Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2024 13:06

General

  • Target

    7ecf0f43a5389996d85ecc78bd128506009eca558379d5fb8802037b35da1544.dll

  • Size

    936KB

  • MD5

    e6080347ef82059989855367f707b6f5

  • SHA1

    af2f5c40bdd1b55fde1fab97d91e5e7e12733731

  • SHA256

    7ecf0f43a5389996d85ecc78bd128506009eca558379d5fb8802037b35da1544

  • SHA512

    6a58fb67a3cc61fdccbe8335309964d1c2d2cc9db2d1e47797fa0ba2de69631f71ba4499e9b65d921846832f33e358356ac917f836616d6a0d08209767f1c82b

  • SSDEEP

    12288:DPVKLvdxQPKSoVXxTaGcb68Uzx2TBeOWhZJpK8:DtKTrsKSKBTSb6DUXWq8

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 9 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\7ecf0f43a5389996d85ecc78bd128506009eca558379d5fb8802037b35da1544.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2676
  • C:\Windows\system32\msra.exe
    C:\Windows\system32\msra.exe
    1⤵
      PID:2656
    • C:\Users\Admin\AppData\Local\WGIhwoyb2\msra.exe
      C:\Users\Admin\AppData\Local\WGIhwoyb2\msra.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:3060
    • C:\Windows\system32\slui.exe
      C:\Windows\system32\slui.exe
      1⤵
        PID:1680
      • C:\Users\Admin\AppData\Local\kzb5Os6\slui.exe
        C:\Users\Admin\AppData\Local\kzb5Os6\slui.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:2552
      • C:\Windows\system32\wusa.exe
        C:\Windows\system32\wusa.exe
        1⤵
          PID:2456
        • C:\Users\Admin\AppData\Local\d2JNTG\wusa.exe
          C:\Users\Admin\AppData\Local\d2JNTG\wusa.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:2056

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\WGIhwoyb2\UxTheme.dll

          Filesize

          940KB

          MD5

          0c3bf4d204e5ded8bde773e5ae976111

          SHA1

          b637ea84be36e41328092ffb9e6f21fc5efe49df

          SHA256

          18cd58e03eabaad3058408a9f4a2abaa1b008cab08bfdff66ea99676039bcb0f

          SHA512

          4c69b086de1394a855414fa20f02d5af305786e2d56713f3a87a0ef87e92abd53f0ef1508c111bfae840def11c1e33519152782e9ec9b00bf61c4e64b2ef6c7d

        • C:\Users\Admin\AppData\Local\d2JNTG\WTSAPI32.dll

          Filesize

          940KB

          MD5

          a51872f2b9094d4c3b9c96e699428a9a

          SHA1

          5d22899f5ab5bdeb91680ade099d60e2fc37fad7

          SHA256

          cdd1acf5361bd48c13e273b827269ce0fd8f3db66ecbc92cc7cc67794f9fff69

          SHA512

          9a91821c8d1328a53bb668fa71ce38124f9a6d7823ae7d0e47ced296e7ff18c60ebeadf7a897923ca4a9f0bb31cd8b7b2b6d296481a33806484ab8269d615e53

        • C:\Users\Admin\AppData\Local\kzb5Os6\WINBRAND.dll

          Filesize

          940KB

          MD5

          2568fb9bef4179e3b12f98ef54cc46b0

          SHA1

          9208b8eabdedf81c57741eb02a3a0bfc03d08b2f

          SHA256

          98fdc8ef98ce19493f1ad851b566836cd303c38f17faa318b3040d918594c4c0

          SHA512

          de992f3618ac5b4b1f4bc725fac2f1dbfbfb90d874a79a169b982935528ecdbb3a31f2b6b40952adf1ed3fcceca7d90217125fe9433c28d9bc556ea236ed96db

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Adlnwv.lnk

          Filesize

          1KB

          MD5

          7a7eb45362331b2c0d55eb9fc7173e33

          SHA1

          5bdc844e3c414cf234c9399765f4d8eedf0f4f21

          SHA256

          0a448b1e9bc922e2bcd4dc6405e2b7c50aa7a41d28fcbc811d72499826457b07

          SHA512

          6b8939597e8d4eca47aa5b66a5e74efd99ee4197f81f14a7ad9c74c5c1aece1f849a2f6d48f07602682612d809838b8908af691cb3f3b338b4d575a13a977b3b

        • \Users\Admin\AppData\Local\WGIhwoyb2\msra.exe

          Filesize

          636KB

          MD5

          e79df53bad587e24b3cf965a5746c7b6

          SHA1

          87a97ec159a3fc1db211f3c2c62e4d60810e7a70

          SHA256

          4e7c22648acf664ab13dfeb2dc062ae90af1e6c621186981f395fb279bbc9b9d

          SHA512

          9a329c39ce0bc5aede01e96c4190cc7ccd17729fbc3a2b6df73057be8efaa3fa92cfef6e26a25bde6f7f94f64f6d6d0e4c5459aef2aead367e43178dd275acfb

        • \Users\Admin\AppData\Local\d2JNTG\wusa.exe

          Filesize

          300KB

          MD5

          c15b3d813f4382ade98f1892350f21c7

          SHA1

          a45c5abc6751bc8b9041e5e07923fa4fc1b4542b

          SHA256

          8f067da98eb3ea9f1db2f0063ff54e07d992fbf051779b467e222639be4127e3

          SHA512

          6d028fe81fe45d0ef291741513ecf939e412912647347d4d5bad89571f33e1084dc0fd26eb7313c7191f938c3f50243f453e2690e2475fc3f5539a20c2ff2f3c

        • \Users\Admin\AppData\Local\kzb5Os6\slui.exe

          Filesize

          341KB

          MD5

          c5ce5ce799387e82b7698a0ee5544a6d

          SHA1

          ed37fdb169bb539271c117d3e8a5f14fd8df1c0d

          SHA256

          34aa7ca0ea833263a6883827e161a5c218576c5ad97e0ce386fad4250676b42c

          SHA512

          79453b45e1f38d164ee3dbc232f774ff121d4394c22783140f5c8c722f184a69f499f2fb9621bdb28f565065b791883526e1a1d4abef9df82289613c2ce97a5c

        • memory/1232-24-0x0000000077370000-0x0000000077372000-memory.dmp

          Filesize

          8KB

        • memory/1232-44-0x0000000077006000-0x0000000077007000-memory.dmp

          Filesize

          4KB

        • memory/1232-14-0x0000000140000000-0x00000001400EA000-memory.dmp

          Filesize

          936KB

        • memory/1232-13-0x0000000140000000-0x00000001400EA000-memory.dmp

          Filesize

          936KB

        • memory/1232-12-0x0000000140000000-0x00000001400EA000-memory.dmp

          Filesize

          936KB

        • memory/1232-23-0x0000000140000000-0x00000001400EA000-memory.dmp

          Filesize

          936KB

        • memory/1232-10-0x0000000140000000-0x00000001400EA000-memory.dmp

          Filesize

          936KB

        • memory/1232-8-0x0000000140000000-0x00000001400EA000-memory.dmp

          Filesize

          936KB

        • memory/1232-25-0x00000000773A0000-0x00000000773A2000-memory.dmp

          Filesize

          8KB

        • memory/1232-3-0x0000000077006000-0x0000000077007000-memory.dmp

          Filesize

          4KB

        • memory/1232-34-0x0000000140000000-0x00000001400EA000-memory.dmp

          Filesize

          936KB

        • memory/1232-36-0x0000000140000000-0x00000001400EA000-memory.dmp

          Filesize

          936KB

        • memory/1232-4-0x0000000002530000-0x0000000002531000-memory.dmp

          Filesize

          4KB

        • memory/1232-11-0x0000000140000000-0x00000001400EA000-memory.dmp

          Filesize

          936KB

        • memory/1232-22-0x0000000002510000-0x0000000002517000-memory.dmp

          Filesize

          28KB

        • memory/1232-7-0x0000000140000000-0x00000001400EA000-memory.dmp

          Filesize

          936KB

        • memory/1232-6-0x0000000140000000-0x00000001400EA000-memory.dmp

          Filesize

          936KB

        • memory/1232-9-0x0000000140000000-0x00000001400EA000-memory.dmp

          Filesize

          936KB

        • memory/2056-90-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/2552-69-0x0000000000290000-0x0000000000297000-memory.dmp

          Filesize

          28KB

        • memory/2552-74-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/2676-43-0x0000000140000000-0x00000001400EA000-memory.dmp

          Filesize

          936KB

        • memory/2676-0-0x0000000140000000-0x00000001400EA000-memory.dmp

          Filesize

          936KB

        • memory/2676-2-0x0000000000190000-0x0000000000197000-memory.dmp

          Filesize

          28KB

        • memory/3060-57-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/3060-53-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/3060-52-0x0000000000120000-0x0000000000127000-memory.dmp

          Filesize

          28KB