Analysis

  • max time kernel
    149s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2024 02:07

General

  • Target

    e661ee88d2b42533974dbaf54bd50d687c83bc35e2110e3aac9dbf40358d5cf8.dll

  • Size

    1.3MB

  • MD5

    c1149d0d1cd46a9b3eb35371b41c4a63

  • SHA1

    9001ee8245fd45cfdf537afc41cdf6338fe66928

  • SHA256

    e661ee88d2b42533974dbaf54bd50d687c83bc35e2110e3aac9dbf40358d5cf8

  • SHA512

    448fb9b0e378ce4c33fc691343e6b0e1aba4f12b17f0e960d3a575ec9ac3a9d59e9972072d222c3f615433fb58cadfad85f7433a6abf43042fd53e36f18f6dba

  • SSDEEP

    12288:BXBQ3fMQyWV0rbDxyBWZh2TvtgHoiemIKI1ydX7wmqzq3wkgJ:9B/Qn0rbD8UZUDtgIiemI51Mwtewkm

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 11 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\e661ee88d2b42533974dbaf54bd50d687c83bc35e2110e3aac9dbf40358d5cf8.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:3168
  • C:\Windows\system32\RecoveryDrive.exe
    C:\Windows\system32\RecoveryDrive.exe
    1⤵
      PID:3552
    • C:\Users\Admin\AppData\Local\kfmx0HzUc\RecoveryDrive.exe
      C:\Users\Admin\AppData\Local\kfmx0HzUc\RecoveryDrive.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2392
    • C:\Windows\system32\rdpclip.exe
      C:\Windows\system32\rdpclip.exe
      1⤵
        PID:2904
      • C:\Users\Admin\AppData\Local\gNJDBaYYf\rdpclip.exe
        C:\Users\Admin\AppData\Local\gNJDBaYYf\rdpclip.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:324
      • C:\Windows\system32\ie4uinit.exe
        C:\Windows\system32\ie4uinit.exe
        1⤵
          PID:3396
        • C:\Users\Admin\AppData\Local\90O8QWarG\ie4uinit.exe
          C:\Users\Admin\AppData\Local\90O8QWarG\ie4uinit.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:3924

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\90O8QWarG\VERSION.dll

          Filesize

          1.3MB

          MD5

          1bfd74902fee3728fd986e43075ec7a2

          SHA1

          5df744990a6a366851ba304f6319a70aeb92ffe7

          SHA256

          564baa64010279c02ff7548f34661480a7f5266c96567a62d63073f15c7f6700

          SHA512

          c07d025e58b13dede73456a92faceab75755dda242a0671edc93c17decf23fa27707a9daf46b9a6691b646121c399cfb73a3e58470285c893b758971528bffa6

        • C:\Users\Admin\AppData\Local\90O8QWarG\ie4uinit.exe

          Filesize

          262KB

          MD5

          a2f0104edd80ca2c24c24356d5eacc4f

          SHA1

          8269b9fd9231f04ed47419bd565c69dc677fab56

          SHA256

          5d85c4d62cc26996826b9d96a9153f7e05a2260342bd913b3730610a1809203c

          SHA512

          e7bb87f9f6c82cb945b95f62695be98b3fa827a24fa8c4187fe836d4e7d3e7ae3b95101edd3c41d65f6cb684910f5954a67307d450072acd8d475212db094390

        • C:\Users\Admin\AppData\Local\gNJDBaYYf\WINSTA.dll

          Filesize

          1.3MB

          MD5

          f1f3095b7fbbe102f6093126bab27856

          SHA1

          b6c6cbc7496e56973693676de31bccc64e50ff0d

          SHA256

          c23aff6cc69c0ba698567c08d8d63cb3201eefddc930815704a855da552b3fea

          SHA512

          c294274f2c197e17cae8b5f3dc5f850add2fab5afac7d695e552cc380b39fc19eec6b42dc41beba66f5d3bff9f36647084b47adff06f639ef66bfa889a83a8ab

        • C:\Users\Admin\AppData\Local\gNJDBaYYf\rdpclip.exe

          Filesize

          446KB

          MD5

          a52402d6bd4e20a519a2eeec53332752

          SHA1

          129f2b6409395ef877b9ca39dd819a2703946a73

          SHA256

          9d5be181d9309dea98039d2ce619afe745fc8a9a1b1c05cf860b3620b5203308

          SHA512

          632dda67066cff2b940f27e3f409e164684994a02bda57d74e958c462b9a0963e922be4a487c06126cecc9ef34d34913ef8315524bf8422f83c0c135b8af924e

        • C:\Users\Admin\AppData\Local\kfmx0HzUc\RecoveryDrive.exe

          Filesize

          911KB

          MD5

          b9b3dc6f2eb89e41ff27400952602c74

          SHA1

          24ae07e0db3ace0809d08bbd039db3a9d533e81b

          SHA256

          630518cb2e4636f889d12c98fb2e6be4e579c5eeb86f88695d3f7fff3f5515c4

          SHA512

          7906954b881f1051a0c7f098e096bc28eddcc48643b8bf3134dd57b8c18d8beba4f9a0ac5d348de2f9b8ea607c3e9cb0e61d91e4f3ba1fefb02839f928e3e3fe

        • C:\Users\Admin\AppData\Local\kfmx0HzUc\UxTheme.dll

          Filesize

          1.3MB

          MD5

          e8238f3c86abc592c8d1db2d1e58d699

          SHA1

          3becce3915a056bd1fd1134e516d8213e8cf48f6

          SHA256

          4b6b3ccb8c66e509727751bb15bbd2a112e070db509b3274b90c4e37fb1688ad

          SHA512

          48d5f3a02d7d5ece1085c7708755e8d265b14339dac7bc434fbb6c47deda5a818eb8beb758bc30d22e27aa45d5ec24befe730d3168b6a4522bf2df83351c3723

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Eswctkc.lnk

          Filesize

          1KB

          MD5

          34143349e03d58732437382b16effb8e

          SHA1

          4307e6d396ea3513571af81b6559d8d886dffd29

          SHA256

          4e7658ed573afcacb9de2ca98f063533eba927d1904a38cc0f81da948c083033

          SHA512

          354289179e4a95e745c36311824a5c7c9e270aa7095090b94742f3c47268c112983bc05bffbd234ed6687e3d6126f7af76f939b257a3a91af37dcac04a364582

        • memory/324-67-0x00007FFE93D30000-0x00007FFE93E7C000-memory.dmp

          Filesize

          1.3MB

        • memory/324-66-0x00000167FC010000-0x00000167FC017000-memory.dmp

          Filesize

          28KB

        • memory/324-71-0x00007FFE93D30000-0x00007FFE93E7C000-memory.dmp

          Filesize

          1.3MB

        • memory/2392-55-0x00007FFE93C10000-0x00007FFE93D5B000-memory.dmp

          Filesize

          1.3MB

        • memory/2392-50-0x000002C0A11D0000-0x000002C0A11D7000-memory.dmp

          Filesize

          28KB

        • memory/2392-52-0x00007FFE93C10000-0x00007FFE93D5B000-memory.dmp

          Filesize

          1.3MB

        • memory/3168-43-0x00007FFE939B0000-0x00007FFE93AFA000-memory.dmp

          Filesize

          1.3MB

        • memory/3168-1-0x00007FFE939B0000-0x00007FFE93AFA000-memory.dmp

          Filesize

          1.3MB

        • memory/3168-0-0x000001A49FA70000-0x000001A49FA77000-memory.dmp

          Filesize

          28KB

        • memory/3412-19-0x0000000140000000-0x000000014014A000-memory.dmp

          Filesize

          1.3MB

        • memory/3412-16-0x0000000140000000-0x000000014014A000-memory.dmp

          Filesize

          1.3MB

        • memory/3412-7-0x0000000140000000-0x000000014014A000-memory.dmp

          Filesize

          1.3MB

        • memory/3412-17-0x0000000140000000-0x000000014014A000-memory.dmp

          Filesize

          1.3MB

        • memory/3412-6-0x0000000140000000-0x000000014014A000-memory.dmp

          Filesize

          1.3MB

        • memory/3412-14-0x0000000140000000-0x000000014014A000-memory.dmp

          Filesize

          1.3MB

        • memory/3412-11-0x0000000140000000-0x000000014014A000-memory.dmp

          Filesize

          1.3MB

        • memory/3412-5-0x00007FFEA0FDA000-0x00007FFEA0FDB000-memory.dmp

          Filesize

          4KB

        • memory/3412-3-0x0000000002540000-0x0000000002541000-memory.dmp

          Filesize

          4KB

        • memory/3412-8-0x0000000140000000-0x000000014014A000-memory.dmp

          Filesize

          1.3MB

        • memory/3412-12-0x0000000140000000-0x000000014014A000-memory.dmp

          Filesize

          1.3MB

        • memory/3412-13-0x0000000140000000-0x000000014014A000-memory.dmp

          Filesize

          1.3MB

        • memory/3412-15-0x0000000140000000-0x000000014014A000-memory.dmp

          Filesize

          1.3MB

        • memory/3412-20-0x0000000140000000-0x000000014014A000-memory.dmp

          Filesize

          1.3MB

        • memory/3412-18-0x0000000140000000-0x000000014014A000-memory.dmp

          Filesize

          1.3MB

        • memory/3412-21-0x0000000140000000-0x000000014014A000-memory.dmp

          Filesize

          1.3MB

        • memory/3412-29-0x0000000140000000-0x000000014014A000-memory.dmp

          Filesize

          1.3MB

        • memory/3412-28-0x0000000000B30000-0x0000000000B37000-memory.dmp

          Filesize

          28KB

        • memory/3412-30-0x00007FFEA2C20000-0x00007FFEA2C30000-memory.dmp

          Filesize

          64KB

        • memory/3412-31-0x00007FFEA2C10000-0x00007FFEA2C20000-memory.dmp

          Filesize

          64KB

        • memory/3412-40-0x0000000140000000-0x000000014014A000-memory.dmp

          Filesize

          1.3MB

        • memory/3412-9-0x0000000140000000-0x000000014014A000-memory.dmp

          Filesize

          1.3MB

        • memory/3412-10-0x0000000140000000-0x000000014014A000-memory.dmp

          Filesize

          1.3MB

        • memory/3924-87-0x00007FFE93D30000-0x00007FFE93E7B000-memory.dmp

          Filesize

          1.3MB

        • memory/3924-83-0x00007FFE93D30000-0x00007FFE93E7B000-memory.dmp

          Filesize

          1.3MB