Analysis

  • max time kernel
    149s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-09-2024 08:51

General

  • Target

    Trojan.Win64.Dridex.ASFS.dll

  • Size

    968KB

  • MD5

    2f6f37b1fbcaef784678f6c7c28b0000

  • SHA1

    a95e2e1be2d3ff1981431b0410d085c26f3cee23

  • SHA256

    3f3ad389e9541bbce7ff09e031de4105c89ad468be01b7ef7310f189e2b98642

  • SHA512

    00a7e7919324f165262a70fcdd581b68ce7ff8a7ced313b6f8ba8511f20caf2c002a8bdc803a21d5263fde986691112649653ecf6a4fe27bdaab9248cf16e197

  • SSDEEP

    12288:LfJV6EzPTIzQF9mVz5wYacR/8HiFeQBsjgyvunuAoA2U3PxyWhD:LhVXu8mZ5racR/xFejmnuAD2U3Prh

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 10 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\Trojan.Win64.Dridex.ASFS.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2496
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4512,i,16315016104747277319,5510969007830467313,262144 --variations-seed-version --mojo-platform-channel-handle=4212 /prefetch:8
    1⤵
      PID:2304
    • C:\Windows\system32\printfilterpipelinesvc.exe
      C:\Windows\system32\printfilterpipelinesvc.exe
      1⤵
        PID:1660
      • C:\Users\Admin\AppData\Local\XV8f\printfilterpipelinesvc.exe
        C:\Users\Admin\AppData\Local\XV8f\printfilterpipelinesvc.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:1424
      • C:\Windows\system32\bdeunlock.exe
        C:\Windows\system32\bdeunlock.exe
        1⤵
          PID:4864
        • C:\Users\Admin\AppData\Local\qCu\bdeunlock.exe
          C:\Users\Admin\AppData\Local\qCu\bdeunlock.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:4972
        • C:\Windows\system32\BitLockerWizard.exe
          C:\Windows\system32\BitLockerWizard.exe
          1⤵
            PID:1824
          • C:\Users\Admin\AppData\Local\2vQjgIgjI\BitLockerWizard.exe
            C:\Users\Admin\AppData\Local\2vQjgIgjI\BitLockerWizard.exe
            1⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Checks whether UAC is enabled
            PID:4900

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\2vQjgIgjI\BitLockerWizard.exe

            Filesize

            100KB

            MD5

            6d30c96f29f64b34bc98e4c81d9b0ee8

            SHA1

            4a3adc355f02b9c69bdbe391bfb01469dee15cf0

            SHA256

            7758227642702e645af5e84d1c0e5690e07687c8209072a2c5f79379299edf74

            SHA512

            25471b0ac7156d9ee9d12181020039bf551ba3efe252b656030c12d93b8db2648a18bdf762740f2a5cd8e43640e4bd4e8742310dea15823fc76b9e1c126876b8

          • C:\Users\Admin\AppData\Local\2vQjgIgjI\FVEWIZ.dll

            Filesize

            972KB

            MD5

            968e1cbf33c6bece42520cf0d272c775

            SHA1

            aa612fdb4b8be49231940ddc41164457a0695db6

            SHA256

            b7e9fe607bd39649c1097b47e958f870b85c52fdb81cff9cc47dd85efb5cbdd3

            SHA512

            cb9d0d3853504461233dc7f47ae7867d8be623d57a69eff8a847ca204f725497b0aa4eda15c061c1f4dfd1bda3f4ff03dc39f9c4e1669d2704936baae5d7b35f

          • C:\Users\Admin\AppData\Local\XV8f\XmlLite.dll

            Filesize

            972KB

            MD5

            d829586c5e6ecaac74db7e808ca4ee85

            SHA1

            ba41f7489e26f338baa1e532253dd30999f84b73

            SHA256

            49cf6bb24241c65f1d2dc8360774214d788821bf44376504ff4fa326836980ed

            SHA512

            e26bdf1e486f76dbeeb71fea31908b82b9b0f6133ac32a01e6c04b92bca609f1fd693cb63a4f94b733264c0c2504cdc7b73e82d7ed141618f8a0e064f8b6634e

          • C:\Users\Admin\AppData\Local\XV8f\printfilterpipelinesvc.exe

            Filesize

            813KB

            MD5

            331a40eabaa5870e316b401bd81c4861

            SHA1

            ddff65771ca30142172c0d91d5bfff4eb1b12b73

            SHA256

            105099819555ed87ef3dab70a2eaf2cb61076f453266cec57ffccb8f4c00df88

            SHA512

            29992dbf10f327d77865af5e6ebbe66b937a5b4ad04c68cafbf4e6adbd6c6532c8a82ac7e638d97c1f053353a7c8a6d7e379f389af15443c94a1e8f9b16be5f8

          • C:\Users\Admin\AppData\Local\qCu\DUI70.dll

            Filesize

            1.2MB

            MD5

            f423793e495851b924ecf856b2e53804

            SHA1

            f02b5487b6b035bd927e5c2347d0813b3a3216f7

            SHA256

            cbf8f918f7745bd4ccb0f8d6ee5ec577c43a3dbd7675cbd0b4c7ee8cdfac2adf

            SHA512

            cb85cbc54d1846ff3fba77a7d83e305ca1bc43746562ee5ac1737d34f115ddaca021c1f3fff6cbf089fa2d352b88e2b68b96a9b72c5af6ff172430730c1edad2

          • C:\Users\Admin\AppData\Local\qCu\bdeunlock.exe

            Filesize

            279KB

            MD5

            fef5d67150c249db3c1f4b30a2a5a22e

            SHA1

            41ca037b0229be9338da4d78244b4f0ea5a3d5f3

            SHA256

            dcfdd67bf3244ff86cadaaea50b43cce5479014ea2021c0c2fb40b7c856e5603

            SHA512

            4ded9ca87d9d30c31ab2baededaa6e26681741ea1742d80c318173536c643a01bc049e03a03c3b45b3cb8860464a855830e12e87670503e65eedcdd5e9b2d1e7

          • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Jmybglakcar.lnk

            Filesize

            1KB

            MD5

            3b5480aa913d54602bdf9a2a50c43ca9

            SHA1

            909bcc88e6d9b375050cadf5a0f6040d312dfcd9

            SHA256

            0619f9966c475405f5471286618e8e49668c455b19b67044baa6f356773c45fc

            SHA512

            75571becb9ec55a5adf8ebf8d664a798212c331237a65d2183f2c9a5a419b79a1876ece9528149bb205e9cea26a28a0a05ad8833674856696dec559a618d8b1a

          • memory/1424-57-0x00007FF9479C0000-0x00007FF947AB3000-memory.dmp

            Filesize

            972KB

          • memory/1424-53-0x00007FF9479C0000-0x00007FF947AB3000-memory.dmp

            Filesize

            972KB

          • memory/1424-52-0x00000281E6F20000-0x00000281E6F27000-memory.dmp

            Filesize

            28KB

          • memory/2496-45-0x00007FF956A30000-0x00007FF956B22000-memory.dmp

            Filesize

            968KB

          • memory/2496-1-0x00007FF956A30000-0x00007FF956B22000-memory.dmp

            Filesize

            968KB

          • memory/2496-0-0x00000172BAA40000-0x00000172BAA47000-memory.dmp

            Filesize

            28KB

          • memory/3432-32-0x00007FF965F20000-0x00007FF965F30000-memory.dmp

            Filesize

            64KB

          • memory/3432-23-0x0000000140000000-0x00000001400F2000-memory.dmp

            Filesize

            968KB

          • memory/3432-16-0x0000000140000000-0x00000001400F2000-memory.dmp

            Filesize

            968KB

          • memory/3432-18-0x0000000140000000-0x00000001400F2000-memory.dmp

            Filesize

            968KB

          • memory/3432-17-0x0000000140000000-0x00000001400F2000-memory.dmp

            Filesize

            968KB

          • memory/3432-14-0x0000000140000000-0x00000001400F2000-memory.dmp

            Filesize

            968KB

          • memory/3432-13-0x0000000140000000-0x00000001400F2000-memory.dmp

            Filesize

            968KB

          • memory/3432-12-0x0000000140000000-0x00000001400F2000-memory.dmp

            Filesize

            968KB

          • memory/3432-11-0x0000000140000000-0x00000001400F2000-memory.dmp

            Filesize

            968KB

          • memory/3432-10-0x0000000140000000-0x00000001400F2000-memory.dmp

            Filesize

            968KB

          • memory/3432-9-0x0000000140000000-0x00000001400F2000-memory.dmp

            Filesize

            968KB

          • memory/3432-8-0x0000000140000000-0x00000001400F2000-memory.dmp

            Filesize

            968KB

          • memory/3432-7-0x0000000140000000-0x00000001400F2000-memory.dmp

            Filesize

            968KB

          • memory/3432-6-0x0000000140000000-0x00000001400F2000-memory.dmp

            Filesize

            968KB

          • memory/3432-21-0x0000000140000000-0x00000001400F2000-memory.dmp

            Filesize

            968KB

          • memory/3432-20-0x00007FF9645CA000-0x00007FF9645CB000-memory.dmp

            Filesize

            4KB

          • memory/3432-31-0x0000000140000000-0x00000001400F2000-memory.dmp

            Filesize

            968KB

          • memory/3432-42-0x0000000140000000-0x00000001400F2000-memory.dmp

            Filesize

            968KB

          • memory/3432-33-0x00007FF965F10000-0x00007FF965F20000-memory.dmp

            Filesize

            64KB

          • memory/3432-22-0x0000000140000000-0x00000001400F2000-memory.dmp

            Filesize

            968KB

          • memory/3432-30-0x0000000000550000-0x0000000000557000-memory.dmp

            Filesize

            28KB

          • memory/3432-19-0x0000000140000000-0x00000001400F2000-memory.dmp

            Filesize

            968KB

          • memory/3432-15-0x0000000140000000-0x00000001400F2000-memory.dmp

            Filesize

            968KB

          • memory/3432-5-0x0000000140000000-0x00000001400F2000-memory.dmp

            Filesize

            968KB

          • memory/3432-3-0x00000000005B0000-0x00000000005B1000-memory.dmp

            Filesize

            4KB

          • memory/4900-84-0x000001FF8A900000-0x000001FF8A907000-memory.dmp

            Filesize

            28KB

          • memory/4900-89-0x00007FF9479C0000-0x00007FF947AB3000-memory.dmp

            Filesize

            972KB

          • memory/4972-73-0x00007FF9478E0000-0x00007FF947A18000-memory.dmp

            Filesize

            1.2MB

          • memory/4972-69-0x00007FF9478E0000-0x00007FF947A18000-memory.dmp

            Filesize

            1.2MB

          • memory/4972-68-0x0000026F02780000-0x0000026F02787000-memory.dmp

            Filesize

            28KB