Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-09-2024 03:42

General

  • Target

    Trojan.Win64.Dridex.ASFS.dll

  • Size

    968KB

  • MD5

    2f6f37b1fbcaef784678f6c7c28b0000

  • SHA1

    a95e2e1be2d3ff1981431b0410d085c26f3cee23

  • SHA256

    3f3ad389e9541bbce7ff09e031de4105c89ad468be01b7ef7310f189e2b98642

  • SHA512

    00a7e7919324f165262a70fcdd581b68ce7ff8a7ced313b6f8ba8511f20caf2c002a8bdc803a21d5263fde986691112649653ecf6a4fe27bdaab9248cf16e197

  • SSDEEP

    12288:LfJV6EzPTIzQF9mVz5wYacR/8HiFeQBsjgyvunuAoA2U3PxyWhD:LhVXu8mZ5racR/xFejmnuAD2U3Prh

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 12 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Trojan.Win64.Dridex.ASFS.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2420
  • C:\Windows\system32\SystemPropertiesHardware.exe
    C:\Windows\system32\SystemPropertiesHardware.exe
    1⤵
      PID:2608
    • C:\Users\Admin\AppData\Local\t4U\SystemPropertiesHardware.exe
      C:\Users\Admin\AppData\Local\t4U\SystemPropertiesHardware.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2644
    • C:\Windows\system32\mmc.exe
      C:\Windows\system32\mmc.exe
      1⤵
        PID:632
      • C:\Users\Admin\AppData\Local\cfW\mmc.exe
        C:\Users\Admin\AppData\Local\cfW\mmc.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:1724
      • C:\Windows\system32\SystemPropertiesAdvanced.exe
        C:\Windows\system32\SystemPropertiesAdvanced.exe
        1⤵
          PID:1004
        • C:\Users\Admin\AppData\Local\CQKHV\SystemPropertiesAdvanced.exe
          C:\Users\Admin\AppData\Local\CQKHV\SystemPropertiesAdvanced.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:1248

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\CQKHV\SYSDM.CPL

          Filesize

          972KB

          MD5

          8c035c3cf0cbc6cc559f9c09cf90c24a

          SHA1

          75fc70048df5b7243a5cfa2ce8609424cec55e31

          SHA256

          7a5023790512324d3f47be5c0bd93b538fe445b79bf58650e3ab6f248b2bbb3d

          SHA512

          059cd7d472f3776b52e93e7119a1eb12803fab94600cae4451b877eb162cac5223a6d709ba72b6e8af2e3ba55c98a09cb29e3973ade6dd4e186d15f8de968f56

        • C:\Users\Admin\AppData\Local\cfW\DUser.dll

          Filesize

          972KB

          MD5

          b16886e853bb6e92152d2f29773701a1

          SHA1

          508c15625d454b6f0d5cff162bd6a2f963c3c08f

          SHA256

          7538fcc4b04442d222433e5a2102ae79b3003c495dbc970d19206a0e75f8fe06

          SHA512

          07c332c868a6a9eba96d6c1a6f5585bcfc36e43fc62fd72115ad45a12b81132c5e7600c37cc32b201337a87ac40a3fd9979c33b0c01a3d2002519c52af25e103

        • C:\Users\Admin\AppData\Local\t4U\SYSDM.CPL

          Filesize

          972KB

          MD5

          1f869867c1b34edc735bf992daf4ff56

          SHA1

          6e1501dedf2c74428a4e24c532bb10864ecf4df2

          SHA256

          21fc84075ac2afd786e86e0bb31114c836af79cf1c665237f90d872cca780ceb

          SHA512

          8f21593cea3762de35025f8c618a63fa3b068a3ae3f5dee1011c983264b993d130f2286fbb217982443daba52423e65aa1d1f7394e2138d75d4d3552484a2e3e

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Wbvsyha.lnk

          Filesize

          1KB

          MD5

          37619cc1fb3b3c0b5080cc0a0d205833

          SHA1

          e59d8baac0658fac763ce28a3ee198b9cf9b47bb

          SHA256

          d7d88c746e72e30ff090b04a0cba0bcce66dee0e05fe990497c08bea20c5524c

          SHA512

          17f6db7ca186d8a6a13e303130373f45d8c4c1d5b44f2d5e15340917fee749c6667f25dec8355089a3095191923c97375d2abdcce5af187abf1271d46149959c

        • \Users\Admin\AppData\Local\CQKHV\SystemPropertiesAdvanced.exe

          Filesize

          80KB

          MD5

          25dc1e599591871c074a68708206e734

          SHA1

          27a9dffa92d979d39c07d889fada536c062dac77

          SHA256

          a13b2ba5892c11c731869410b1e3dd2f250d70ff9efd513a9f260ab506dd42ef

          SHA512

          f7da9ce4c3e8aea9095fcc977084c042f85df48fca0b58fb136dfd835ce69b5b1e68f3c11eeb14c617ffcec7011ffc7e5d5a948f49dde653a2348b28e10adb72

        • \Users\Admin\AppData\Local\cfW\mmc.exe

          Filesize

          2.0MB

          MD5

          9fea051a9585f2a303d55745b4bf63aa

          SHA1

          f5dc12d658402900a2b01af2f018d113619b96b8

          SHA256

          b212e59e4c7fe77f6f189138d9d8b151e50eb83a35d6eadfb1e4bb0b4262c484

          SHA512

          beba79f0b6710929871fbdf378d3c0a41f230ac30cbfa87173f7b77c35e06425f48db42ed3b16d5d9bcb7ef0098dffcd0d2947da8fb7ec1136ea62205f1afc76

        • \Users\Admin\AppData\Local\t4U\SystemPropertiesHardware.exe

          Filesize

          80KB

          MD5

          c63d722641c417764247f683f9fb43be

          SHA1

          948ec61ebf241c4d80efca3efdfc33fe746e3b98

          SHA256

          4759296b421d60c80db0bb112a30425e04883900374602e13ed97f7c03a49df2

          SHA512

          7223d1c81a4785ed790ec2303d5d9d7ebcae9404d7bf173b3145e51202564de9977e94ac10ab80c6fe49b5f697af3ec70dfd922a891915e8951b5a1b5841c8be

        • memory/1152-20-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/1152-42-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/1152-14-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/1152-13-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/1152-12-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/1152-11-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/1152-10-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/1152-9-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/1152-8-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/1152-7-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/1152-6-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/1152-23-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/1152-30-0x0000000002E80000-0x0000000002E87000-memory.dmp

          Filesize

          28KB

        • memory/1152-22-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/1152-21-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/1152-3-0x0000000077916000-0x0000000077917000-memory.dmp

          Filesize

          4KB

        • memory/1152-31-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/1152-33-0x0000000077BB0000-0x0000000077BB2000-memory.dmp

          Filesize

          8KB

        • memory/1152-32-0x0000000077B80000-0x0000000077B82000-memory.dmp

          Filesize

          8KB

        • memory/1152-15-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/1152-43-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/1152-4-0x0000000002EA0000-0x0000000002EA1000-memory.dmp

          Filesize

          4KB

        • memory/1152-52-0x0000000077916000-0x0000000077917000-memory.dmp

          Filesize

          4KB

        • memory/1152-16-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/1152-17-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/1152-19-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/1152-18-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/1248-93-0x0000000000100000-0x0000000000107000-memory.dmp

          Filesize

          28KB

        • memory/1248-94-0x000007FEF7300000-0x000007FEF73F3000-memory.dmp

          Filesize

          972KB

        • memory/1248-98-0x000007FEF7300000-0x000007FEF73F3000-memory.dmp

          Filesize

          972KB

        • memory/1724-76-0x000007FEF6D20000-0x000007FEF6E13000-memory.dmp

          Filesize

          972KB

        • memory/1724-78-0x00000000001E0000-0x00000000001E7000-memory.dmp

          Filesize

          28KB

        • memory/1724-81-0x000007FEF6D20000-0x000007FEF6E13000-memory.dmp

          Filesize

          972KB

        • memory/2420-51-0x000007FEF7300000-0x000007FEF73F2000-memory.dmp

          Filesize

          968KB

        • memory/2420-2-0x0000000000110000-0x0000000000117000-memory.dmp

          Filesize

          28KB

        • memory/2420-0-0x000007FEF7300000-0x000007FEF73F2000-memory.dmp

          Filesize

          968KB

        • memory/2644-64-0x000007FEF78F0000-0x000007FEF79E3000-memory.dmp

          Filesize

          972KB

        • memory/2644-60-0x000007FEF78F0000-0x000007FEF79E3000-memory.dmp

          Filesize

          972KB