Analysis

  • max time kernel
    150s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2024 16:07

General

  • Target

    dbfc91b3d66277b0c4c3ed7416f89b8e42ee567a6758596fccb112540ab7ab88.dll

  • Size

    944KB

  • MD5

    dc4b3d40467b02484bead9b93e12862a

  • SHA1

    2fa0d80d3ee72fbbe3a4c35c8ffc964f47449b4b

  • SHA256

    dbfc91b3d66277b0c4c3ed7416f89b8e42ee567a6758596fccb112540ab7ab88

  • SHA512

    de790f5c7fe3f32e19ea7eecc0d6fc0476d95dae957a06fa6b4a409c5f421a37d50d788787558d99496ad26590209bc226257bb9b0916dd6bbe0d03413c53286

  • SSDEEP

    12288:YPVKLvdxQPKSoVXxTaGcb68Uzx2TBeOWhZJpK8:YtKTrsKSKBTSb6DUXWq8

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 9 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\dbfc91b3d66277b0c4c3ed7416f89b8e42ee567a6758596fccb112540ab7ab88.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2416
  • C:\Windows\system32\DWWIN.EXE
    C:\Windows\system32\DWWIN.EXE
    1⤵
      PID:2364
    • C:\Users\Admin\AppData\Local\UyycDT\DWWIN.EXE
      C:\Users\Admin\AppData\Local\UyycDT\DWWIN.EXE
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:1036
    • C:\Windows\system32\cmstp.exe
      C:\Windows\system32\cmstp.exe
      1⤵
        PID:4744
      • C:\Users\Admin\AppData\Local\qbu\cmstp.exe
        C:\Users\Admin\AppData\Local\qbu\cmstp.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:3864
      • C:\Windows\system32\PasswordOnWakeSettingFlyout.exe
        C:\Windows\system32\PasswordOnWakeSettingFlyout.exe
        1⤵
          PID:1436
        • C:\Users\Admin\AppData\Local\SHemol\PasswordOnWakeSettingFlyout.exe
          C:\Users\Admin\AppData\Local\SHemol\PasswordOnWakeSettingFlyout.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:2960

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\SHemol\DUI70.dll

          Filesize

          1.2MB

          MD5

          a14efec3462d5ea1a69869ba3d7e116a

          SHA1

          f5408e4d49954ab2ac189a46d41e8833b64e1284

          SHA256

          dbf58269711c4bcecc34df5ce1568a467bf43bda3ea25f909fffa0c9c5ff335f

          SHA512

          91c55144bfeb112e589c366bdabc257a4c19ef1de62f909f915ac87a883dfdecd7bd0f199e1aa7b868a8ce985955f6cfc9291a0f55e33581292e147162f03fbe

        • C:\Users\Admin\AppData\Local\SHemol\PasswordOnWakeSettingFlyout.exe

          Filesize

          44KB

          MD5

          591a98c65f624c52882c2b238d6cd4c4

          SHA1

          c960d08c19d777069cf265dcc281807fbd8502d7

          SHA256

          5e6ed524c955fb1ea3e24f132987143da3ec81db5041a0edcfa7bf3ac790eb06

          SHA512

          1999f23c90d85857461f8ddc5342470296f6939a654ac015780c2977f293c1f799fc992462f3d4d9181c97ab960db3291b85ea7c0537edcb57755706b20b6074

        • C:\Users\Admin\AppData\Local\UyycDT\DWWIN.EXE

          Filesize

          229KB

          MD5

          444cc4d3422a0fdd45c1b78070026c60

          SHA1

          97162ff341fff1ec54b827ec02f8b86fd2d41a97

          SHA256

          4b3f620272e709ce3e01ae5b19ef0300bd476f2da6412637f703bbaded2821f0

          SHA512

          21742d330a6a5763ea41a8fed4d71b98e4a1b4c685675c4cfeb7253033c3a208c23902caf0efdf470a85e0770cb8fac8af0eb6d3a8511445b0570054b42d5553

        • C:\Users\Admin\AppData\Local\UyycDT\VERSION.dll

          Filesize

          948KB

          MD5

          a0b8a9df2f810cf0f198723caa090dc4

          SHA1

          f3d03ca9df5e8f052f9b073b8d30702ff8597e96

          SHA256

          d8319b1385ed6ff06783842a449d10808727ea4bb9c2827b579826ca58bffabf

          SHA512

          a85cc7fb169a2b8ee14ae9cf7e1b530cfc950e037e4836b90c8261e53c893baab294b05b53f4ec35e8c8e47732596c7035f626d37c414ca65066f94501690d09

        • C:\Users\Admin\AppData\Local\qbu\VERSION.dll

          Filesize

          948KB

          MD5

          572eff100e39b0f07ea433b5e82aab90

          SHA1

          d5899676ccdf11eef72c5e4332f6897f1f713f1b

          SHA256

          095f427808b54988d33d68787dac0200f4752fb3c0f8cf4b5ddab8d1f5008feb

          SHA512

          6a076ea7ce40a340505c2453088515a9b074c9426dd86743d863710f0f71b428142061216ef3222b77fbc7529b5d8a29efc960ef2c6ad79386dd93e416eaf4fa

        • C:\Users\Admin\AppData\Local\qbu\cmstp.exe

          Filesize

          96KB

          MD5

          4cc43fe4d397ff79fa69f397e016df52

          SHA1

          8fd6cf81ad40c9b123cd75611860a8b95c72869c

          SHA256

          f2d3905ee38b2b5c0b724d582f14eb1db7621ffb8f3826df686a20784341614c

          SHA512

          851ef9fa5a03ec8b9fea0094c6e4bfa0b9e71cee3412ee86b2dfc34682aa5fb6455fefe7fc0092b711956d7c880cf8a5761b63ee990aa8e72f3473086ac0f157

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Eswctkc.lnk

          Filesize

          1KB

          MD5

          56f8ade44391bb33af0fdef8ffaf7cac

          SHA1

          22f8c939454da87e6cb4a00dc80472dfed04510d

          SHA256

          439a0efcad14fb7d4cdb0c1347d0da5e499ebb22f0f987655e982ac21acb45c9

          SHA512

          ce3fd25450c98cd047726644fe9ac07c2e708fb263ccef7dc3754de0823dcaa46630cbee70e2334fe3885dadc31a979ab5900da66c6d81d564e2a2962013f8c3

        • memory/1036-50-0x0000000140000000-0x00000001400ED000-memory.dmp

          Filesize

          948KB

        • memory/1036-45-0x00000174EB4E0000-0x00000174EB4E7000-memory.dmp

          Filesize

          28KB

        • memory/1036-46-0x0000000140000000-0x00000001400ED000-memory.dmp

          Filesize

          948KB

        • memory/2416-0-0x0000000140000000-0x00000001400EC000-memory.dmp

          Filesize

          944KB

        • memory/2416-38-0x0000000140000000-0x00000001400EC000-memory.dmp

          Filesize

          944KB

        • memory/2416-2-0x00000218003E0000-0x00000218003E7000-memory.dmp

          Filesize

          28KB

        • memory/2960-77-0x0000000140000000-0x0000000140132000-memory.dmp

          Filesize

          1.2MB

        • memory/2960-81-0x0000000140000000-0x0000000140132000-memory.dmp

          Filesize

          1.2MB

        • memory/3424-13-0x0000000140000000-0x00000001400EC000-memory.dmp

          Filesize

          944KB

        • memory/3424-35-0x0000000140000000-0x00000001400EC000-memory.dmp

          Filesize

          944KB

        • memory/3424-8-0x0000000140000000-0x00000001400EC000-memory.dmp

          Filesize

          944KB

        • memory/3424-7-0x0000000140000000-0x00000001400EC000-memory.dmp

          Filesize

          944KB

        • memory/3424-10-0x0000000140000000-0x00000001400EC000-memory.dmp

          Filesize

          944KB

        • memory/3424-11-0x0000000140000000-0x00000001400EC000-memory.dmp

          Filesize

          944KB

        • memory/3424-12-0x0000000140000000-0x00000001400EC000-memory.dmp

          Filesize

          944KB

        • memory/3424-24-0x0000000140000000-0x00000001400EC000-memory.dmp

          Filesize

          944KB

        • memory/3424-25-0x00007FFD73DC0000-0x00007FFD73DD0000-memory.dmp

          Filesize

          64KB

        • memory/3424-9-0x0000000140000000-0x00000001400EC000-memory.dmp

          Filesize

          944KB

        • memory/3424-26-0x00007FFD73DB0000-0x00007FFD73DC0000-memory.dmp

          Filesize

          64KB

        • memory/3424-15-0x0000000140000000-0x00000001400EC000-memory.dmp

          Filesize

          944KB

        • memory/3424-3-0x0000000002730000-0x0000000002731000-memory.dmp

          Filesize

          4KB

        • memory/3424-4-0x00007FFD7240A000-0x00007FFD7240B000-memory.dmp

          Filesize

          4KB

        • memory/3424-23-0x0000000000740000-0x0000000000747000-memory.dmp

          Filesize

          28KB

        • memory/3424-14-0x0000000140000000-0x00000001400EC000-memory.dmp

          Filesize

          944KB

        • memory/3424-6-0x0000000140000000-0x00000001400EC000-memory.dmp

          Filesize

          944KB

        • memory/3864-66-0x0000000140000000-0x00000001400ED000-memory.dmp

          Filesize

          948KB

        • memory/3864-61-0x0000020E468F0000-0x0000020E468F7000-memory.dmp

          Filesize

          28KB