Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2024 20:21

General

  • Target

    1e4aed6e957b55dad4f63b7d5f44cb8ce6a7216b6ad4e51d971d307007ed3d2a.dll

  • Size

    940KB

  • MD5

    e6ffe9204f9d5606d662bf6f355c3863

  • SHA1

    1632dfd22740045fad5a1fa5149cde3eb694ae7c

  • SHA256

    1e4aed6e957b55dad4f63b7d5f44cb8ce6a7216b6ad4e51d971d307007ed3d2a

  • SHA512

    e08cde0affdc24597bd0bbde592fb78afcba4b187d25d3bb0b72949b3a2825c5f8e62d1ef8cf23ce495167517f16516d7448909b538085101c317845b3159ea3

  • SSDEEP

    12288:CPVKLvdxQPKSoVXxTaGcb68Uzx2TBeOWhZJpK8:CtKTrsKSKBTSb6DUXWq8

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 9 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1e4aed6e957b55dad4f63b7d5f44cb8ce6a7216b6ad4e51d971d307007ed3d2a.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2068
  • C:\Windows\system32\WindowsActionDialog.exe
    C:\Windows\system32\WindowsActionDialog.exe
    1⤵
      PID:4984
    • C:\Users\Admin\AppData\Local\Kwvkl\WindowsActionDialog.exe
      C:\Users\Admin\AppData\Local\Kwvkl\WindowsActionDialog.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:4968
    • C:\Windows\system32\CloudNotifications.exe
      C:\Windows\system32\CloudNotifications.exe
      1⤵
        PID:4992
      • C:\Users\Admin\AppData\Local\FDaBzoE\CloudNotifications.exe
        C:\Users\Admin\AppData\Local\FDaBzoE\CloudNotifications.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:3836
      • C:\Windows\system32\DmNotificationBroker.exe
        C:\Windows\system32\DmNotificationBroker.exe
        1⤵
          PID:3092
        • C:\Users\Admin\AppData\Local\G3Aw\DmNotificationBroker.exe
          C:\Users\Admin\AppData\Local\G3Aw\DmNotificationBroker.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:3448

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\FDaBzoE\CloudNotifications.exe

          Filesize

          59KB

          MD5

          b50dca49bc77046b6f480db6444c3d06

          SHA1

          cc9b38240b0335b1763badcceac37aa9ce547f9e

          SHA256

          96e7e1a3f0f4f6fc6bda3527ab8a739d6dfcab8e534aa7a02b023daebb3c0775

          SHA512

          2a0504ca336e86b92b2f5eff1c458ebd9df36c496331a7247ef0bb8b82eabd86ade7559ddb47ca4169e8365a97e80e5f1d3c1fc330364dea2450608bd692b1d3

        • C:\Users\Admin\AppData\Local\FDaBzoE\UxTheme.dll

          Filesize

          944KB

          MD5

          afbe5299ab8b5be8cde2226dce48d801

          SHA1

          5348707f717c5c7f28fcb3faab75b77ecab8ab58

          SHA256

          3f0f06d1f0a41183103d735c220c00acc983120a23ad95fc9adaffdabf968d71

          SHA512

          a3999c7d826f3da94148d07c61429f2f61f3fa32c3d227be5590cd89b1b9fd13eeb68c51293c0b5f0fa6ad8e88c57db9178fb39b0acad8df65d2def1c5a2831d

        • C:\Users\Admin\AppData\Local\G3Aw\DUI70.dll

          Filesize

          1.2MB

          MD5

          31eb77a645f86941c19237a3fc82761d

          SHA1

          d69c36f789ed0019cb22dbdc9613b948449ee9c8

          SHA256

          a51bfe5379d1473f3fae51d44191d7e2e209ea6309bb27fcc4ec642e2c6fb9c8

          SHA512

          53d3bf03646511518ced02f2eec5f203a4bd2429ca5239d80b1d33f378d3be354ae4f6310dd9cfbb640c4d78bbfe11b22ad80ec6d2020a7766119505197f08e0

        • C:\Users\Admin\AppData\Local\G3Aw\DmNotificationBroker.exe

          Filesize

          32KB

          MD5

          f0bdc20540d314a2aad951c7e2c88420

          SHA1

          4ab344595a4a81ab5f31ed96d72f217b4cee790b

          SHA256

          f87537e5f26193a2273380f86cc9ac16d977f65b0eff2435e40be830fd99f7b5

          SHA512

          cb69e35b2954406735264a4ae8fe1eca1bd4575f553ab2178c70749ab997bda3c06496d2fce97872c51215a19093e51eea7cc8971af62ad9d5726f3a0d2730aa

        • C:\Users\Admin\AppData\Local\Kwvkl\DUI70.dll

          Filesize

          1.2MB

          MD5

          5c6d78f760567f2286b37cf859fde093

          SHA1

          e7a4d21bc2904c6bbb7dab0f405161be81589421

          SHA256

          9f1e4673f24484ef5c3bce5f93e89a1cdbd1de67e44197d82ad813c531feaa21

          SHA512

          0276d0619a2d22f3c0879c32ec33f8def384e77261fbc694aea4c84d41479ce097b0f65e2231ba1421c40c8c838705e008d43ed68b62ad10d1f6d1b26c836f02

        • C:\Users\Admin\AppData\Local\Kwvkl\WindowsActionDialog.exe

          Filesize

          61KB

          MD5

          73c523b6556f2dc7eefc662338d66f8d

          SHA1

          1e6f9a1d885efa4d76f1e7a8be2e974f2b65cea5

          SHA256

          0c6397bfbcd7b1fcefb6de01a506578e36651725a61078c69708f1f92c41ea31

          SHA512

          69d0f23d1abaad657dd4672532936ef35f0e9d443caf9e19898017656a66ed46e75e7e05261c7e7636799c58feccd01dc93975d6a598cbb73242ddb48c6ec912

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Zugrajzkhopu.lnk

          Filesize

          1KB

          MD5

          9a24274b7fb9f87ec46443d99c4fb1ba

          SHA1

          9e3748c6bea520bb20d80435c4ee8ee37ee2e0a0

          SHA256

          e69ea2ae588d0aa17b9911423fc6f109981c3870f3e282d62e7d07583923a09f

          SHA512

          6e96aed0a4fd5b301b212535fc9d592de1c1a6f92606a45bdaf8149b8f74fab4228eb17dd50fde969c7a874fde2638c0075e296e5989a9d3383ecc77570fcea5

        • memory/2068-0-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/2068-2-0x000001A3D2150000-0x000001A3D2157000-memory.dmp

          Filesize

          28KB

        • memory/2068-38-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/3432-9-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/3432-15-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/3432-24-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/3432-12-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/3432-11-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/3432-10-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/3432-25-0x00007FFDDEB40000-0x00007FFDDEB50000-memory.dmp

          Filesize

          64KB

        • memory/3432-7-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/3432-6-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/3432-26-0x00007FFDDEB30000-0x00007FFDDEB40000-memory.dmp

          Filesize

          64KB

        • memory/3432-13-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/3432-35-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/3432-4-0x00007FFDDE47A000-0x00007FFDDE47B000-memory.dmp

          Filesize

          4KB

        • memory/3432-3-0x0000000002A80000-0x0000000002A81000-memory.dmp

          Filesize

          4KB

        • memory/3432-8-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/3432-23-0x0000000002690000-0x0000000002697000-memory.dmp

          Filesize

          28KB

        • memory/3432-14-0x0000000140000000-0x00000001400EB000-memory.dmp

          Filesize

          940KB

        • memory/3448-81-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/3836-61-0x000002DA02830000-0x000002DA02837000-memory.dmp

          Filesize

          28KB

        • memory/3836-62-0x0000000140000000-0x00000001400EC000-memory.dmp

          Filesize

          944KB

        • memory/3836-66-0x0000000140000000-0x00000001400EC000-memory.dmp

          Filesize

          944KB

        • memory/4968-50-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/4968-46-0x0000000140000000-0x0000000140131000-memory.dmp

          Filesize

          1.2MB

        • memory/4968-45-0x00000175E1000000-0x00000175E1007000-memory.dmp

          Filesize

          28KB