Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-10-2024 17:44

General

  • Target

    da457d69f37782526f9a253e305e10ccf5c10320f930879b33e30475adf061ec.dll

  • Size

    716KB

  • MD5

    e85e1ec50007aaefe8a569d3931bccf9

  • SHA1

    fbddb1fd526afad1be106f3ac1790fa75866a995

  • SHA256

    da457d69f37782526f9a253e305e10ccf5c10320f930879b33e30475adf061ec

  • SHA512

    691a3e2b10e5c9a0edb8d51a9fc0df29246232cc6c7b67539b3c9256a9be6e0cef58022abef8dbd7e49e8e3c0d21b60dc8b68e484684e0c9e6da9c0cad332766

  • SSDEEP

    12288:NqJ4FzHTx8cOjEIonNgQLtXKFg2t/KRi4BaedN:NqGBHTxvt+g2gYedN

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 9 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\da457d69f37782526f9a253e305e10ccf5c10320f930879b33e30475adf061ec.dll
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:448
  • C:\Windows\system32\DeviceEnroller.exe
    C:\Windows\system32\DeviceEnroller.exe
    1⤵
      PID:3212
    • C:\Users\Admin\AppData\Local\FVWsIRS\DeviceEnroller.exe
      C:\Users\Admin\AppData\Local\FVWsIRS\DeviceEnroller.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:3268
    • C:\Windows\system32\SystemSettingsAdminFlows.exe
      C:\Windows\system32\SystemSettingsAdminFlows.exe
      1⤵
        PID:2884
      • C:\Users\Admin\AppData\Local\6Qkr\SystemSettingsAdminFlows.exe
        C:\Users\Admin\AppData\Local\6Qkr\SystemSettingsAdminFlows.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:3020
      • C:\Windows\system32\CameraSettingsUIHost.exe
        C:\Windows\system32\CameraSettingsUIHost.exe
        1⤵
          PID:4800
        • C:\Users\Admin\AppData\Local\5QcH\CameraSettingsUIHost.exe
          C:\Users\Admin\AppData\Local\5QcH\CameraSettingsUIHost.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:4224

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\5QcH\CameraSettingsUIHost.exe

          Filesize

          31KB

          MD5

          9e98636523a653c7a648f37be229cf69

          SHA1

          bd4da030e7cf4d55b7c644dfacd26b152e6a14c4

          SHA256

          3bf20bc5a208dfa1ea26a042fd0010b1268dcfedc94ed775f11890bc1d95e717

          SHA512

          41966166e2ddfe40e6f4e6da26bc490775caac9997465c6dd94ba6a664d3a797ffc2aa5684c95702e8657e5cea62a46a75aee3e7d5e07a47dcaaa5c4da565e78

        • C:\Users\Admin\AppData\Local\5QcH\DUI70.dll

          Filesize

          996KB

          MD5

          2977e8891a6a30a33719e253ca8d0a1a

          SHA1

          86a642fe751ed61f5dbcc773acf4c74eb6d70b59

          SHA256

          631ab48c0096fc19d2d8d12449ffe5f3677a30a12d377a60afbbc477b1aa9fc4

          SHA512

          f0e3301b5024da00aa0d0f362c9a1cdfcb3fe3869a106bd9192f8d55b48a5e9486db6530bf057b9888ca980f9db6e422a08bb9d0f0935345c6a3fc157927a553

        • C:\Users\Admin\AppData\Local\6Qkr\DUI70.dll

          Filesize

          996KB

          MD5

          e12a845a16e42c68432336f9a1dbb098

          SHA1

          8af66e6deff5427a19946ac2fff59137fc176f91

          SHA256

          b8139beb2af0d45ce326f45a836e9a9c975fe4baeba6cbc378ce530c11a83100

          SHA512

          f0e67f274a3314f1ece7ee2a65d92701c691f89c06b67fc5f49113dc32bfb0f93351656ecace7113a519edc6e6e5b4d41a6777e3edd3613b8f2e92b0f961d3f6

        • C:\Users\Admin\AppData\Local\6Qkr\SystemSettingsAdminFlows.exe

          Filesize

          506KB

          MD5

          50adb2c7c145c729b9de8b7cf967dd24

          SHA1

          a31757f08da6f95156777c1132b6d5f1db3d8f30

          SHA256

          a7a2e7122d27308df37b7ab718ef3ac239e4216669f51331e34e205f59fb0aec

          SHA512

          715b4c93e79e896da1cf86cf4455a84cba1aeac34b6fd72d2afdf203a2034f6f8fac1d6501f0dd277a17bd1d7ab73ddd1887e01a99f2d26f39efeb94d0aac9b0

        • C:\Users\Admin\AppData\Local\FVWsIRS\DeviceEnroller.exe

          Filesize

          448KB

          MD5

          946d9474533f58d2613078fd14ca7473

          SHA1

          c2620ac9522fa3702a6a03299b930d6044aa5e49

          SHA256

          cf5f5fe084f172e9c435615c1dc6ae7d3bd8c5ec8ea290caa0627c2f392760cb

          SHA512

          3653d41a0553ee63a43490f682c9b528651a6336f28adafc333d4d148577351122db8279ff83ee59bb0a9c17bb384e9f6c9c78677c8c5ed671a42036dec1f8c1

        • C:\Users\Admin\AppData\Local\FVWsIRS\XmlLite.dll

          Filesize

          720KB

          MD5

          5c306146d480992f4ca94cb6d4cb28a7

          SHA1

          a0f80ebf18a81b9fb2e6714a7688a5cd2f49384f

          SHA256

          6671e5decec24242959f35be5b47b840f547b42339e46c7ad7ee1773a86fee61

          SHA512

          078be88244d3919d8bc62e07f336da664b3d14af204bd2c8927ee0f0ed2aabdf3bad022e09c9b48263712cfc1261148b3f8a3d952f224d8b6c5867cfe597f7c2

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Eswctkc.lnk

          Filesize

          1KB

          MD5

          75ff4f46fac9b5827aa27e18d76248d2

          SHA1

          115fcfd3f190a9480e4053b5245a4916d7884310

          SHA256

          cb34010b7910cd91724bf27d70a3fa8969c28687c84678557330d35b2fb25db6

          SHA512

          a579c94a19bf731e4649bf80722744b3d46b71a5728770174850f0c498808084263589f829cc9283c99b2a6200049fc36b4844982bf36beffcd46966fbfc1dc0

        • memory/448-0-0x0000000001450000-0x0000000001457000-memory.dmp

          Filesize

          28KB

        • memory/448-1-0x0000000140000000-0x00000001400B3000-memory.dmp

          Filesize

          716KB

        • memory/448-36-0x0000000140000000-0x00000001400B3000-memory.dmp

          Filesize

          716KB

        • memory/3020-63-0x0000000140000000-0x00000001400F9000-memory.dmp

          Filesize

          996KB

        • memory/3020-59-0x0000000140000000-0x00000001400F9000-memory.dmp

          Filesize

          996KB

        • memory/3268-48-0x0000000140000000-0x00000001400B4000-memory.dmp

          Filesize

          720KB

        • memory/3268-44-0x0000000140000000-0x00000001400B4000-memory.dmp

          Filesize

          720KB

        • memory/3268-43-0x000002781CFB0000-0x000002781CFB7000-memory.dmp

          Filesize

          28KB

        • memory/3528-24-0x00007FFD96110000-0x00007FFD96120000-memory.dmp

          Filesize

          64KB

        • memory/3528-13-0x0000000140000000-0x00000001400B3000-memory.dmp

          Filesize

          716KB

        • memory/3528-7-0x0000000140000000-0x00000001400B3000-memory.dmp

          Filesize

          716KB

        • memory/3528-8-0x0000000140000000-0x00000001400B3000-memory.dmp

          Filesize

          716KB

        • memory/3528-9-0x0000000140000000-0x00000001400B3000-memory.dmp

          Filesize

          716KB

        • memory/3528-33-0x0000000140000000-0x00000001400B3000-memory.dmp

          Filesize

          716KB

        • memory/3528-10-0x0000000140000000-0x00000001400B3000-memory.dmp

          Filesize

          716KB

        • memory/3528-12-0x0000000140000000-0x00000001400B3000-memory.dmp

          Filesize

          716KB

        • memory/3528-22-0x0000000140000000-0x00000001400B3000-memory.dmp

          Filesize

          716KB

        • memory/3528-23-0x00007FFD96120000-0x00007FFD96130000-memory.dmp

          Filesize

          64KB

        • memory/3528-21-0x0000000000BA0000-0x0000000000BA7000-memory.dmp

          Filesize

          28KB

        • memory/3528-11-0x0000000140000000-0x00000001400B3000-memory.dmp

          Filesize

          716KB

        • memory/3528-6-0x0000000140000000-0x00000001400B3000-memory.dmp

          Filesize

          716KB

        • memory/3528-3-0x0000000002ED0000-0x0000000002ED1000-memory.dmp

          Filesize

          4KB

        • memory/3528-5-0x00007FFD94AFA000-0x00007FFD94AFB000-memory.dmp

          Filesize

          4KB

        • memory/4224-78-0x0000000140000000-0x00000001400F9000-memory.dmp

          Filesize

          996KB