Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    16-10-2024 17:26

General

  • Target

    ee92609ef4b2d72fbd598a3ae26ab5e94ecee615e0666e9040d5f58d280ae17d.dll

  • Size

    720KB

  • MD5

    5774c50c00067b08c38d3585dec17637

  • SHA1

    e001beca0128d6c8ddd1c7ebc38e73c6244d2eb9

  • SHA256

    ee92609ef4b2d72fbd598a3ae26ab5e94ecee615e0666e9040d5f58d280ae17d

  • SHA512

    2a06a15cd17f32185e1b60095512a2420d0a5537e701fa7603dcb702c7cd3c5a7d8a43f553c3b6ca43f82f1af15ae09a53fa4795c1768e58508c7f485cbe4d7a

  • SSDEEP

    12288:1qJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4Baed:1qGBHTxvt+g2gYed

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 9 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ee92609ef4b2d72fbd598a3ae26ab5e94ecee615e0666e9040d5f58d280ae17d.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2552
  • C:\Windows\system32\WindowsAnytimeUpgradeResults.exe
    C:\Windows\system32\WindowsAnytimeUpgradeResults.exe
    1⤵
      PID:2656
    • C:\Users\Admin\AppData\Local\xUsSleZS\WindowsAnytimeUpgradeResults.exe
      C:\Users\Admin\AppData\Local\xUsSleZS\WindowsAnytimeUpgradeResults.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious behavior: EnumeratesProcesses
      PID:1464
    • C:\Windows\system32\WindowsAnytimeUpgradeResults.exe
      C:\Windows\system32\WindowsAnytimeUpgradeResults.exe
      1⤵
        PID:1812
      • C:\Users\Admin\AppData\Local\0xluv\WindowsAnytimeUpgradeResults.exe
        C:\Users\Admin\AppData\Local\0xluv\WindowsAnytimeUpgradeResults.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:1056
      • C:\Windows\system32\spreview.exe
        C:\Windows\system32\spreview.exe
        1⤵
          PID:1840
        • C:\Users\Admin\AppData\Local\qTLZ\spreview.exe
          C:\Users\Admin\AppData\Local\qTLZ\spreview.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:2924

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\0xluv\WINBRAND.dll

          Filesize

          724KB

          MD5

          c3a91a73d40414d40fe41a34129f3479

          SHA1

          7ead8458482113e4b229be00fff4bef100dccaaa

          SHA256

          1209605c3136f767f5763384197097e1789eb1af9bb6a5f275b597f81797e6be

          SHA512

          a2b9f2a4f56955c7825bd2f58bc16d8307b5e23bb224c45bd1ff640a67714df1e5cac93481068ce1753fce92a6003b665c8f95629a2610bd09572839fa6718f3

        • C:\Users\Admin\AppData\Local\qTLZ\VERSION.dll

          Filesize

          724KB

          MD5

          b5bb7ee28eeba0c479a15a782c9abe0f

          SHA1

          212c39044b8cb04de67619358e9bf1a2a10033ef

          SHA256

          a424c6831b6f962352a526d01549a3132ddef693651c75fc006927a095cd1e70

          SHA512

          bab1c40d9ec5408ed9dd9fbf8a34f83c37c147f13e1b2164aafc72dcae18b67deb4d509fd3bacd56ffad23e9e4b1e1aed228ff970a934cdd747d53b7dedf749e

        • C:\Users\Admin\AppData\Local\xUsSleZS\WindowsAnytimeUpgradeResults.exe

          Filesize

          288KB

          MD5

          6f3f29905f0ec4ce22c1fd8acbf6c6de

          SHA1

          68bdfefe549dfa6262ad659f1578f3e87d862773

          SHA256

          e9c4d718d09a28de8a99386b0dd65429f433837c712314e98ec4f01031af595b

          SHA512

          16a9ad3183d7e11d9f0dd3c79363aa9a7af306f4f35a6f1e0cc1e175ef254e8052ec94dfd600dbe882f9ab41254d482cce9190ab7b0c005a34e46c66e8ff5f9e

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Ygxjfqh.lnk

          Filesize

          1KB

          MD5

          849495a04cfe113a699b59bc30f86491

          SHA1

          fdd04ec6cc030e70f3fcbbb3cafda2b79fff83ba

          SHA256

          24f27dc1e603198872ac904e58bb9477deaa4a10a2cea87dee88cfab8dfbb3d8

          SHA512

          c8f2021c24e76f830a81e3ef96067aafab7c835f62a50c20de2872264c0779e4936ef1a878e10bbfedaa300dcd20c5e721f53677d231935a15e28c7e2effa9ae

        • \Users\Admin\AppData\Local\qTLZ\spreview.exe

          Filesize

          294KB

          MD5

          704cd4cac010e8e6d8de9b778ed17773

          SHA1

          81856abf70640f102b8b3defe2cf65669fe8e165

          SHA256

          4307f21d3ec3b51cba6a905a80045314ffccb4c60c11d99a3d77cc8103014208

          SHA512

          b380264276bad01d619a5f1f112791d6bf73dc52cdd5cca0cc1f726a6f66eefc5a78a37646792987c508f9cb5049f0eb86c71fb4c7a2d3e670c0c8623f0522ee

        • \Users\Admin\AppData\Local\xUsSleZS\WINBRAND.dll

          Filesize

          724KB

          MD5

          569ffb104004114fc5a8cf688fbde92e

          SHA1

          292f8981ead0f301f42895638402d8ed4fce12a8

          SHA256

          efe6ae3e472c2221278516bc52e08ac1ca7ce681ffb56d4c460c16bb9f73ef34

          SHA512

          7fb073dec4e4c970192080def28e471da7da2f0be2389fb50913b31b285c3258e108461f1c2c1accfb7d2efcd1b8bce843927ada719475e6fa2a7925e7d4467d

        • memory/1056-74-0x0000000140000000-0x00000001400B5000-memory.dmp

          Filesize

          724KB

        • memory/1056-71-0x0000000000120000-0x0000000000127000-memory.dmp

          Filesize

          28KB

        • memory/1216-25-0x0000000076F90000-0x0000000076F92000-memory.dmp

          Filesize

          8KB

        • memory/1216-14-0x0000000140000000-0x00000001400B4000-memory.dmp

          Filesize

          720KB

        • memory/1216-23-0x0000000140000000-0x00000001400B4000-memory.dmp

          Filesize

          720KB

        • memory/1216-12-0x0000000140000000-0x00000001400B4000-memory.dmp

          Filesize

          720KB

        • memory/1216-11-0x0000000140000000-0x00000001400B4000-memory.dmp

          Filesize

          720KB

        • memory/1216-10-0x0000000140000000-0x00000001400B4000-memory.dmp

          Filesize

          720KB

        • memory/1216-8-0x0000000140000000-0x00000001400B4000-memory.dmp

          Filesize

          720KB

        • memory/1216-24-0x0000000076F60000-0x0000000076F62000-memory.dmp

          Filesize

          8KB

        • memory/1216-3-0x0000000076CF6000-0x0000000076CF7000-memory.dmp

          Filesize

          4KB

        • memory/1216-34-0x0000000140000000-0x00000001400B4000-memory.dmp

          Filesize

          720KB

        • memory/1216-35-0x0000000140000000-0x00000001400B4000-memory.dmp

          Filesize

          720KB

        • memory/1216-4-0x0000000002D90000-0x0000000002D91000-memory.dmp

          Filesize

          4KB

        • memory/1216-44-0x0000000076CF6000-0x0000000076CF7000-memory.dmp

          Filesize

          4KB

        • memory/1216-13-0x0000000140000000-0x00000001400B4000-memory.dmp

          Filesize

          720KB

        • memory/1216-22-0x0000000002D70000-0x0000000002D77000-memory.dmp

          Filesize

          28KB

        • memory/1216-7-0x0000000140000000-0x00000001400B4000-memory.dmp

          Filesize

          720KB

        • memory/1216-6-0x0000000140000000-0x00000001400B4000-memory.dmp

          Filesize

          720KB

        • memory/1216-9-0x0000000140000000-0x00000001400B4000-memory.dmp

          Filesize

          720KB

        • memory/1464-57-0x0000000140000000-0x00000001400B5000-memory.dmp

          Filesize

          724KB

        • memory/1464-54-0x0000000000190000-0x0000000000197000-memory.dmp

          Filesize

          28KB

        • memory/1464-52-0x0000000140000000-0x00000001400B5000-memory.dmp

          Filesize

          724KB

        • memory/2552-43-0x0000000140000000-0x00000001400B4000-memory.dmp

          Filesize

          720KB

        • memory/2552-1-0x0000000140000000-0x00000001400B4000-memory.dmp

          Filesize

          720KB

        • memory/2552-2-0x0000000000110000-0x0000000000117000-memory.dmp

          Filesize

          28KB

        • memory/2924-90-0x0000000140000000-0x00000001400B5000-memory.dmp

          Filesize

          724KB