Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2024 14:27

General

  • Target

    4bc9550e00f42cfe69cc3750a41fc7d91ddcf9a48017301742fb8f4ba472e1e3.dll

  • Size

    1.1MB

  • MD5

    406c44e26b3195a9d4fdc75506e5d5ef

  • SHA1

    28abcfeeda814a917380d166fcd0aa8671fc4628

  • SHA256

    4bc9550e00f42cfe69cc3750a41fc7d91ddcf9a48017301742fb8f4ba472e1e3

  • SHA512

    80f7ea16ae8b1c674c80f87da2ebfbac1b4f952eb382e6ff2b7e2ebf53a7088ef13df3d92dad5aa15d698f0370138b784dc38f3ba3d02211bfc6eb42e6e780f6

  • SSDEEP

    12288:hkMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64C:hkMZ+gf4ltGd8H1fYO0q2G1Ah

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 9 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\4bc9550e00f42cfe69cc3750a41fc7d91ddcf9a48017301742fb8f4ba472e1e3.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2080
  • C:\Windows\system32\dvdupgrd.exe
    C:\Windows\system32\dvdupgrd.exe
    1⤵
      PID:2604
    • C:\Users\Admin\AppData\Local\B0dC4\dvdupgrd.exe
      C:\Users\Admin\AppData\Local\B0dC4\dvdupgrd.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious behavior: EnumeratesProcesses
      PID:2556
    • C:\Windows\system32\iexpress.exe
      C:\Windows\system32\iexpress.exe
      1⤵
        PID:1112
      • C:\Users\Admin\AppData\Local\3yVjz\iexpress.exe
        C:\Users\Admin\AppData\Local\3yVjz\iexpress.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:2944
      • C:\Windows\system32\spinstall.exe
        C:\Windows\system32\spinstall.exe
        1⤵
          PID:556
        • C:\Users\Admin\AppData\Local\Z3jXzsV\spinstall.exe
          C:\Users\Admin\AppData\Local\Z3jXzsV\spinstall.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:2820

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\3yVjz\VERSION.dll

          Filesize

          1.1MB

          MD5

          296b3250705f2ced2a8dd1d80ea17075

          SHA1

          dd7ae8ad64283974a8fe222fab6baa62522ac071

          SHA256

          344ef7ce68eb90035325c459d85cd8c507ff41db561d827c784467fc6b3bab2b

          SHA512

          47f43693a0ab4af050b8cf04361108609cbacf1a0901290f19c7ffb2ed7f2eb7b5c735a44b5f48e73bafc4466c63e61cc06ac604d5b42548198449a3f9023249

        • C:\Users\Admin\AppData\Local\3yVjz\iexpress.exe

          Filesize

          163KB

          MD5

          46fd16f9b1924a2ea8cd5c6716cc654f

          SHA1

          99284bc91cf829e9602b4b95811c1d72977700b6

          SHA256

          9f993a1f6a133fa8375eab99bf1710471dd13ef177ef713acf8921fb4ff565a3

          SHA512

          52c91043f514f3f8ce07f8e60357786eb7236fcf6cdcccca0dd76000b9a23d6b138cebcdec53b01823cb2313ec850fc7bece326ec01d44ed33f4052b789b7629

        • C:\Users\Admin\AppData\Local\B0dC4\VERSION.dll

          Filesize

          1.1MB

          MD5

          bc6a7864818c96cc19eee63326a27e81

          SHA1

          6705479f1ced5c847e7bee3e5b7f10164ebf3deb

          SHA256

          35f04b5c484b1629d14b04d67fff8d3e8007af2167b41efd3dc146a4e1a3e06c

          SHA512

          f8a0783748155dc1bc2d7effa8020e4b4026524df6c5c7958be68fd2f73822348c981f5c99158d42f41365843f839aca492e996f88c9943d0aafb3808fe57185

        • C:\Users\Admin\AppData\Local\Z3jXzsV\wer.dll

          Filesize

          1.1MB

          MD5

          3463297b2a40ae881174e193bf31a002

          SHA1

          8982be4e7fc285f5943935fe117a2288d778885b

          SHA256

          99e0681af119d09a176ac21393afe5e323b7cad7839a617f2e378aa04092ddd8

          SHA512

          4935ea74049f8fbc929288970781cdec4d00ea7fc3dd4f72fc30cf30f9bbca7e4eb09eb316f93888683951f818462e6f409c3364db0ce80b678e83c971fb7511

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Ygxjfqh.lnk

          Filesize

          1KB

          MD5

          c12a32e4ab67e74e040a1a0806de7c32

          SHA1

          eec3d3992f56152d9137963d82f120c547f47e97

          SHA256

          1df5d41de3c7307895e8aa27daa52e03c5c76ba7155545817e5d406dc085db86

          SHA512

          858cb56f4f1c8daa3da1ed64811115012af8606aa87bb9adff921e7a1655eb56c8ea891be0834acdd0ff7a20a2d58d6fc2e3fd60f6c91dbe9951c54094c57918

        • \Users\Admin\AppData\Local\B0dC4\dvdupgrd.exe

          Filesize

          25KB

          MD5

          75a9b4172eac01d9648c6d2133af952f

          SHA1

          63c7e1af762d2b584e9cc841e8b0100f2a482b81

          SHA256

          18f9f520c7157023b0e7dfe7433a63c4dedd47b04d24aac4038b795893050736

          SHA512

          5a7a2c7f184efd9c84256a1a0a5e7aeb95432d63a567196be54e7a9437a5ada9b922983c5fc0cafb16eab4493665d8e56e2f646f9f6a2d6179986925ffcdf769

        • \Users\Admin\AppData\Local\Z3jXzsV\spinstall.exe

          Filesize

          584KB

          MD5

          29c1d5b330b802efa1a8357373bc97fe

          SHA1

          90797aaa2c56fc2a667c74475996ea1841bc368f

          SHA256

          048bd22abf158346ab991a377cc6e9d2b20b4d73ccee7656c96a41f657e7be7f

          SHA512

          66f4f75a04340a1dd55dfdcc3ff1103ea34a55295f56c12e88d38d1a41e5be46b67c98bd66ac9f878ce79311773e374ed2bce4dd70e8bb5543e4ec1dd56625ee

        • memory/1196-26-0x0000000077C30000-0x0000000077C32000-memory.dmp

          Filesize

          8KB

        • memory/1196-3-0x0000000077996000-0x0000000077997000-memory.dmp

          Filesize

          4KB

        • memory/1196-11-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1196-10-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1196-9-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1196-13-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1196-8-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1196-7-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1196-24-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1196-15-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1196-25-0x0000000077C00000-0x0000000077C02000-memory.dmp

          Filesize

          8KB

        • memory/1196-35-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1196-36-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1196-12-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1196-45-0x0000000077996000-0x0000000077997000-memory.dmp

          Filesize

          4KB

        • memory/1196-14-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/1196-23-0x00000000024D0000-0x00000000024D7000-memory.dmp

          Filesize

          28KB

        • memory/1196-4-0x00000000024F0000-0x00000000024F1000-memory.dmp

          Filesize

          4KB

        • memory/1196-6-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/2080-44-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/2080-0-0x0000000140000000-0x000000014011D000-memory.dmp

          Filesize

          1.1MB

        • memory/2080-2-0x0000000000120000-0x0000000000127000-memory.dmp

          Filesize

          28KB

        • memory/2556-58-0x0000000140000000-0x000000014011E000-memory.dmp

          Filesize

          1.1MB

        • memory/2556-55-0x0000000000290000-0x0000000000297000-memory.dmp

          Filesize

          28KB

        • memory/2556-53-0x0000000140000000-0x000000014011E000-memory.dmp

          Filesize

          1.1MB

        • memory/2820-91-0x0000000140000000-0x000000014011E000-memory.dmp

          Filesize

          1.1MB

        • memory/2944-70-0x00000000001A0000-0x00000000001A7000-memory.dmp

          Filesize

          28KB

        • memory/2944-75-0x0000000140000000-0x000000014011E000-memory.dmp

          Filesize

          1.1MB