Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-09-2024 15:00

General

  • Target

    NoThreatDetected-ddc50ab4f6757dd5480e6aa78969bc0b5cd646742b59bd90855436618a44ebbdN.dll

  • Size

    1.8MB

  • MD5

    e14d296a8d3172360c2d73bd3baab2b0

  • SHA1

    0898ae4f9a6926d308a1e24e7f7a2fab85580541

  • SHA256

    ddc50ab4f6757dd5480e6aa78969bc0b5cd646742b59bd90855436618a44ebbd

  • SHA512

    1874fce4ac65204917ba183d5eb10ae607f9403b3a878f1bc402c80b36959e2cc71fc49f8115710d1a76d07efa5e2bc39429d075d9b4c5c517121add23a23856

  • SSDEEP

    12288:PxE0waBckFdlxVRZ1hcyknDb3PTdcGvnx10k2d2Y6q2mQpxVOa:ZZLVJxVHfcLnDTZcG/xmk2d2qZwq

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 10 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\NoThreatDetected-ddc50ab4f6757dd5480e6aa78969bc0b5cd646742b59bd90855436618a44ebbdN.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:4936
  • C:\Windows\system32\ie4uinit.exe
    C:\Windows\system32\ie4uinit.exe
    1⤵
      PID:916
    • C:\Users\Admin\AppData\Local\YgLJ9SX\ie4uinit.exe
      C:\Users\Admin\AppData\Local\YgLJ9SX\ie4uinit.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:4436
    • C:\Windows\system32\WMPDMC.exe
      C:\Windows\system32\WMPDMC.exe
      1⤵
        PID:3816
      • C:\Users\Admin\AppData\Local\yBk\WMPDMC.exe
        C:\Users\Admin\AppData\Local\yBk\WMPDMC.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:1968
      • C:\Windows\system32\dwm.exe
        C:\Windows\system32\dwm.exe
        1⤵
          PID:1480
        • C:\Users\Admin\AppData\Local\0Sy\dwm.exe
          C:\Users\Admin\AppData\Local\0Sy\dwm.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:1944

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\0Sy\dwm.exe

          Filesize

          92KB

          MD5

          5c27608411832c5b39ba04e33d53536c

          SHA1

          f92f8b7439ce1de4c297046ed1d3ff9f20bc97af

          SHA256

          0ac827c9e35cdaa492ddd435079415805dcc276352112b040bcd34ef122cf565

          SHA512

          1fa25eabc08dff9ea25dfa7da310a677927c6344b76815696b0483f8860fa1469820ff15d88a78ed32f712d03003631d9aceaf9c9851de5dd40c1fc2a7bc1309

        • C:\Users\Admin\AppData\Local\0Sy\dxgi.dll

          Filesize

          1.8MB

          MD5

          51fc7e65eaae052cca5f4f6f6cdbe2e5

          SHA1

          b7b604abc8098b12d4ace37704a4d4d813ba5731

          SHA256

          e9114fee83a5afe53fddf8ea6c079a4be57e3cb97f8e2d0575451fa92abdf20e

          SHA512

          88880734a6b48e5ca9e55140f5de31f45b98ed6832e45bda6accfacf5ea1684fd168ab112ce7a251be033164797f75657d2e24149c24b19d499346c2e16e80e9

        • C:\Users\Admin\AppData\Local\YgLJ9SX\VERSION.dll

          Filesize

          1.8MB

          MD5

          f2608dc41072c478acae9363dbbbf77a

          SHA1

          63fb10d1ab07e649fc243811417aec78051f8125

          SHA256

          84e7f2e4d62ee976e71d2fee195079d70243b1ec88fe148450b05951d589b87b

          SHA512

          26b6312bd2bc9725960785b32c66c951c7015e6213265a87a2e45523c22d69cdf1bfffff0541ae6a38d127d506319bb78bd561cc25eaf5eafad4e4b80c414c38

        • C:\Users\Admin\AppData\Local\YgLJ9SX\ie4uinit.exe

          Filesize

          262KB

          MD5

          a2f0104edd80ca2c24c24356d5eacc4f

          SHA1

          8269b9fd9231f04ed47419bd565c69dc677fab56

          SHA256

          5d85c4d62cc26996826b9d96a9153f7e05a2260342bd913b3730610a1809203c

          SHA512

          e7bb87f9f6c82cb945b95f62695be98b3fa827a24fa8c4187fe836d4e7d3e7ae3b95101edd3c41d65f6cb684910f5954a67307d450072acd8d475212db094390

        • C:\Users\Admin\AppData\Local\yBk\WMPDMC.exe

          Filesize

          1.5MB

          MD5

          59ce6e554da0a622febce19eb61c4d34

          SHA1

          176a4a410cb97b3d4361d2aea0edbf17e15d04c7

          SHA256

          c36eba7186f7367fe717595f3372a49503c9613893c2ab2eff38b625a50d04ba

          SHA512

          e9b0d310416b66e0055381391bb6b0c19ee26bbcf0e3bb9ea7d696d5851e6efbdd9bdeb250c74638b7d73b20528ea1dfb718e75ad5977aaad77aae36cc7b7e18

        • C:\Users\Admin\AppData\Local\yBk\dwmapi.dll

          Filesize

          1.8MB

          MD5

          3f887ce2df312ac5ae8e88ca01c97666

          SHA1

          05122e148511d43176b8a7192e7cea1c5931f08e

          SHA256

          0642137952ff855fd633d017cfd60eaf5ede34d1b5c1b6e9437c19bc57b34bfc

          SHA512

          15ae6bd25fdebcac9afff4271304705a2b142736d877be3048bff8238ebd67489a56ba940c871d29fdaa6f7246fc5976b086c4f443bc39670ca4e1e531cdf50b

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Wyfsbgf.lnk

          Filesize

          1KB

          MD5

          4c84574f56fec241a08de504b2bf2a2f

          SHA1

          7981bf1886eae4f2bba0d2fe5a65812e74c9e549

          SHA256

          d822dc137c3bf16a8199bd566bfae34e26a53195221c4444feb4b68b379955a7

          SHA512

          e20ec7fbb21c2e99709bd8c61b709d454005665d69850e911ee324ff3c4c7976a3085bdac013622f4907bc92dfb6263f61d654548cd6e9e103460376f7f28f0b

        • memory/1944-99-0x00007FF95AA30000-0x00007FF95AC00000-memory.dmp

          Filesize

          1.8MB

        • memory/1968-83-0x00007FF95A880000-0x00007FF95AA50000-memory.dmp

          Filesize

          1.8MB

        • memory/1968-78-0x00007FF95A880000-0x00007FF95AA50000-memory.dmp

          Filesize

          1.8MB

        • memory/1968-80-0x0000015D9BE60000-0x0000015D9BE67000-memory.dmp

          Filesize

          28KB

        • memory/3476-17-0x0000000140000000-0x00000001401CF000-memory.dmp

          Filesize

          1.8MB

        • memory/3476-10-0x0000000140000000-0x00000001401CF000-memory.dmp

          Filesize

          1.8MB

        • memory/3476-30-0x0000000140000000-0x00000001401CF000-memory.dmp

          Filesize

          1.8MB

        • memory/3476-29-0x0000000140000000-0x00000001401CF000-memory.dmp

          Filesize

          1.8MB

        • memory/3476-27-0x0000000140000000-0x00000001401CF000-memory.dmp

          Filesize

          1.8MB

        • memory/3476-26-0x0000000140000000-0x00000001401CF000-memory.dmp

          Filesize

          1.8MB

        • memory/3476-24-0x0000000140000000-0x00000001401CF000-memory.dmp

          Filesize

          1.8MB

        • memory/3476-25-0x0000000140000000-0x00000001401CF000-memory.dmp

          Filesize

          1.8MB

        • memory/3476-23-0x0000000140000000-0x00000001401CF000-memory.dmp

          Filesize

          1.8MB

        • memory/3476-21-0x0000000140000000-0x00000001401CF000-memory.dmp

          Filesize

          1.8MB

        • memory/3476-20-0x0000000140000000-0x00000001401CF000-memory.dmp

          Filesize

          1.8MB

        • memory/3476-19-0x0000000140000000-0x00000001401CF000-memory.dmp

          Filesize

          1.8MB

        • memory/3476-18-0x0000000140000000-0x00000001401CF000-memory.dmp

          Filesize

          1.8MB

        • memory/3476-5-0x00007FF97817A000-0x00007FF97817B000-memory.dmp

          Filesize

          4KB

        • memory/3476-16-0x0000000140000000-0x00000001401CF000-memory.dmp

          Filesize

          1.8MB

        • memory/3476-15-0x0000000140000000-0x00000001401CF000-memory.dmp

          Filesize

          1.8MB

        • memory/3476-14-0x0000000140000000-0x00000001401CF000-memory.dmp

          Filesize

          1.8MB

        • memory/3476-13-0x0000000140000000-0x00000001401CF000-memory.dmp

          Filesize

          1.8MB

        • memory/3476-11-0x0000000140000000-0x00000001401CF000-memory.dmp

          Filesize

          1.8MB

        • memory/3476-31-0x0000000140000000-0x00000001401CF000-memory.dmp

          Filesize

          1.8MB

        • memory/3476-9-0x0000000140000000-0x00000001401CF000-memory.dmp

          Filesize

          1.8MB

        • memory/3476-8-0x0000000140000000-0x00000001401CF000-memory.dmp

          Filesize

          1.8MB

        • memory/3476-7-0x0000000140000000-0x00000001401CF000-memory.dmp

          Filesize

          1.8MB

        • memory/3476-28-0x0000000140000000-0x00000001401CF000-memory.dmp

          Filesize

          1.8MB

        • memory/3476-6-0x0000000140000000-0x00000001401CF000-memory.dmp

          Filesize

          1.8MB

        • memory/3476-3-0x0000000002D80000-0x0000000002D81000-memory.dmp

          Filesize

          4KB

        • memory/3476-39-0x0000000140000000-0x00000001401CF000-memory.dmp

          Filesize

          1.8MB

        • memory/3476-40-0x00007FF9789A0000-0x00007FF9789B0000-memory.dmp

          Filesize

          64KB

        • memory/3476-12-0x0000000140000000-0x00000001401CF000-memory.dmp

          Filesize

          1.8MB

        • memory/3476-22-0x0000000140000000-0x00000001401CF000-memory.dmp

          Filesize

          1.8MB

        • memory/3476-32-0x0000000140000000-0x00000001401CF000-memory.dmp

          Filesize

          1.8MB

        • memory/3476-41-0x00007FF978990000-0x00007FF9789A0000-memory.dmp

          Filesize

          64KB

        • memory/3476-45-0x00000000026B0000-0x00000000026B7000-memory.dmp

          Filesize

          28KB

        • memory/3476-51-0x0000000140000000-0x00000001401CF000-memory.dmp

          Filesize

          1.8MB

        • memory/4436-67-0x00007FF95AA30000-0x00007FF95AC00000-memory.dmp

          Filesize

          1.8MB

        • memory/4436-64-0x00007FF95AA30000-0x00007FF95AC00000-memory.dmp

          Filesize

          1.8MB

        • memory/4436-62-0x000001FAEF710000-0x000001FAEF717000-memory.dmp

          Filesize

          28KB

        • memory/4936-54-0x00007FF969C70000-0x00007FF969E3F000-memory.dmp

          Filesize

          1.8MB

        • memory/4936-2-0x00007FF969C70000-0x00007FF969E3F000-memory.dmp

          Filesize

          1.8MB

        • memory/4936-0-0x000001953B130000-0x000001953B137000-memory.dmp

          Filesize

          28KB