Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-10-2024 17:19

General

  • Target

    8942de37f64cd1f04b7022ad6d9713df408d9e9449e3942161ccebb970fdc109.dll

  • Size

    1.2MB

  • MD5

    b8839ffc79f088860701573eae079ec2

  • SHA1

    88323714954aec18328ded2cb0a7ea08d5f5714d

  • SHA256

    8942de37f64cd1f04b7022ad6d9713df408d9e9449e3942161ccebb970fdc109

  • SHA512

    4b6d7a362f6f52721a026ce293d9d0b647cea983bc52a896022cf605b6abe127a5532cba24bc07f579ea6e6b0bc542e1b62d93a746015cf606b69c50e5f5ad41

  • SSDEEP

    12288:KqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed0j:KqGBHTxvt+g2gYed0

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 9 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Event Triggered Execution: Accessibility Features 1 TTPs

    Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\8942de37f64cd1f04b7022ad6d9713df408d9e9449e3942161ccebb970fdc109.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:232
  • C:\Windows\system32\WindowsActionDialog.exe
    C:\Windows\system32\WindowsActionDialog.exe
    1⤵
      PID:1304
    • C:\Users\Admin\AppData\Local\vBsIMcH3\WindowsActionDialog.exe
      C:\Users\Admin\AppData\Local\vBsIMcH3\WindowsActionDialog.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:4636
    • C:\Windows\system32\sethc.exe
      C:\Windows\system32\sethc.exe
      1⤵
        PID:4240
      • C:\Users\Admin\AppData\Local\uwVyx\sethc.exe
        C:\Users\Admin\AppData\Local\uwVyx\sethc.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:4392
      • C:\Windows\system32\SystemSettingsAdminFlows.exe
        C:\Windows\system32\SystemSettingsAdminFlows.exe
        1⤵
          PID:4232
        • C:\Users\Admin\AppData\Local\ORqN\SystemSettingsAdminFlows.exe
          C:\Users\Admin\AppData\Local\ORqN\SystemSettingsAdminFlows.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:2940

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\ORqN\DUI70.dll

          Filesize

          1.4MB

          MD5

          14a75a3f380cb3dcf2a09c81df05c150

          SHA1

          416e06d2ea8fe1695f7c340a034187a60d2b2707

          SHA256

          85944a7a132d3f14a18159d5689c13c233c68171ae7a6d097bdabc0c84225db8

          SHA512

          1b5b5adafb79a90ab752dad1f742faaa4e52cb27192499ec31730aa74250930961ba0b9e9cfdd3d84981306de4609e94649e2daf8fc9e382a9e5d0e250f01e4e

        • C:\Users\Admin\AppData\Local\ORqN\SystemSettingsAdminFlows.exe

          Filesize

          506KB

          MD5

          50adb2c7c145c729b9de8b7cf967dd24

          SHA1

          a31757f08da6f95156777c1132b6d5f1db3d8f30

          SHA256

          a7a2e7122d27308df37b7ab718ef3ac239e4216669f51331e34e205f59fb0aec

          SHA512

          715b4c93e79e896da1cf86cf4455a84cba1aeac34b6fd72d2afdf203a2034f6f8fac1d6501f0dd277a17bd1d7ab73ddd1887e01a99f2d26f39efeb94d0aac9b0

        • C:\Users\Admin\AppData\Local\uwVyx\OLEACC.dll

          Filesize

          1.2MB

          MD5

          b4836a205b2db6f9aa88c088bd44d1e7

          SHA1

          04e9fe3bc8c87defebccd5890042469fb58c12de

          SHA256

          6be3aa836080852d3d64feec5822c96194d83a09f4849dc13b644ffa5946694e

          SHA512

          564df9cc3d0da91e65063e773b354d440845485326530da792017076eb3a625466c1effd55a5b38584e57aeb730fc9fe93ff70034669b74167e8277fce3e4461

        • C:\Users\Admin\AppData\Local\uwVyx\sethc.exe

          Filesize

          104KB

          MD5

          8ba3a9702a3f1799431cad6a290223a6

          SHA1

          9c7dc9b6830297c8f759d1f46c8b36664e26c031

          SHA256

          615b2f2d7e3fce340839a9b54bdc3445eb2333d0fafee477d6113379e90935b8

          SHA512

          680c216d54f4fd2a14f0398e4461c8340ac15acdca75c36a42083625e1081d5e7d262c4c12296b6f21ba2f593f92816edf1c9a0cf4cbee23588e590713b87746

        • C:\Users\Admin\AppData\Local\vBsIMcH3\DUI70.dll

          Filesize

          1.4MB

          MD5

          c25f4dd933b6eb5448d8ca4d3616b9a7

          SHA1

          68aec4201c717145d18cfab8322f849c44adae06

          SHA256

          bc05b9e8bdf5f3cfc49d6334fc2e5b9e975b4bceca40ec378a8cc6eed8384fac

          SHA512

          99a217caf4944ea4eab04ed185c04247fbf33e371ad0ab13a8e224b9c0bf0a136c3fca26658bced0fd208d354645d3dc42875037af4f373edec579609577df32

        • C:\Users\Admin\AppData\Local\vBsIMcH3\WindowsActionDialog.exe

          Filesize

          61KB

          MD5

          73c523b6556f2dc7eefc662338d66f8d

          SHA1

          1e6f9a1d885efa4d76f1e7a8be2e974f2b65cea5

          SHA256

          0c6397bfbcd7b1fcefb6de01a506578e36651725a61078c69708f1f92c41ea31

          SHA512

          69d0f23d1abaad657dd4672532936ef35f0e9d443caf9e19898017656a66ed46e75e7e05261c7e7636799c58feccd01dc93975d6a598cbb73242ddb48c6ec912

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Ltmfycbfnis.lnk

          Filesize

          1KB

          MD5

          04b71dfa9d462b9cf2dd00704ebdf488

          SHA1

          f0206f8d189554bf985b0d498dc84cf3b52ee65a

          SHA256

          7cee2b3e49ff5c9e0f4b1242c5685a84ddf76683121d0e0206ff137e7e0314aa

          SHA512

          dac26acb81b177da63e214a11f4f5f1d660ae05c0bd26aa405e9a3da10820a2657015e2d230c681eb2d4552893902fc51547942b461e213304de0a26079ece8d

        • memory/232-0-0x0000014AA9C00000-0x0000014AA9C07000-memory.dmp

          Filesize

          28KB

        • memory/232-2-0x0000000140000000-0x0000000140128000-memory.dmp

          Filesize

          1.2MB

        • memory/232-39-0x0000000140000000-0x0000000140128000-memory.dmp

          Filesize

          1.2MB

        • memory/2940-82-0x0000000140000000-0x000000014016E000-memory.dmp

          Filesize

          1.4MB

        • memory/3380-8-0x0000000140000000-0x0000000140128000-memory.dmp

          Filesize

          1.2MB

        • memory/3380-14-0x0000000140000000-0x0000000140128000-memory.dmp

          Filesize

          1.2MB

        • memory/3380-26-0x00007FFDFF640000-0x00007FFDFF650000-memory.dmp

          Filesize

          64KB

        • memory/3380-10-0x0000000140000000-0x0000000140128000-memory.dmp

          Filesize

          1.2MB

        • memory/3380-9-0x0000000140000000-0x0000000140128000-memory.dmp

          Filesize

          1.2MB

        • memory/3380-27-0x00007FFDFF630000-0x00007FFDFF640000-memory.dmp

          Filesize

          64KB

        • memory/3380-7-0x0000000140000000-0x0000000140128000-memory.dmp

          Filesize

          1.2MB

        • memory/3380-11-0x0000000140000000-0x0000000140128000-memory.dmp

          Filesize

          1.2MB

        • memory/3380-6-0x0000000140000000-0x0000000140128000-memory.dmp

          Filesize

          1.2MB

        • memory/3380-12-0x0000000140000000-0x0000000140128000-memory.dmp

          Filesize

          1.2MB

        • memory/3380-25-0x0000000140000000-0x0000000140128000-memory.dmp

          Filesize

          1.2MB

        • memory/3380-36-0x0000000140000000-0x0000000140128000-memory.dmp

          Filesize

          1.2MB

        • memory/3380-4-0x00007FFDFDA5A000-0x00007FFDFDA5B000-memory.dmp

          Filesize

          4KB

        • memory/3380-3-0x0000000000990000-0x0000000000991000-memory.dmp

          Filesize

          4KB

        • memory/3380-13-0x0000000140000000-0x0000000140128000-memory.dmp

          Filesize

          1.2MB

        • memory/3380-16-0x0000000140000000-0x0000000140128000-memory.dmp

          Filesize

          1.2MB

        • memory/3380-24-0x0000000000370000-0x0000000000377000-memory.dmp

          Filesize

          28KB

        • memory/3380-15-0x0000000140000000-0x0000000140128000-memory.dmp

          Filesize

          1.2MB

        • memory/4392-63-0x0000000140000000-0x0000000140129000-memory.dmp

          Filesize

          1.2MB

        • memory/4392-67-0x0000000140000000-0x0000000140129000-memory.dmp

          Filesize

          1.2MB

        • memory/4392-62-0x000002118F010000-0x000002118F017000-memory.dmp

          Filesize

          28KB

        • memory/4636-51-0x0000000140000000-0x000000014016E000-memory.dmp

          Filesize

          1.4MB

        • memory/4636-46-0x0000000140000000-0x000000014016E000-memory.dmp

          Filesize

          1.4MB

        • memory/4636-48-0x0000024003FF0000-0x0000024003FF7000-memory.dmp

          Filesize

          28KB