Analysis

  • max time kernel
    119s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-09-2024 03:42

General

  • Target

    Trojan.Win64.Dridex.ASFS.dll

  • Size

    968KB

  • MD5

    2f6f37b1fbcaef784678f6c7c28b0000

  • SHA1

    a95e2e1be2d3ff1981431b0410d085c26f3cee23

  • SHA256

    3f3ad389e9541bbce7ff09e031de4105c89ad468be01b7ef7310f189e2b98642

  • SHA512

    00a7e7919324f165262a70fcdd581b68ce7ff8a7ced313b6f8ba8511f20caf2c002a8bdc803a21d5263fde986691112649653ecf6a4fe27bdaab9248cf16e197

  • SSDEEP

    12288:LfJV6EzPTIzQF9mVz5wYacR/8HiFeQBsjgyvunuAoA2U3PxyWhD:LhVXu8mZ5racR/xFejmnuAD2U3Prh

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 10 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Trojan.Win64.Dridex.ASFS.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:4824
  • C:\Windows\system32\wusa.exe
    C:\Windows\system32\wusa.exe
    1⤵
      PID:2160
    • C:\Users\Admin\AppData\Local\iDkCgQY1\wusa.exe
      C:\Users\Admin\AppData\Local\iDkCgQY1\wusa.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:3176
    • C:\Windows\system32\SppExtComObj.Exe
      C:\Windows\system32\SppExtComObj.Exe
      1⤵
        PID:1472
      • C:\Users\Admin\AppData\Local\Veb1y0\SppExtComObj.Exe
        C:\Users\Admin\AppData\Local\Veb1y0\SppExtComObj.Exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:3116
      • C:\Windows\system32\SystemSettingsRemoveDevice.exe
        C:\Windows\system32\SystemSettingsRemoveDevice.exe
        1⤵
          PID:1060
        • C:\Users\Admin\AppData\Local\C5S\SystemSettingsRemoveDevice.exe
          C:\Users\Admin\AppData\Local\C5S\SystemSettingsRemoveDevice.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:2816

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\C5S\DUI70.dll

          Filesize

          1.2MB

          MD5

          bdb99351333b8ea56f0a79ddc7f5a052

          SHA1

          38cdac85627e3b448433d7064a63b307a3556da4

          SHA256

          ca580c71d9974440d8243887c35e53c5c55ac8eabd23eeba41188bd9c6287f74

          SHA512

          565e1f7c17db7e745b78f6c7ac2fdfde48640d0a24701e5e36f06ef9fe54bee5163dd37aae36b69a5f77ae0e033dd80e155e3b0a33e68c21637cb8a5a130c0bf

        • C:\Users\Admin\AppData\Local\C5S\SystemSettingsRemoveDevice.exe

          Filesize

          39KB

          MD5

          7853f1c933690bb7c53c67151cbddeb0

          SHA1

          d47a1ad0ccba4c988c8ffc5cbf9636fd4f4fa6e6

          SHA256

          9500731b2a3442f11dfd08a8adfe027e7f32ef5834c628eed4b78be74168470d

          SHA512

          831993d610539d44422d769de6561a4622e1b9cb3d73253774b6cecabf57654a74cd88b4ebe20921585ea96d977225b9501f02a0f6a1fc7d2cad6824fd539304

        • C:\Users\Admin\AppData\Local\Veb1y0\ACTIVEDS.dll

          Filesize

          972KB

          MD5

          dccfabce8d7feee57f080e4ee0672c03

          SHA1

          620dbdd354185f6da3a27e936fa33402015252f1

          SHA256

          697d609452883ad322097e74d04721cc477a1761b65fbc8b140a912874241095

          SHA512

          f323b4bb437cf725ffb5dc5e8da8ff23350e43b398842d620f589cb4c7f3a77b1bee329c953caf22c7013b88c2f74f791b7c35777fe67f350dc38fdd26a6fe42

        • C:\Users\Admin\AppData\Local\Veb1y0\SppExtComObj.Exe

          Filesize

          559KB

          MD5

          728a78909aa69ca0e976e94482350700

          SHA1

          6508dfcbf37df25cae8ae68cf1fcd4b78084abb7

          SHA256

          2a6581576305771044f07ea0fef27f77859996dbf66c2017e938f90bfc1e010c

          SHA512

          22bf985e71afa58a1365cc733c0aa03dabd4b44e7c6a136eb5f9b870db14470201b4ef88a19fa3864af6c44e79e1a01d6f8806062d9d4861ba7dac77d82074f1

        • C:\Users\Admin\AppData\Local\iDkCgQY1\dpx.dll

          Filesize

          972KB

          MD5

          7ad0b9c3527bb0873bf704cff2ad2220

          SHA1

          e2953c1d2815684dffb315272154de2326bc8d47

          SHA256

          ed0d86cdf6f0e295943cbe5015759a310fa505d59a0f5ff2c4208cab03a3e137

          SHA512

          fb28805c3b36ea526afe6134aa9827b2d7ba38cd5d18b8c282f00bf3ec2999d12d74742a848a32ebea3328891fa1af20d9f53c4deeeb7c72d125c904cf97f916

        • C:\Users\Admin\AppData\Local\iDkCgQY1\wusa.exe

          Filesize

          309KB

          MD5

          e43499ee2b4cf328a81bace9b1644c5d

          SHA1

          b2b55641f2799e3fdb3bea709c9532017bbac59d

          SHA256

          3e30230bbf3ceee3e58162b61eed140e9616210833a6ad7df3e106bc7492d2fb

          SHA512

          04823764520871f9202d346b08a194bdd5f5929db6d5c2f113911f84aece7471c8d3bd2c4256119a303dbe18a0c055dbc5034d80b1f27a43744104544731f52b

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Mcinmsnhewplgza.lnk

          Filesize

          1KB

          MD5

          5c1faf7ba42ed8a748566168fce1fd6f

          SHA1

          9db29939c54e290b53729435a8d2b36d79d1936b

          SHA256

          8f2984d7da0a71244528ca8c7a94b6a88519bf19a4106ed9aa51458b06696f4e

          SHA512

          cce5e5f625bfc4b5e2bacd3ef4678a30568e444331c08cba5e2b2276a9c4cc691c78521ebe8779f8f7c4a7e75728ded9c776758e2881000ffaafae4163af0e73

        • memory/2816-86-0x0000016C4C0E0000-0x0000016C4C0E7000-memory.dmp

          Filesize

          28KB

        • memory/2816-84-0x00007FFCA9A30000-0x00007FFCA9B68000-memory.dmp

          Filesize

          1.2MB

        • memory/2816-89-0x00007FFCA9A30000-0x00007FFCA9B68000-memory.dmp

          Filesize

          1.2MB

        • memory/3116-73-0x00007FFCA9A70000-0x00007FFCA9B63000-memory.dmp

          Filesize

          972KB

        • memory/3116-70-0x000001E0CDAA0000-0x000001E0CDAA7000-memory.dmp

          Filesize

          28KB

        • memory/3176-57-0x00007FFCA9A70000-0x00007FFCA9B63000-memory.dmp

          Filesize

          972KB

        • memory/3176-53-0x00007FFCA9A70000-0x00007FFCA9B63000-memory.dmp

          Filesize

          972KB

        • memory/3176-52-0x0000025E8FEE0000-0x0000025E8FEE7000-memory.dmp

          Filesize

          28KB

        • memory/3536-42-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/3536-17-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/3536-15-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/3536-14-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/3536-13-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/3536-12-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/3536-10-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/3536-9-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/3536-8-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/3536-7-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/3536-22-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/3536-6-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/3536-4-0x00000000026D0000-0x00000000026D1000-memory.dmp

          Filesize

          4KB

        • memory/3536-16-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/3536-18-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/3536-19-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/3536-20-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/3536-31-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/3536-3-0x00007FFCC6B9A000-0x00007FFCC6B9B000-memory.dmp

          Filesize

          4KB

        • memory/3536-32-0x00007FFCC7B60000-0x00007FFCC7B70000-memory.dmp

          Filesize

          64KB

        • memory/3536-33-0x00007FFCC7B50000-0x00007FFCC7B60000-memory.dmp

          Filesize

          64KB

        • memory/3536-30-0x00000000026A0000-0x00000000026A7000-memory.dmp

          Filesize

          28KB

        • memory/3536-23-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/3536-21-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/3536-11-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/4824-0-0x00007FFCB9590000-0x00007FFCB9682000-memory.dmp

          Filesize

          968KB

        • memory/4824-45-0x00007FFCB9590000-0x00007FFCB9682000-memory.dmp

          Filesize

          968KB

        • memory/4824-2-0x0000023328AD0000-0x0000023328AD7000-memory.dmp

          Filesize

          28KB