Analysis

  • max time kernel
    149s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2024 01:07

General

  • Target

    fb1a305589018230311a426fea737ae107770eddc6441c497d02baac206d7110.dll

  • Size

    1.5MB

  • MD5

    1e9ff1b997f023586284933ba6f950ab

  • SHA1

    c90cc77bfb1453f9840d5687667a494e6fdea326

  • SHA256

    fb1a305589018230311a426fea737ae107770eddc6441c497d02baac206d7110

  • SHA512

    e75cf5e46b652125845a1efe8ab1086c08263c36f18fc103da01e0553b73a7c9601de888c09b940ae61cba1487202039b8e0b7b25e32e4c9286f50b9ef443fb2

  • SSDEEP

    12288:1XBQ3fMQyWV0rbDxyBWZh2TvtgHoiemIKI1ydX7wmqzq3wkgJ:pB/Qn0rbD8UZUDtgIiemI51Mwtewkm

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 11 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Event Triggered Execution: Accessibility Features 1 TTPs

    Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\fb1a305589018230311a426fea737ae107770eddc6441c497d02baac206d7110.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:4656
  • C:\Windows\system32\wlrmdr.exe
    C:\Windows\system32\wlrmdr.exe
    1⤵
      PID:2584
    • C:\Users\Admin\AppData\Local\TEFMK\wlrmdr.exe
      C:\Users\Admin\AppData\Local\TEFMK\wlrmdr.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2280
    • C:\Windows\system32\sdclt.exe
      C:\Windows\system32\sdclt.exe
      1⤵
        PID:1132
      • C:\Users\Admin\AppData\Local\eQmp\sdclt.exe
        C:\Users\Admin\AppData\Local\eQmp\sdclt.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:4108
      • C:\Windows\system32\DisplaySwitch.exe
        C:\Windows\system32\DisplaySwitch.exe
        1⤵
          PID:2504
        • C:\Users\Admin\AppData\Local\bU2hX\DisplaySwitch.exe
          C:\Users\Admin\AppData\Local\bU2hX\DisplaySwitch.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:1940

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\TEFMK\DUI70.dll

          Filesize

          1.8MB

          MD5

          529440e031562a538390c9fb1d8ebeca

          SHA1

          83094164ce5e588996aa49de6a4d3e5e97c92f45

          SHA256

          20e9a10741ea715918a9dc5bc0ad4aa5ad0f2f29bf46e34db9c73ae1099197b6

          SHA512

          8dc6f625fae9b75c06013fc83db705af5358de289763b11c352d1e4fbc9977380237e2297a16663ccbba49c05c4d637459802d8e52f7d874c47677ab5b456f6a

        • C:\Users\Admin\AppData\Local\TEFMK\wlrmdr.exe

          Filesize

          66KB

          MD5

          ef9bba7a637a11b224a90bf90a8943ac

          SHA1

          4747ec6efd2d41e049159249c2d888189bb33d1d

          SHA256

          2fda95aafb2e9284c730bf912b93f60a75b151941adc14445ed1e056140325b1

          SHA512

          4c1fdb8e4bf25546a2a33c95268593746f5ae2666ce36c6d9ba5833357f13720c4722231224e82308af8c156485a2c86ffd97e3093717a28d1300d3787ef1831

        • C:\Users\Admin\AppData\Local\bU2hX\DisplaySwitch.exe

          Filesize

          1.8MB

          MD5

          5338d4beddf23db817eb5c37500b5735

          SHA1

          1b5c56f00b53fca3205ff24770203af46cbc7c54

          SHA256

          8b581f1d15a6920e4ecfe172d8ef753d0a2bf1a47e686a8d5d8e01147fa4c65e

          SHA512

          173170b83e0048ee05da18c0c957744204954da58a93c532b669d62edb632c4c73d0744c13eb864ecf357ff12831aa46c4f2445dc33b62a4547385b9e0297b0c

        • C:\Users\Admin\AppData\Local\bU2hX\WINSTA.dll

          Filesize

          1.5MB

          MD5

          04af209cf02c346bb6f4b0c8c70d0641

          SHA1

          4e8cdc51b8ff59c7fe643561202dcd7ea5fce39c

          SHA256

          62fefacb0f3d72a04566d10c00fdbf9c6920b6172d05c0f3792f1f9ed6d07830

          SHA512

          48a45f794df57d7dab2debaaa52f1088872993b882ac9098692bf91a76fdf4ef6c978ce4c7a2f0fb8848965a57b62bc4496007ba032b311a5f99b65079aaed6d

        • C:\Users\Admin\AppData\Local\eQmp\UxTheme.dll

          Filesize

          1.5MB

          MD5

          76ccfda34510ed3650024e900509a76c

          SHA1

          49099858903ddcbe37033480e4bd16a79dea13f4

          SHA256

          d2f733c968e8faf626740c14c0b7f1fe39a248523f0e72f208a4b2ef008b9d2f

          SHA512

          b916cf8be08e4e62a4fb3c7fed2ee55e627d92bd0f683e0bb06c598f8ff21228618f4c59a0e12fb71685563aeb213255d5a6bb552353349534d48b8614ca9113

        • C:\Users\Admin\AppData\Local\eQmp\sdclt.exe

          Filesize

          1.2MB

          MD5

          e09d48f225e7abcab14ebd3b8a9668ec

          SHA1

          1c5b9322b51c09a407d182df481609f7cb8c425d

          SHA256

          efd238ea79b93d07852d39052f1411618c36e7597e8af0966c4a3223f0021dc3

          SHA512

          384d606b90c4803e5144b4de24edc537cb22dd59336a18a58d229500ed36aec92c8467cae6d3f326647bd044d8074931da553c7809727fb70227e99c257df0b4

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Womuvunldsugi.lnk

          Filesize

          1KB

          MD5

          6ea864378a79b455c5940a983727f589

          SHA1

          c480f47f745765ecaf23cf1418ba035d07888543

          SHA256

          4a2bb53f5b1d5a9bc8068d80ae35a0322c51b7e63f5656c189c34a3116b699e8

          SHA512

          b21c795d0f39b22e7625f947b8b0ed1f789e35136063e5449ba430f384e11cb2718eaa97455283684aa6a5e2f36d45a5068c627abfad7ecb3c47cd870af5b8fb

        • memory/1940-87-0x00007FFBBAE40000-0x00007FFBBAFC1000-memory.dmp

          Filesize

          1.5MB

        • memory/1940-83-0x00007FFBBAE40000-0x00007FFBBAFC1000-memory.dmp

          Filesize

          1.5MB

        • memory/2280-51-0x0000020A83EE0000-0x0000020A83EE7000-memory.dmp

          Filesize

          28KB

        • memory/2280-56-0x00007FFBBAFB0000-0x00007FFBBB175000-memory.dmp

          Filesize

          1.8MB

        • memory/2280-52-0x00007FFBBAFB0000-0x00007FFBBB175000-memory.dmp

          Filesize

          1.8MB

        • memory/3456-21-0x0000000140000000-0x000000014017F000-memory.dmp

          Filesize

          1.5MB

        • memory/3456-18-0x0000000140000000-0x000000014017F000-memory.dmp

          Filesize

          1.5MB

        • memory/3456-15-0x0000000140000000-0x000000014017F000-memory.dmp

          Filesize

          1.5MB

        • memory/3456-13-0x0000000140000000-0x000000014017F000-memory.dmp

          Filesize

          1.5MB

        • memory/3456-11-0x0000000140000000-0x000000014017F000-memory.dmp

          Filesize

          1.5MB

        • memory/3456-10-0x0000000140000000-0x000000014017F000-memory.dmp

          Filesize

          1.5MB

        • memory/3456-17-0x0000000140000000-0x000000014017F000-memory.dmp

          Filesize

          1.5MB

        • memory/3456-14-0x0000000140000000-0x000000014017F000-memory.dmp

          Filesize

          1.5MB

        • memory/3456-12-0x0000000140000000-0x000000014017F000-memory.dmp

          Filesize

          1.5MB

        • memory/3456-8-0x0000000140000000-0x000000014017F000-memory.dmp

          Filesize

          1.5MB

        • memory/3456-7-0x0000000140000000-0x000000014017F000-memory.dmp

          Filesize

          1.5MB

        • memory/3456-6-0x0000000140000000-0x000000014017F000-memory.dmp

          Filesize

          1.5MB

        • memory/3456-3-0x00000000024D0000-0x00000000024D1000-memory.dmp

          Filesize

          4KB

        • memory/3456-4-0x00007FFBCA44A000-0x00007FFBCA44B000-memory.dmp

          Filesize

          4KB

        • memory/3456-9-0x0000000140000000-0x000000014017F000-memory.dmp

          Filesize

          1.5MB

        • memory/3456-16-0x0000000140000000-0x000000014017F000-memory.dmp

          Filesize

          1.5MB

        • memory/3456-19-0x0000000140000000-0x000000014017F000-memory.dmp

          Filesize

          1.5MB

        • memory/3456-41-0x0000000140000000-0x000000014017F000-memory.dmp

          Filesize

          1.5MB

        • memory/3456-20-0x0000000140000000-0x000000014017F000-memory.dmp

          Filesize

          1.5MB

        • memory/3456-22-0x0000000140000000-0x000000014017F000-memory.dmp

          Filesize

          1.5MB

        • memory/3456-31-0x00007FFBCA500000-0x00007FFBCA510000-memory.dmp

          Filesize

          64KB

        • memory/3456-30-0x0000000140000000-0x000000014017F000-memory.dmp

          Filesize

          1.5MB

        • memory/3456-29-0x0000000000380000-0x0000000000387000-memory.dmp

          Filesize

          28KB

        • memory/3456-32-0x00007FFBCA4F0000-0x00007FFBCA500000-memory.dmp

          Filesize

          64KB

        • memory/4108-72-0x00007FFBBAEE0000-0x00007FFBBB060000-memory.dmp

          Filesize

          1.5MB

        • memory/4108-68-0x00007FFBBAEE0000-0x00007FFBBB060000-memory.dmp

          Filesize

          1.5MB

        • memory/4108-67-0x000001DB3C0D0000-0x000001DB3C0D7000-memory.dmp

          Filesize

          28KB

        • memory/4656-1-0x00007FFBACEB0000-0x00007FFBAD02F000-memory.dmp

          Filesize

          1.5MB

        • memory/4656-44-0x00007FFBACEB0000-0x00007FFBAD02F000-memory.dmp

          Filesize

          1.5MB

        • memory/4656-0-0x00000243B1320000-0x00000243B1327000-memory.dmp

          Filesize

          28KB