Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    24-09-2024 19:18

General

  • Target

    d8f78241f9e732ff57f1f307c99d7e27796829927283172653634470ab9b90aaN.dll

  • Size

    900KB

  • MD5

    338b828676d1d088ed1bd3a335e9b780

  • SHA1

    4bc3d044e35d9953a71ac426c212b6a3c9de509c

  • SHA256

    d8f78241f9e732ff57f1f307c99d7e27796829927283172653634470ab9b90aa

  • SHA512

    f4f97fcba6d28aad4cc05408cb97e96603b6cab093317457cf72a4c2474114d7dfbb85e0b1f381e1a56c55221db7f4d1cec54e846c31349258f4dd72e0d702e3

  • SSDEEP

    12288:MGVNJAvuPFUl/faxmVlBLXKCgFfEK7JRLeHlX//ve7Y:t3JAvRl/fKQKCgFfx4P/vaY

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 5 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d8f78241f9e732ff57f1f307c99d7e27796829927283172653634470ab9b90aaN.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2948
  • C:\Windows\system32\lpksetup.exe
    C:\Windows\system32\lpksetup.exe
    1⤵
      PID:796
    • C:\Users\Admin\AppData\Local\0XQaG\lpksetup.exe
      C:\Users\Admin\AppData\Local\0XQaG\lpksetup.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious behavior: GetForegroundWindowSpam
      PID:3064
    • C:\Windows\system32\calc.exe
      C:\Windows\system32\calc.exe
      1⤵
        PID:1632
      • C:\Users\Admin\AppData\Local\4kVAA\calc.exe
        C:\Users\Admin\AppData\Local\4kVAA\calc.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        • Suspicious behavior: GetForegroundWindowSpam
        PID:2528
      • C:\Windows\system32\mfpmp.exe
        C:\Windows\system32\mfpmp.exe
        1⤵
          PID:328
        • C:\Users\Admin\AppData\Local\ownfu8\mfpmp.exe
          C:\Users\Admin\AppData\Local\ownfu8\mfpmp.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          • Suspicious behavior: GetForegroundWindowSpam
          PID:1276

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\4kVAA\WINMM.dll

          Filesize

          908KB

          MD5

          a9f803618c45c8a7fd047caff1c389e1

          SHA1

          b64f94ee5bd147385c48d2f8630529e762f41e8b

          SHA256

          5b47b649921501108f2c8d05f579a048852ca091275b7ac76211bb9b3ec40010

          SHA512

          97660e049948f7a9205850bac22465429b65a247b9fc33aa4ee8ef98716fbd3fae30aa10fa74979a071130a971ef0b04ab8cd538929bb53d51d311de8334dfbc

        • C:\Users\Admin\AppData\Local\4kVAA\calc.exe

          Filesize

          897KB

          MD5

          10e4a1d2132ccb5c6759f038cdb6f3c9

          SHA1

          42d36eeb2140441b48287b7cd30b38105986d68f

          SHA256

          c6a91cba00bf87cdb064c49adaac82255cbec6fdd48fd21f9b3b96abf019916b

          SHA512

          9bd44afb164ab3e09a784c765cd03838d2e5f696c549fc233eb5a69cada47a8e1fb62095568cb272a80da579d9d0e124b1c27cf61bb2ac8cf6e584a722d8864d

        • C:\Users\Admin\AppData\Local\ownfu8\MFPlat.DLL

          Filesize

          908KB

          MD5

          971a23d88317d2b7d61c0fe028d52c1b

          SHA1

          cdbc8bf61b0554c16ee4e201cde1e8302d856edd

          SHA256

          2dfefed8202a03c009e9ef13c2053af40e5bef7ab5cab56de98990cdcdb7bac8

          SHA512

          6b8051b441b46933f6b5a622fcd044968a2f786661fb5b50fe752852990cadb82e31d973fd01c0e35b749201fce5f3abafc1b43f5bdc2446dc3ab37d9f24df5a

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Ykefwsdudlbqds.lnk

          Filesize

          969B

          MD5

          40556f2b6614b30828ab9b4181b19e20

          SHA1

          35d28681c6c67f7fdfc46a1fd77c0d831311cbef

          SHA256

          4364e3d18a02377ce8634cd8da35851c0474dc0cf5f0b990790beb3f2a9d0e9b

          SHA512

          a286ddbbea98eec182c2f741fdcbba68f5bb2b0ad8c20c34f873fea175b8935a36937f2745da8d59b9480d2c515a466b97c2327190fdd00f88e0b77cf55832c0

        • \Users\Admin\AppData\Local\0XQaG\lpksetup.exe

          Filesize

          638KB

          MD5

          50d28f3f8b7c17056520c80a29efe17c

          SHA1

          1b1e62be0a0bdc9aec2e91842c35381297d8f01e

          SHA256

          71613ea48467d1a0b00f8bcaed270b7527fc5771f540a8eb0515b3a5fdc8604f

          SHA512

          92bc60402aacf1a62e47335adf8696a5c0d31637e624628d82b6ec1f17e1ee65ae8edf7e8dcd10933f59c892a4a74d8e461945df0991b706a4a53927c5fd3861

        • \Users\Admin\AppData\Local\0XQaG\slc.dll

          Filesize

          904KB

          MD5

          c735eff37bfcb8c641d961a2c1768b8c

          SHA1

          65aee8bda3dfcaf5faf9f106a998ea9ff2e8a5d5

          SHA256

          d2a73b3b9e3bff3e96ce79fd80d5e4b34933346ad71d2d0ee6ad9efc7e028796

          SHA512

          c954168c3fb77b2f07ed520196ad1436e8144e3e73b0592b635ae95e1e1243f3a9fd7ea58f3897586193d727eb653db54c29d9b15cc2e03305f94782c49c0613

        • \Users\Admin\AppData\Local\ownfu8\mfpmp.exe

          Filesize

          24KB

          MD5

          2d8600b94de72a9d771cbb56b9f9c331

          SHA1

          a0e2ac409159546183aa45875497844c4adb5aac

          SHA256

          7d8d8918761b8b6c95758375a6e7cf7fb8e43abfdd3846476219883ef3f8c185

          SHA512

          3aaa6619f29434c294b9b197c3b86fdc5d88b0254c8f35f010c9b5f254fd47fbc3272412907e2a5a4f490bda2acfbbd7a90f968e25067abf921b934d2616eafc

        • memory/1228-13-0x0000000140000000-0x00000001400E1000-memory.dmp

          Filesize

          900KB

        • memory/1228-38-0x00000000770F0000-0x00000000770F2000-memory.dmp

          Filesize

          8KB

        • memory/1228-26-0x0000000140000000-0x00000001400E1000-memory.dmp

          Filesize

          900KB

        • memory/1228-36-0x0000000002A50000-0x0000000002A57000-memory.dmp

          Filesize

          28KB

        • memory/1228-35-0x0000000140000000-0x00000001400E1000-memory.dmp

          Filesize

          900KB

        • memory/1228-28-0x0000000140000000-0x00000001400E1000-memory.dmp

          Filesize

          900KB

        • memory/1228-27-0x0000000140000000-0x00000001400E1000-memory.dmp

          Filesize

          900KB

        • memory/1228-25-0x0000000140000000-0x00000001400E1000-memory.dmp

          Filesize

          900KB

        • memory/1228-24-0x0000000140000000-0x00000001400E1000-memory.dmp

          Filesize

          900KB

        • memory/1228-22-0x0000000140000000-0x00000001400E1000-memory.dmp

          Filesize

          900KB

        • memory/1228-20-0x0000000140000000-0x00000001400E1000-memory.dmp

          Filesize

          900KB

        • memory/1228-19-0x0000000140000000-0x00000001400E1000-memory.dmp

          Filesize

          900KB

        • memory/1228-18-0x0000000140000000-0x00000001400E1000-memory.dmp

          Filesize

          900KB

        • memory/1228-17-0x0000000140000000-0x00000001400E1000-memory.dmp

          Filesize

          900KB

        • memory/1228-16-0x0000000140000000-0x00000001400E1000-memory.dmp

          Filesize

          900KB

        • memory/1228-15-0x0000000140000000-0x00000001400E1000-memory.dmp

          Filesize

          900KB

        • memory/1228-14-0x0000000140000000-0x00000001400E1000-memory.dmp

          Filesize

          900KB

        • memory/1228-119-0x0000000076D86000-0x0000000076D87000-memory.dmp

          Filesize

          4KB

        • memory/1228-12-0x0000000140000000-0x00000001400E1000-memory.dmp

          Filesize

          900KB

        • memory/1228-11-0x0000000140000000-0x00000001400E1000-memory.dmp

          Filesize

          900KB

        • memory/1228-4-0x0000000076D86000-0x0000000076D87000-memory.dmp

          Filesize

          4KB

        • memory/1228-23-0x0000000140000000-0x00000001400E1000-memory.dmp

          Filesize

          900KB

        • memory/1228-37-0x0000000076F91000-0x0000000076F92000-memory.dmp

          Filesize

          4KB

        • memory/1228-47-0x0000000140000000-0x00000001400E1000-memory.dmp

          Filesize

          900KB

        • memory/1228-52-0x0000000140000000-0x00000001400E1000-memory.dmp

          Filesize

          900KB

        • memory/1228-56-0x0000000140000000-0x00000001400E1000-memory.dmp

          Filesize

          900KB

        • memory/1228-21-0x0000000140000000-0x00000001400E1000-memory.dmp

          Filesize

          900KB

        • memory/1228-10-0x0000000140000000-0x00000001400E1000-memory.dmp

          Filesize

          900KB

        • memory/1228-5-0x0000000002D70000-0x0000000002D71000-memory.dmp

          Filesize

          4KB

        • memory/1228-7-0x0000000140000000-0x00000001400E1000-memory.dmp

          Filesize

          900KB

        • memory/1228-9-0x0000000140000000-0x00000001400E1000-memory.dmp

          Filesize

          900KB

        • memory/1276-107-0x0000000140000000-0x00000001400E3000-memory.dmp

          Filesize

          908KB

        • memory/1276-106-0x0000000000510000-0x0000000000517000-memory.dmp

          Filesize

          28KB

        • memory/2528-86-0x0000000140000000-0x00000001400E3000-memory.dmp

          Filesize

          908KB

        • memory/2528-85-0x0000000000110000-0x0000000000117000-memory.dmp

          Filesize

          28KB

        • memory/2528-89-0x0000000140000000-0x00000001400E3000-memory.dmp

          Filesize

          908KB

        • memory/2948-8-0x0000000140000000-0x00000001400E1000-memory.dmp

          Filesize

          900KB

        • memory/2948-0-0x0000000000190000-0x0000000000197000-memory.dmp

          Filesize

          28KB

        • memory/2948-1-0x0000000140000000-0x00000001400E1000-memory.dmp

          Filesize

          900KB

        • memory/3064-65-0x0000000140000000-0x00000001400E2000-memory.dmp

          Filesize

          904KB

        • memory/3064-70-0x0000000140000000-0x00000001400E2000-memory.dmp

          Filesize

          904KB

        • memory/3064-68-0x0000000000380000-0x0000000000387000-memory.dmp

          Filesize

          28KB