system32\mmc.exe
      1⤵
        PID:4036
      • C:\Users\Admin\AppData\Local\5yl\mmc.exe
        C:\Users\Admin\AppData\Local\5yl\mmc.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        • Suspicious behavior: GetForegroundWindowSpam
        PID:1092
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4160,i,4356837537417149674,16553092232944545509,262144 --variations-seed-version --mojo-platform-channel-handle=3820 /prefetch:8
        1⤵
          PID:1424
        • C:\Windows\system32\DeviceEnroller.exe
          C:\Windows\system32\DeviceEnroller.exe
          1⤵
            PID:2440
          • C:\Users\Admin\AppData\Local\Gn6Et\DeviceEnroller.exe
            C:\Users\Admin\AppData\Local\Gn6Et\DeviceEnroller.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Checks whether UAC is enabled
            • Suspicious behavior: GetForegroundWindowSpam
            PID:4000

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\5yl\MFC42u.dll

            Filesize

            920KB

            MD5

            f92ecfd87b90f95d53332dd9987a2644

            SHA1

            43c7118aa2da11b1518dfa9c558f937e95efd0b5

            SHA256

            19039fca1b39d4c5cebe311809d60b7fb118ac60acbb19c228431a65ad4eddc6

            SHA512

            d64665265d9b078541b9acd11832932025d188bf884b2f6e30e4d638cdb62b5d02ae5d490e751d78ebf0397591254f178f8228254d3de49543715ab97ea98759

          • C:\Users\Admin\AppData\Local\5yl\mmc.exe

            Filesize

            1.8MB

            MD5

            8c86b80518406f14a4952d67185032d6

            SHA1

            9269f1fbcf65fefbc88a2e239519c21efe0f6ba5

            SHA256

            895eef1eda5700a425934ae3782d4741dfefb7deafa53891bde490150187b98a

            SHA512

            1bbdaa3ae8b5716ad2bd517055533e286ddb8a6c23cbc7aa602143dbb1ae132b513088ab61527c49737c554269c51416cceb80206ac8128ac6b003f1864eb099

          • C:\Users\Admin\AppData\Local\Gn6Et\DeviceEnroller.exe

            Filesize

            448KB

            MD5

            946d9474533f58d2613078fd14ca7473

            SHA1

            c2620ac9522fa3702a6a03299b930d6044aa5e49

            SHA256

            cf5f5fe084f172e9c435615c1dc6ae7d3bd8c5ec8ea290caa0627c2f392760cb

            SHA512

            3653d41a0553ee63a43490f682c9b528651a6336f28adafc333d4d148577351122db8279ff83ee59bb0a9c17bb384e9f6c9c78677c8c5ed671a42036dec1f8c1

          • C:\Users\Admin\AppData\Local\Gn6Et\XmlLite.dll

            Filesize

            896KB

            MD5

            2099352fbc69cec29d0c8b3e9a511217

            SHA1

            f0090a99a80a0babfae3ba05d505341e00fd129b

            SHA256

            571878b485264e2fbd4f305a2b6bbd243ed67a5de5343b217b929118b83d1511

            SHA512

            dabe6836830cf7827c9b73d7022aa30ce09af1c5a44339f2d7d3dac547a77165b37e585e08b31bad669d16104f97f551f6cc8654b824b440065da8aa61c77189

          • C:\Users\Admin\AppData\Local\tX31cuk\XmlLite.dll

            Filesize

            896KB

            MD5

            da26e25594d9c381cb07cb034bba0906

            SHA1

            9c3c4d03f74162fa93b414fbee8ec94d83dcd3c3

            SHA256

            8849d7238bd2f68087b68df0db27de416983300097db85d714e0539a4cffa5cd

            SHA512

            b776e0e1337a432ad8c3bf3d12c09ba8767117d93bb1b02e5617a2e9b1fa86ccb05b8ceda56ef86463a74f183250b2b49de558700b3d0bb4ff2aafb6540163e8

          • C:\Users\Admin\AppData\Local\tX31cuk\usocoreworker.exe

            Filesize

            1.3MB

            MD5

            2c5efb321aa64af37dedc6383ce3198e

            SHA1

            a06d7020dd43a57047a62bfb443091cd9de946ba

            SHA256

            0fb6688a32340036f3eaab4a09a82dee533bfb2ca266c36f6142083134de6f0e

            SHA512

            5448ea01b24af7444505bda80064849a2efcc459011d32879e021e836fd573c9b1b9d3b37291d3f53ff536c691ac13a545b12f318a16c8a367421986bbf002ed

          • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Jmybglakcar.lnk

            Filesize

            1016B

            MD5

            53d92be9c4cd15580c7a4098d94e91ea

            SHA1

            ce3ff51c1f56d6da7ba200ca57eb513e342eb7ec

            SHA256

            39cb300210f0aabe0ce0bda87474bf700bce78202fc3876f11108a3c2a1b57b3

            SHA512

            66cf9f23f7f0c952b748477824bc9b32a336e12519ad428d7f937c747fa1d17ed3db70f86e9ab406d0d3dc40249742ab8f6cf3dcd20386b9e2e15e547e1d338d

          • memory/628-0-0x0000000140000000-0x00000001400DF000-memory.dmp

            Filesize

            892KB

          • memory/628-3-0x000001FBDBE60000-0x000001FBDBE67000-memory.dmp

            Filesize

            28KB

          • memory/628-37-0x0000000140000000-0x00000001400DF000-memory.dmp

            Filesize

            892KB

          • memory/1092-74-0x0000000140000000-0x00000001400E6000-memory.dmp

            Filesize

            920KB

          • memory/1092-78-0x0000000140000000-0x00000001400E6000-memory.dmp

            Filesize

            920KB

          • memory/1092-77-0x0000000000400000-0x0000000000407000-memory.dmp

            Filesize

            28KB

          • memory/3092-61-0x0000020ABD9A0000-0x0000020ABD9A7000-memory.dmp

            Filesize

            28KB

          • memory/3092-62-0x0000000140000000-0x00000001400E0000-memory.dmp

            Filesize

            896KB

          • memory/3092-56-0x0000000140000000-0x00000001400E0000-memory.dmp

            Filesize

            896KB

          • memory/3412-16-0x0000000140000000-0x00000001400DF000-memory.dmp

            Filesize

            892KB

          • memory/3412-20-0x0000000140000000-0x00000001400DF000-memory.dmp

            Filesize

            892KB

          • memory/3412-21-0x0000000140000000-0x00000001400DF000-memory.dmp

            Filesize

            892KB

          • memory/3412-19-0x0000000140000000-0x00000001400DF000-memory.dmp

            Filesize

            892KB

          • memory/3412-18-0x0000000140000000-0x00000001400DF000-memory.dmp

            Filesize

            892KB

          • memory/3412-17-0x0000000140000000-0x00000001400DF000-memory.dmp

            Filesize

            892KB

          • memory/3412-23-0x0000000140000000-0x00000001400DF000-memory.dmp

            Filesize

            892KB

          • memory/3412-14-0x0000000140000000-0x00000001400DF000-memory.dmp

            Filesize

            892KB

          • memory/3412-13-0x0000000140000000-0x00000001400DF000-memory.dmp

            Filesize

            892KB

          • memory/3412-12-0x0000000140000000-0x00000001400DF000-memory.dmp

            Filesize

            892KB

          • memory/3412-11-0x0000000140000000-0x00000001400DF000-memory.dmp

            Filesize

            892KB

          • memory/3412-10-0x0000000140000000-0x00000001400DF000-memory.dmp

            Filesize

            892KB

          • memory/3412-9-0x0000000140000000-0x00000001400DF000-memory.dmp

            Filesize

            892KB

          • memory/3412-8-0x0000000140000000-0x00000001400DF000-memory.dmp

            Filesize

            892KB

          • memory/3412-24-0x0000000140000000-0x00000001400DF000-memory.dmp

            Filesize

            892KB

          • memory/3412-22-0x0000000140000000-0x00000001400DF000-memory.dmp

            Filesize

            892KB

          • memory/3412-15-0x0000000140000000-0x00000001400DF000-memory.dmp

            Filesize

            892KB

          • memory/3412-7-0x0000000140000000-0x00000001400DF000-memory.dmp

            Filesize

            892KB

          • memory/3412-6-0x0000000140000000-0x00000001400DF000-memory.dmp

            Filesize

            892KB

          • memory/3412-25-0x00007FFAE5C5A000-0x00007FFAE5C5B000-memory.dmp

            Filesize

            4KB

          • memory/3412-33-0x0000000140000000-0x00000001400DF000-memory.dmp

            Filesize

            892KB

          • memory/3412-43-0x0000000140000000-0x00000001400DF000-memory.dmp

            Filesize

            892KB

          • memory/3412-45-0x0000000140000000-0x00000001400DF000-memory.dmp

            Filesize

            892KB

          • memory/3412-53-0x0000000007AD0000-0x0000000007AD7000-memory.dmp

            Filesize

            28KB

          • memory/3412-54-0x00007FFAE6120000-0x00007FFAE6130000-memory.dmp

            Filesize

            64KB

          • memory/3412-26-0x0000000140000000-0x00000001400DF000-memory.dmp

            Filesize

            892KB

          • memory/3412-4-0x00000000081C0000-0x00000000081C1000-memory.dmp

            Filesize

            4KB

          • memory/4000-93-0x0000000140000000-0x00000001400E0000-memory.dmp

            Filesize

            896KB

          • memory/4000-92-0x0000028313A50000-0x0000028313A57000-memory.dmp

            Filesize

            28KB