Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2024 14:12

General

  • Target

    9a98089a9a05bf0abd6ba54247893308568db62c77f15834cc0774b8822429e3.dll

  • Size

    940KB

  • MD5

    33542753fda57b6a2eb61fcf509298d3

  • SHA1

    ae14ea0f0e01de7ef2f4ff2e60361f1065853616

  • SHA256

    9a98089a9a05bf0abd6ba54247893308568db62c77f15834cc0774b8822429e3

  • SHA512

    f664c54e9f1efe596219f4abb442d93eae6723dd377739323b619d229b4d8ded802c6b4e5a22227b8498692a4faed9c83bf4e5b82ba1e1644520140b18c6eec3

  • SSDEEP

    12288:gPVKLvdxQPKSoVXxTaGcb68Uzx2TBeOWhZJpK8:gtKTrsKSKBTSb6DUXWq8

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 10 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\9a98089a9a05bf0abd6ba54247893308568db62c77f15834cc0774b8822429e3.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:1620
  • C:\Windows\system32\msinfo32.exe
    C:\Windows\system32\msinfo32.exe
    1⤵
      PID:2860
    • C:\Users\Admin\AppData\Local\pK93\msinfo32.exe
      C:\Users\Admin\AppData\Local\pK93\msinfo32.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2836
    • C:\Windows\system32\UI0Detect.exe
      C:\Windows\system32\UI0Detect.exe
      1⤵
        PID:2676
      • C:\Users\Admin\AppData\Local\oHEXjlGE\UI0Detect.exe
        C:\Users\Admin\AppData\Local\oHEXjlGE\UI0Detect.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:968
      • C:\Windows\system32\mstsc.exe
        C:\Windows\system32\mstsc.exe
        1⤵
          PID:1396
        • C:\Users\Admin\AppData\Local\qyCjWB\mstsc.exe
          C:\Users\Admin\AppData\Local\qyCjWB\mstsc.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:1916

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\oHEXjlGE\UI0Detect.exe

          Filesize

          40KB

          MD5

          3cbdec8d06b9968aba702eba076364a1

          SHA1

          6e0fcaccadbdb5e3293aa3523ec1006d92191c58

          SHA256

          b8dab8aa804fc23021bfebd7ae4d40fbe648d6c6ba21cc008e26d1c084972f9b

          SHA512

          a8e434c925ef849ecef0efcb4873dbb95eea2821c967b05afbbe5733071cc2293fc94e7fdf1fdaee51cbcf9885b3b72bfd4d690f23af34558b056920263e465d

        • C:\Users\Admin\AppData\Local\oHEXjlGE\WTSAPI32.dll

          Filesize

          944KB

          MD5

          bf41245ff0461d2eafb2595275716e38

          SHA1

          e873311aff0ad0f31ec0545ce8f500c9eb5939bb

          SHA256

          777d0f04cf5fc8290e436dffcd861ff15252d7f2b8a5c275cf2ab4d819e17882

          SHA512

          0dc857af0f97030ffedce6ea1864c9b75ce67641d6303d0f1f31b44645a3df2341c851027b40e782ec52706c3ee0449eb1049890df72add597ee1f6324a07fc4

        • C:\Users\Admin\AppData\Local\pK93\MFC42u.dll

          Filesize

          968KB

          MD5

          b6501afd889c799ca89ea26f91f5d407

          SHA1

          d22a3bed0e340fa77c1397001829abe3461ae991

          SHA256

          29aa0c2f2ec7b0e0b7e40f25729fdd3c80ffcf3c13d41ca55f9d2e69e5e422d3

          SHA512

          96f13423973be0b76fbd2f4ff2aee7cf11887bf7b7e4fba5b5bbbe0d826e8aa02d5f474ea422e9d911a56469fdab819eceac8dd175fdf64d7f2188272c2f07c1

        • C:\Users\Admin\AppData\Local\pK93\msinfo32.exe

          Filesize

          370KB

          MD5

          d291620d4c51c5f5ffa62ccdc52c5c13

          SHA1

          2081c97f15b1c2a2eadce366baf3c510da553cc7

          SHA256

          76e959dd7db31726c040d46cfa86b681479967aea36db5f625e80bd36422e8ae

          SHA512

          75f9bcce4c596dae1f4d78e13d9d53b0c31988d2170c3d9f5db352b8c8a1c8ca58f4a002b30a4b328b8f4769008b750b8a1c9fda44a582e11c3adc38345c334b

        • C:\Users\Admin\AppData\Local\qyCjWB\credui.dll

          Filesize

          944KB

          MD5

          7cdd2166946e27294e5aa9e4df7d9195

          SHA1

          eef62dc45bf0127b9d69e4f7ed02e4e92e4a156e

          SHA256

          d7d2cf7a369f4c0ec7a6af5c0a1f0e4406cd47d85857532b70adf1a4dad5d787

          SHA512

          80e0c981db23e8ba39ccdcf15a7066f52dcf6d8113cc2f34dd171519282f206431c359e37cf76048eb808fa87c72c64b01c632149911bf5a7e2d11849d44b978

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Ncfyujonfo.lnk

          Filesize

          1KB

          MD5

          35e7dee4793a74fd5a10b122c4c23c8d

          SHA1

          c26ef21d03ec6afa344e641f164fc1cfffbbc4c6

          SHA256

          ecca14e8564df37655f9efe5ffa56252d0389357f62b15bbb87c11b871f3ef50

          SHA512

          6908ab66e6643562a63c3f1b0d4dbec9e1dca16ed4d468a71bca08f11526504dc4f8c1ed005a38045eb857057a463444fb3e33be7eb3e95fcc666a9a458acd8e

        • \Users\Admin\AppData\Local\qyCjWB\mstsc.exe

          Filesize

          1.1MB

          MD5

          50f739538ef014b2e7ec59431749d838

          SHA1

          b439762b8efe8cfb977e7374c11a7e4d8ed05eb3

          SHA256

          85c510c7fa8d64c70886ea01ec99e7b9064594f021a95b4cf88359421e732be3

          SHA512

          02e231ddc4ac012c597b9db42f8a77fbf35ca8253c030d443a0dd4db3d76a9ee1cced600f12d7bb06305e7a4da4a8fda980faad335adcb12738d80d453cb3cc8

        • memory/968-75-0x0000000140000000-0x00000001400EC000-memory.dmp

          Filesize

          944KB

        • memory/968-71-0x0000000140000000-0x00000001400EC000-memory.dmp

          Filesize

          944KB

        • memory/968-70-0x0000000000410000-0x0000000000417000-memory.dmp

          Filesize

          28KB

        • memory/1140-7-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/1140-10-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/1140-15-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/1140-23-0x00000000025F0000-0x00000000025F7000-memory.dmp

          Filesize

          28KB

        • memory/1140-14-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/1140-26-0x0000000076EF0000-0x0000000076EF2000-memory.dmp

          Filesize

          8KB

        • memory/1140-25-0x0000000076EC0000-0x0000000076EC2000-memory.dmp

          Filesize

          8KB

        • memory/1140-24-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/1140-36-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/1140-35-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/1140-3-0x0000000076B56000-0x0000000076B57000-memory.dmp

          Filesize

          4KB

        • memory/1140-45-0x0000000076B56000-0x0000000076B57000-memory.dmp

          Filesize

          4KB

        • memory/1140-6-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/1140-4-0x0000000002610000-0x0000000002611000-memory.dmp

          Filesize

          4KB

        • memory/1140-12-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/1140-11-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/1140-13-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/1140-8-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/1140-9-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/1620-0-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/1620-44-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/1620-2-0x0000000000390000-0x0000000000397000-memory.dmp

          Filesize

          28KB

        • memory/1916-90-0x0000000140000000-0x00000001400EC000-memory.dmp

          Filesize

          944KB

        • memory/2836-58-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/2836-54-0x0000000140000000-0x00000001400F2000-memory.dmp

          Filesize

          968KB

        • memory/2836-53-0x0000000000100000-0x0000000000107000-memory.dmp

          Filesize

          28KB