Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2024 07:30

General

  • Target

    8348572110a99fe14e9b92ed34dfd3b5ae924110a02d9baed3061a23955c310d.dll

  • Size

    1.1MB

  • MD5

    d21a8a43c577339b6a431daa03dfe6c1

  • SHA1

    010199366ab7b43d93df5e690e72c8e62b2efd99

  • SHA256

    8348572110a99fe14e9b92ed34dfd3b5ae924110a02d9baed3061a23955c310d

  • SHA512

    d73918a13b8705d3b37eb2adf36eb11c1243517d8aee3b479d2bb00bd4bf96001f6f8b006ab1db6221e2082b02ed14545ece1e7cbbf8d773eb0083caba4e0b4e

  • SSDEEP

    12288:hkMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64C:hkMZ+gf4ltGd8H1fYO0q2G1Ah

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 10 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\8348572110a99fe14e9b92ed34dfd3b5ae924110a02d9baed3061a23955c310d.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2324
  • C:\Windows\system32\AdapterTroubleshooter.exe
    C:\Windows\system32\AdapterTroubleshooter.exe
    1⤵
      PID:2836
    • C:\Users\Admin\AppData\Local\5IxnE\AdapterTroubleshooter.exe
      C:\Users\Admin\AppData\Local\5IxnE\AdapterTroubleshooter.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2944
    • C:\Windows\system32\xpsrchvw.exe
      C:\Windows\system32\xpsrchvw.exe
      1⤵
        PID:2712
      • C:\Users\Admin\AppData\Local\ZdmXTu0V\xpsrchvw.exe
        C:\Users\Admin\AppData\Local\ZdmXTu0V\xpsrchvw.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:3064
      • C:\Windows\system32\wusa.exe
        C:\Windows\system32\wusa.exe
        1⤵
          PID:2756
        • C:\Users\Admin\AppData\Local\4Soh6GGK\wusa.exe
          C:\Users\Admin\AppData\Local\4Soh6GGK\wusa.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:2056

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\4Soh6GGK\dpx.dll

          Filesize

          1.1MB

          MD5

          3648e53d055f6cac4bff1f9bf520358d

          SHA1

          d87122ab8d4b42a48159c53592537eb22cfba044

          SHA256

          99ae7b01478681403f57238c9e6d0d6cc81dc7f19223823dcf7c78d0e3216c91

          SHA512

          645b6bfee581b14a69749d47831ae74e69b39da6200f15729f1e79590e94d5c92e65bc686d6bebed73419299d1a7f0d444eb02c70f5885954b636107d8c003ec

        • C:\Users\Admin\AppData\Local\5IxnE\d3d9.dll

          Filesize

          1.1MB

          MD5

          4cedd2ae5dd95b245d5c7fcae30080c2

          SHA1

          08c05d00fcdcde24b61c7fb7931260e8779ba193

          SHA256

          246397541e0714ee56e6f0564122da6e074ecc7481e09cb368bd6410fd16d71e

          SHA512

          38a1caac13eb8caf98705a25409414ee02a467cee4be9ba6a37595bbcc8e1b8c0654afcdc758648a71f36159716870f3278567200db9f995ee72d3a01fcfd5f3

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Ykefwsdudlbqds.lnk

          Filesize

          1KB

          MD5

          233220e4a8a3acbf18a701102491e805

          SHA1

          e2642f4103a363b4d0193e21327577688d250834

          SHA256

          e125b77a690b53062fe59f7099bdfb9c1454d380f2ed36d4691ee57778c72c3f

          SHA512

          c60569a8c9ce48426986bfc36fd02fe88453349698e55b6c71810eaa82ee63f6e6c01012d92e5adaf1569caa5d6ce8da4312b16a8bbd5b863b1e3b28fd0f2685

        • \Users\Admin\AppData\Local\4Soh6GGK\wusa.exe

          Filesize

          300KB

          MD5

          c15b3d813f4382ade98f1892350f21c7

          SHA1

          a45c5abc6751bc8b9041e5e07923fa4fc1b4542b

          SHA256

          8f067da98eb3ea9f1db2f0063ff54e07d992fbf051779b467e222639be4127e3

          SHA512

          6d028fe81fe45d0ef291741513ecf939e412912647347d4d5bad89571f33e1084dc0fd26eb7313c7191f938c3f50243f453e2690e2475fc3f5539a20c2ff2f3c

        • \Users\Admin\AppData\Local\5IxnE\AdapterTroubleshooter.exe

          Filesize

          39KB

          MD5

          d4170c9ff5b2f85b0ce0246033d26919

          SHA1

          a76118e8775e16237cf00f2fb79718be0dc84db1

          SHA256

          d05e010a2570cdd5a67f62c99483aeeecb6a8d5ecc523cd49b158a460c9be5da

          SHA512

          9c85a9ea4002bd55cf9c51e470dd1bec527ff04b5d0d6f83094a998c541416cd47c9f42c6ca7e35ffa2842877f79e3c2e989489b9bf81644c5c57bb406b89608

        • \Users\Admin\AppData\Local\ZdmXTu0V\WINMM.dll

          Filesize

          1.1MB

          MD5

          1e5ede0b941252388dc2c7243a68fba2

          SHA1

          221281ad6718d3d168229b55264b771a780102f2

          SHA256

          25722eaced3f48fe512929fb65e419ba4d4ea8f034a3b6ee3eb996b8e91f73ed

          SHA512

          a9604e40e7dc9f2d3431e1d19b12da541fc822c1608d8e5d3f6ff7746da08aea8b64bb5e73f46ceecac2e2a121ec36cddda5e0d7d4df34fa35aa75f5eac30825

        • \Users\Admin\AppData\Local\ZdmXTu0V\xpsrchvw.exe

          Filesize

          4.6MB

          MD5

          492cb6a624d5dad73ee0294b5db37dd6

          SHA1

          e74806af04a5147ccabfb5b167eb95a0177c43b3

          SHA256

          ccb4ecd48561ce024ea176b7036f0f2713b98bc82aa37347a30d8187762a8784

          SHA512

          63bf2931764efe767fb42f9576702dd585a032f74ad2be2481eaf309f34950f05974d77b5cb220a3ff89c92af0c7693dc558f8e3a3ee2a0be6c5c07171d03835

        • memory/1208-26-0x0000000077DC0000-0x0000000077DC2000-memory.dmp

          Filesize

          8KB

        • memory/1208-15-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1208-13-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1208-12-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1208-11-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1208-10-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1208-8-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1208-24-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1208-7-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1208-6-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1208-25-0x0000000077D90000-0x0000000077D92000-memory.dmp

          Filesize

          8KB

        • memory/1208-35-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1208-36-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1208-9-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1208-45-0x0000000077A26000-0x0000000077A27000-memory.dmp

          Filesize

          4KB

        • memory/1208-23-0x00000000024E0000-0x00000000024E7000-memory.dmp

          Filesize

          28KB

        • memory/1208-14-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1208-3-0x0000000077A26000-0x0000000077A27000-memory.dmp

          Filesize

          4KB

        • memory/1208-4-0x0000000002500000-0x0000000002501000-memory.dmp

          Filesize

          4KB

        • memory/2056-90-0x0000000140000000-0x000000014011E000-memory.dmp

          Filesize

          1.1MB

        • memory/2324-44-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/2324-2-0x0000000000110000-0x0000000000117000-memory.dmp

          Filesize

          28KB

        • memory/2324-0-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/2944-58-0x0000000140000000-0x000000014011E000-memory.dmp

          Filesize

          1.1MB

        • memory/2944-54-0x0000000140000000-0x000000014011E000-memory.dmp

          Filesize

          1.1MB

        • memory/2944-53-0x0000000000100000-0x0000000000107000-memory.dmp

          Filesize

          28KB

        • memory/3064-70-0x0000000140000000-0x000000014011F000-memory.dmp

          Filesize

          1.1MB

        • memory/3064-74-0x0000000140000000-0x000000014011F000-memory.dmp

          Filesize

          1.1MB