Analysis

  • max time kernel
    149s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    11-10-2024 14:12

General

  • Target

    1a8536a5bb678f5273e7995d810ef105a82d062219e09a7b6f4b632e2532b020.dll

  • Size

    940KB

  • MD5

    a0cb297fd3181bda59066db2281fb496

  • SHA1

    7ba6d4a54cd899bf575da748def486be7dffc70d

  • SHA256

    1a8536a5bb678f5273e7995d810ef105a82d062219e09a7b6f4b632e2532b020

  • SHA512

    3ace28434cf67dcda52b3f6f7bacf03f97e92d76e4d0b69f9e3759c50f0b236f0e673b396a2b255706864bf25409212eafde50ac6374155f2c15c856bcd87390

  • SSDEEP

    12288:YPVKLvdxQPKSoVXxTaGcb68Uzx2TBeOWhZJpK8:YtKTrsKSKBTSb6DUXWq8

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 10 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1a8536a5bb678f5273e7995d810ef105a82d062219e09a7b6f4b632e2532b020.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2380
  • C:\Windows\system32\slui.exe
    C:\Windows\system32\slui.exe
    1⤵
      PID:2668
    • C:\Users\Admin\AppData\Local\SSkorr\slui.exe
      C:\Users\Admin\AppData\Local\SSkorr\slui.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:1360
    • C:\Windows\system32\dpapimig.exe
      C:\Windows\system32\dpapimig.exe
      1⤵
        PID:784
      • C:\Users\Admin\AppData\Local\kOQE1O\dpapimig.exe
        C:\Users\Admin\AppData\Local\kOQE1O\dpapimig.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:568
      • C:\Windows\system32\msra.exe
        C:\Windows\system32\msra.exe
        1⤵
          PID:1320
        • C:\Users\Admin\AppData\Local\0ak\msra.exe
          C:\Users\Admin\AppData\Local\0ak\msra.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:1076

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\0ak\NDFAPI.DLL

          Filesize

          944KB

          MD5

          48ed7aedc6caa751f504ac8c44c83eeb

          SHA1

          57697aec4fd08705683bc737e00d00dd494c9b21

          SHA256

          540046b2dcf365caf14bc52e9aaa1f1100df9dafc3d04221f8c5a1f98a64b9d5

          SHA512

          988185c89fa24b92523380abf5cf0fc088aa83cc7f91c589c178c56bc95c70b278b9b38ec6c589cad1a553e38e993fb5221b4d8bfd08359507d0ec9c849e0e85

        • C:\Users\Admin\AppData\Local\0ak\msra.exe

          Filesize

          636KB

          MD5

          e79df53bad587e24b3cf965a5746c7b6

          SHA1

          87a97ec159a3fc1db211f3c2c62e4d60810e7a70

          SHA256

          4e7c22648acf664ab13dfeb2dc062ae90af1e6c621186981f395fb279bbc9b9d

          SHA512

          9a329c39ce0bc5aede01e96c4190cc7ccd17729fbc3a2b6df73057be8efaa3fa92cfef6e26a25bde6f7f94f64f6d6d0e4c5459aef2aead367e43178dd275acfb

        • C:\Users\Admin\AppData\Local\SSkorr\slc.dll

          Filesize

          944KB

          MD5

          78843ed86fc755b000ecf8e5f98bc672

          SHA1

          93e8c05f5dee5cecfc61522ad4f66790a61c49e1

          SHA256

          809f37a1e67498e4a65ad68db8d6a6c2ad2872c4f20a897aad87e119612f6d04

          SHA512

          d3984f130437cf3cf58d024be33f4e2a0fe8cec8f18a020b37b60c4e3a628813bd34d4d49cb6bd95230c77089112ea9ddff7e90299ff15a096d76ed7978b65c7

        • C:\Users\Admin\AppData\Local\SSkorr\slui.exe

          Filesize

          341KB

          MD5

          c5ce5ce799387e82b7698a0ee5544a6d

          SHA1

          ed37fdb169bb539271c117d3e8a5f14fd8df1c0d

          SHA256

          34aa7ca0ea833263a6883827e161a5c218576c5ad97e0ce386fad4250676b42c

          SHA512

          79453b45e1f38d164ee3dbc232f774ff121d4394c22783140f5c8c722f184a69f499f2fb9621bdb28f565065b791883526e1a1d4abef9df82289613c2ce97a5c

        • C:\Users\Admin\AppData\Local\kOQE1O\DUI70.dll

          Filesize

          1.1MB

          MD5

          a7eb27e7f49dc292ce30254511f2d587

          SHA1

          3399c4fd68f8fdbb7a72ae874d0577058f5d02dc

          SHA256

          11d40c5dae9fcaa5bcd60c9d687997c5926846a14894d62616d1222176ce256e

          SHA512

          f843c3ae3da1247648e73a7f44484af152a6907987c1ad3327ba2f65b42e5fcd658a94e8da48f09c477453c6f7d88bdf616b53066f8a0d9ce8ab1927c20ef391

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Ppapbotpack.lnk

          Filesize

          1KB

          MD5

          f9bb7f3f218d3982ea7e2fe0cc37505c

          SHA1

          37ad977397fe649005e8d76696f1e43f86e0ecab

          SHA256

          364593f430ee017a959399dbd904bbdc8692ee2c2c067d1133d3be1ec5740dcd

          SHA512

          6824773adb6923e6221c2d2d18d63e39f8e141cba4ab4d8052657edff3ab318ca1aa7686e421ff22db1205c656cc53e80860af2a42d43735b0075400f92e3602

        • \Users\Admin\AppData\Local\kOQE1O\dpapimig.exe

          Filesize

          73KB

          MD5

          0e8b8abea4e23ddc9a70614f3f651303

          SHA1

          6d332ba4e7a78039f75b211845514ab35ab467b2

          SHA256

          66fc6b68e54b8840a38b4de980cc22aed21009afc1494a9cc68e892329f076a1

          SHA512

          4feded78f9b953472266693e0943030d00f82a5cc8559df60ae0479de281164155e19687afc67cba74d04bb9ad092f5c7732f2d2f9b06274ca2ae87dc2d4a6dc

        • memory/568-75-0x0000000140000000-0x000000014011F000-memory.dmp

          Filesize

          1.1MB

        • memory/568-72-0x0000000000180000-0x0000000000187000-memory.dmp

          Filesize

          28KB

        • memory/568-70-0x0000000140000000-0x000000014011F000-memory.dmp

          Filesize

          1.1MB

        • memory/1076-91-0x0000000140000000-0x00000001400EC000-memory.dmp

          Filesize

          944KB

        • memory/1236-11-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/1236-18-0x0000000002AC0000-0x0000000002AC7000-memory.dmp

          Filesize

          28KB

        • memory/1236-7-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/1236-6-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/1236-26-0x0000000077C70000-0x0000000077C72000-memory.dmp

          Filesize

          8KB

        • memory/1236-25-0x0000000077C40000-0x0000000077C42000-memory.dmp

          Filesize

          8KB

        • memory/1236-24-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/1236-35-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/1236-38-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/1236-3-0x00000000778D6000-0x00000000778D7000-memory.dmp

          Filesize

          4KB

        • memory/1236-45-0x00000000778D6000-0x00000000778D7000-memory.dmp

          Filesize

          4KB

        • memory/1236-9-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/1236-10-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/1236-4-0x0000000002AE0000-0x0000000002AE1000-memory.dmp

          Filesize

          4KB

        • memory/1236-15-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/1236-14-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/1236-8-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/1236-12-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/1236-13-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/1360-58-0x0000000140000000-0x00000001400EC000-memory.dmp

          Filesize

          944KB

        • memory/1360-55-0x0000000000390000-0x0000000000397000-memory.dmp

          Filesize

          28KB

        • memory/1360-53-0x0000000140000000-0x00000001400EC000-memory.dmp

          Filesize

          944KB

        • memory/2380-2-0x00000000000A0000-0x00000000000A7000-memory.dmp

          Filesize

          28KB

        • memory/2380-44-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/2380-0-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB