Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    18/10/2024, 03:14

General

  • Target

    6e00c66fc1b25613485d0e05cf9ba5df425c26529072dc9cf040ee5061b24d2e.dll

  • Size

    668KB

  • MD5

    c3d17f1d13f9abf90498dd0124f5b116

  • SHA1

    602a31d2909146fa0046ee1edf1c3a79ffb1a8f1

  • SHA256

    6e00c66fc1b25613485d0e05cf9ba5df425c26529072dc9cf040ee5061b24d2e

  • SHA512

    f4007128d563482dd03f34c720d3058668313a8613962d333052656b24b6735a5727dd1a49d9a1a5af9cef0381c77eb527fb366d444177c445f9f4e4fd1c4f12

  • SSDEEP

    6144:A34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:AIKp/UWCZdCDh2IZDwAFRpR6Au

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 12 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\6e00c66fc1b25613485d0e05cf9ba5df425c26529072dc9cf040ee5061b24d2e.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2640
  • C:\Windows\system32\wextract.exe
    C:\Windows\system32\wextract.exe
    1⤵
      PID:2676
    • C:\Users\Admin\AppData\Local\lUns\wextract.exe
      C:\Users\Admin\AppData\Local\lUns\wextract.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious behavior: EnumeratesProcesses
      PID:3068
    • C:\Windows\system32\spinstall.exe
      C:\Windows\system32\spinstall.exe
      1⤵
        PID:1912
      • C:\Users\Admin\AppData\Local\h3VhbVzf\spinstall.exe
        C:\Users\Admin\AppData\Local\h3VhbVzf\spinstall.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:1868
      • C:\Windows\system32\consent.exe
        C:\Windows\system32\consent.exe
        1⤵
          PID:792
        • C:\Users\Admin\AppData\Local\tp37\consent.exe
          C:\Users\Admin\AppData\Local\tp37\consent.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:2336

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\h3VhbVzf\VERSION.dll

          Filesize

          672KB

          MD5

          182682c5209c8e138b67a28bb132d83c

          SHA1

          8165f4af78267835cbd5419a17243575126b2ec2

          SHA256

          fd7464a876b2f2f6e5ff03f4ac897e4d6e4c8dc0252a274539e4546d3fc0e797

          SHA512

          c4fb55bdf918407fcb97631f2544732a82ce6ab85981c304e96c44d207f1432ec83690eb7a1dc3f5b9240874211bf9e1a41b20f5ec9329359f280d7735619065

        • C:\Users\Admin\AppData\Local\lUns\VERSION.dll

          Filesize

          672KB

          MD5

          5235540949eac7e2a0f6fb563f170f8c

          SHA1

          2bda53f8a65c5ed252cc3a86ae97da74b0623865

          SHA256

          75a77e29ba3c74940ac12bbf8f8950542e4676a3b042848ef35032d79e7628f6

          SHA512

          0e022441868169edbda4476abf4562d1a16ee6c9b07935c711e96466f0c2403e4db5e3d3df803887b70e16c4902cd6a127d483e9923b9e648cabc42939c2bcc7

        • C:\Users\Admin\AppData\Local\tp37\WINMM.dll

          Filesize

          676KB

          MD5

          c6164077dc1aeff059993dd453df05b2

          SHA1

          74cf3384439ac6759178c99b6b4b7dc6eca27096

          SHA256

          350c3fabb62505766243dfffb6fef5801521f24ff55fae9e036112d568976c82

          SHA512

          821b43278aa6435b9e856ee445c9fe4d9f6cb2939c1ee145039fe3494dbca063d3c92348a6dc596c721cc758c8888968ee98053f0392a2405fccae113e7543c1

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Ppapbotpack.lnk

          Filesize

          1KB

          MD5

          8ac31485ebc82c5e0c257d29f67b814d

          SHA1

          68772a197133267093b8d1350e3f5c1166b49585

          SHA256

          52a54cb1f091db76341703de6a9d47503c539a9d438c7379abe6cabe189b68ee

          SHA512

          c769dae0756d6b1151663bfbd190c138bb1c0a2c911de6ab09ff6d2b4f41be8af0212ec1d31d54d62bad86f1e82d150018f31fed0e901d5d06c4353f1bd9753e

        • \Users\Admin\AppData\Local\h3VhbVzf\spinstall.exe

          Filesize

          584KB

          MD5

          29c1d5b330b802efa1a8357373bc97fe

          SHA1

          90797aaa2c56fc2a667c74475996ea1841bc368f

          SHA256

          048bd22abf158346ab991a377cc6e9d2b20b4d73ccee7656c96a41f657e7be7f

          SHA512

          66f4f75a04340a1dd55dfdcc3ff1103ea34a55295f56c12e88d38d1a41e5be46b67c98bd66ac9f878ce79311773e374ed2bce4dd70e8bb5543e4ec1dd56625ee

        • \Users\Admin\AppData\Local\lUns\wextract.exe

          Filesize

          140KB

          MD5

          1ea6500c25a80e8bdb65099c509af993

          SHA1

          6a090ef561feb4ae1c6794de5b19c5e893c4aafc

          SHA256

          99123d4e7bf93aa7f3315a432307c8b0cbaf24ad2cfb46edc149edbe24de4ca2

          SHA512

          b8f9f1ab48671e382d1385c34f0f19fc52fc0061e00db53bbbc2cdaee6d8a3f245707329f98e9167c53721aeaddcebfe66632729b6bcc98892031fd9914fb1fb

        • \Users\Admin\AppData\Local\tp37\consent.exe

          Filesize

          109KB

          MD5

          0b5511674394666e9d221f8681b2c2e6

          SHA1

          6e4e720dfc424a12383f0b8194e4477e3bc346dc

          SHA256

          ccad775decb5aec98118b381eeccc6d540928035cfb955abcb4ad3ded390b79b

          SHA512

          00d28a00fd3ceaeae42ba6882ffb42aa4cc8b92b07a10f28df8e1931df4b806aebdcfab1976bf8d5ce0b98c64da19d4ee06a6315734fa5f885ecd1f6e1ff16a7

        • memory/1196-24-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1196-45-0x00000000771B6000-0x00000000771B7000-memory.dmp

          Filesize

          4KB

        • memory/1196-12-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1196-11-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1196-10-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1196-9-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1196-8-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1196-7-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1196-6-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1196-26-0x0000000077550000-0x0000000077552000-memory.dmp

          Filesize

          8KB

        • memory/1196-25-0x0000000077520000-0x0000000077522000-memory.dmp

          Filesize

          8KB

        • memory/1196-3-0x00000000771B6000-0x00000000771B7000-memory.dmp

          Filesize

          4KB

        • memory/1196-35-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1196-36-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1196-4-0x0000000002FC0000-0x0000000002FC1000-memory.dmp

          Filesize

          4KB

        • memory/1196-13-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1196-14-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1196-18-0x0000000002F20000-0x0000000002F27000-memory.dmp

          Filesize

          28KB

        • memory/1196-16-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1196-15-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1868-70-0x0000000000320000-0x0000000000327000-memory.dmp

          Filesize

          28KB

        • memory/1868-71-0x000007FEF7700000-0x000007FEF77A8000-memory.dmp

          Filesize

          672KB

        • memory/1868-75-0x000007FEF7700000-0x000007FEF77A8000-memory.dmp

          Filesize

          672KB

        • memory/2336-87-0x000007FEF7700000-0x000007FEF77A9000-memory.dmp

          Filesize

          676KB

        • memory/2336-91-0x000007FEF7700000-0x000007FEF77A9000-memory.dmp

          Filesize

          676KB

        • memory/2640-44-0x000007FEF7780000-0x000007FEF7827000-memory.dmp

          Filesize

          668KB

        • memory/2640-0-0x000007FEF7780000-0x000007FEF7827000-memory.dmp

          Filesize

          668KB

        • memory/2640-2-0x00000000000A0000-0x00000000000A7000-memory.dmp

          Filesize

          28KB

        • memory/3068-58-0x000007FEF7830000-0x000007FEF78D8000-memory.dmp

          Filesize

          672KB

        • memory/3068-53-0x000007FEF7830000-0x000007FEF78D8000-memory.dmp

          Filesize

          672KB

        • memory/3068-55-0x0000000000280000-0x0000000000287000-memory.dmp

          Filesize

          28KB