Analysis

  • max time kernel
    149s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2024 07:25

General

  • Target

    82327bfb11e761ca805df5a092ba2ee85eb43c3a7dbd78201a0e807899f6b91d.dll

  • Size

    1.1MB

  • MD5

    a7c11f9f36da43856f66e495b91c872e

  • SHA1

    6f91468a4e72bc1e07d9016b24c2427c41de5188

  • SHA256

    82327bfb11e761ca805df5a092ba2ee85eb43c3a7dbd78201a0e807899f6b91d

  • SHA512

    84c59a7cda2989deeeba7a229edd23181ce6aec1928580e10ad015e9c9cdce071aef242b956c9a6504435e8c7f026cb6a33a46942a92cd0cd12ff923033e68d3

  • SSDEEP

    12288:9kMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64C:9kMZ+gf4ltGd8H1fYO0q2G1Ah

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 9 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Event Triggered Execution: Accessibility Features 1 TTPs

    Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\82327bfb11e761ca805df5a092ba2ee85eb43c3a7dbd78201a0e807899f6b91d.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2792
  • C:\Windows\system32\lpksetup.exe
    C:\Windows\system32\lpksetup.exe
    1⤵
      PID:2492
    • C:\Users\Admin\AppData\Local\eqfeUdWwl\lpksetup.exe
      C:\Users\Admin\AppData\Local\eqfeUdWwl\lpksetup.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2536
    • C:\Windows\system32\DisplaySwitch.exe
      C:\Windows\system32\DisplaySwitch.exe
      1⤵
        PID:568
      • C:\Users\Admin\AppData\Local\HGIpTC\DisplaySwitch.exe
        C:\Users\Admin\AppData\Local\HGIpTC\DisplaySwitch.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:992
      • C:\Windows\system32\wextract.exe
        C:\Windows\system32\wextract.exe
        1⤵
          PID:2704
        • C:\Users\Admin\AppData\Local\zWM\wextract.exe
          C:\Users\Admin\AppData\Local\zWM\wextract.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:2668

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\HGIpTC\slc.dll

          Filesize

          1.1MB

          MD5

          9e475f1a558b43b190fcc6903d1ac80a

          SHA1

          c883a1dff9563d1b5975350f3552e94ed7c1d959

          SHA256

          40068c3a27ab5616b881a8a225d83d46f4781594005a92648b2867560fe15c6c

          SHA512

          892f0dc9f2927fd986a2c5256dd9044cd8c1d52b5c5600a60478581252d1bac5ed457f5dbd28146d9b9e2b2d48efe3be6e53a55bfb983ace4675ed0a9d5304ac

        • C:\Users\Admin\AppData\Local\eqfeUdWwl\slc.dll

          Filesize

          1.1MB

          MD5

          14613bdc7bfa543470939575af73fbbf

          SHA1

          760d8b0dce33dbd7b871e3565282f23c41d965b7

          SHA256

          9385e339a93e7f32fcb2dcc99563e17734eae9a6f5d6b326919e079a8fdb90e8

          SHA512

          720a5686e6f8c637f96d604d93220cb64ed3d00438ffc610aa8b15d1cdf88b36c78a78d02d302437e6907aee1a213d5d2558000e0a51d061d9fff66eea634c25

        • C:\Users\Admin\AppData\Local\zWM\VERSION.dll

          Filesize

          1.1MB

          MD5

          04777408972fb8f2cb2d6fb8a5367dda

          SHA1

          e6df8551043a187c3259aa9b7d35f04130cbb625

          SHA256

          faba4153d688b6e310981db6e3489736bd0a72120d0e971a877c1b8e27c020e5

          SHA512

          3d4693b53a046b5b4f35b53db0fa0a2113fc5df714654257636427ae283bd28bf93b0e4fc0405b3cd7e6bf78666baad2308c05a8964cd6c7cd5975de2a8e4ffd

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Lcuygmmobxhxaxh.lnk

          Filesize

          1KB

          MD5

          d4a445c7420385c1f792ccb07678f177

          SHA1

          52b8db003191c7900bc2086d6fda51d2a3397be8

          SHA256

          6429299dae3366a9c3b57456fa4a544aaaeecd741bf343fef3293a8de30a0fcf

          SHA512

          8923fd07bb8451dff59a87dc5216eb58c7ad3f05785164622b70bf7b374617fd6a7e66241c6172309bacefd38a283f5305e0f2444cece567b0f256d88c7922db

        • \Users\Admin\AppData\Local\HGIpTC\DisplaySwitch.exe

          Filesize

          517KB

          MD5

          b795e6138e29a37508285fc31e92bd78

          SHA1

          d0fe0c38c7c61adbb77e58d48b96cd4bf98ecd4a

          SHA256

          01a9733871baa8518092bade3fce62dcca14cdf6fc55b98218253580b38d7659

          SHA512

          8312174a77bab5fef7c4e9efff66c43d3515b02f5766ed1d3b9bd0abb3d7344a9a22cbac228132098428c122293d2b1898b3a2d75f5e4247b1dcb9aa9c7913b1

        • \Users\Admin\AppData\Local\eqfeUdWwl\lpksetup.exe

          Filesize

          638KB

          MD5

          50d28f3f8b7c17056520c80a29efe17c

          SHA1

          1b1e62be0a0bdc9aec2e91842c35381297d8f01e

          SHA256

          71613ea48467d1a0b00f8bcaed270b7527fc5771f540a8eb0515b3a5fdc8604f

          SHA512

          92bc60402aacf1a62e47335adf8696a5c0d31637e624628d82b6ec1f17e1ee65ae8edf7e8dcd10933f59c892a4a74d8e461945df0991b706a4a53927c5fd3861

        • \Users\Admin\AppData\Local\zWM\wextract.exe

          Filesize

          140KB

          MD5

          1ea6500c25a80e8bdb65099c509af993

          SHA1

          6a090ef561feb4ae1c6794de5b19c5e893c4aafc

          SHA256

          99123d4e7bf93aa7f3315a432307c8b0cbaf24ad2cfb46edc149edbe24de4ca2

          SHA512

          b8f9f1ab48671e382d1385c34f0f19fc52fc0061e00db53bbbc2cdaee6d8a3f245707329f98e9167c53721aeaddcebfe66632729b6bcc98892031fd9914fb1fb

        • memory/992-75-0x0000000140000000-0x000000014011E000-memory.dmp

          Filesize

          1.1MB

        • memory/992-70-0x0000000000190000-0x0000000000197000-memory.dmp

          Filesize

          28KB

        • memory/1176-9-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1176-8-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1176-24-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1176-13-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1176-12-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1176-11-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1176-10-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1176-3-0x0000000077BC6000-0x0000000077BC7000-memory.dmp

          Filesize

          4KB

        • memory/1176-23-0x0000000002ED0000-0x0000000002ED7000-memory.dmp

          Filesize

          28KB

        • memory/1176-35-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1176-36-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1176-4-0x0000000002EF0000-0x0000000002EF1000-memory.dmp

          Filesize

          4KB

        • memory/1176-45-0x0000000077BC6000-0x0000000077BC7000-memory.dmp

          Filesize

          4KB

        • memory/1176-26-0x0000000077E60000-0x0000000077E62000-memory.dmp

          Filesize

          8KB

        • memory/1176-14-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1176-6-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1176-7-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1176-25-0x0000000077E30000-0x0000000077E32000-memory.dmp

          Filesize

          8KB

        • memory/1176-15-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/2536-58-0x0000000140000000-0x000000014011E000-memory.dmp

          Filesize

          1.1MB

        • memory/2536-54-0x0000000140000000-0x000000014011E000-memory.dmp

          Filesize

          1.1MB

        • memory/2536-53-0x0000000000100000-0x0000000000107000-memory.dmp

          Filesize

          28KB

        • memory/2668-91-0x0000000140000000-0x000000014011E000-memory.dmp

          Filesize

          1.1MB

        • memory/2792-44-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/2792-1-0x0000000000290000-0x0000000000297000-memory.dmp

          Filesize

          28KB

        • memory/2792-0-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB