Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-10-2024 04:15

General

  • Target

    7b5abbc20d881379a184b6c2f29a1e70196b4dabdbfbebc60f439a83be323bb4.dll

  • Size

    668KB

  • MD5

    95c5f4396d2f989fa54fd09521fc2676

  • SHA1

    7bf1a0ee837c77866dd7ea42eb0ddf060990fd81

  • SHA256

    7b5abbc20d881379a184b6c2f29a1e70196b4dabdbfbebc60f439a83be323bb4

  • SHA512

    1ce9ef6f4f5cc2d4ce245b0efc330d7e62dd0e4a8ad57570f25efb67364bb6ca5888ad9dcc1a41ee95d682aa0b4633971c6d83428cf307fa6ea6fd0692dc7494

  • SSDEEP

    6144:v34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:vIKp/UWCZdCDh2IZDwAFRpR6Au

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 11 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Event Triggered Execution: Accessibility Features 1 TTPs

    Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\7b5abbc20d881379a184b6c2f29a1e70196b4dabdbfbebc60f439a83be323bb4.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2476
  • C:\Windows\system32\PresentationSettings.exe
    C:\Windows\system32\PresentationSettings.exe
    1⤵
      PID:2388
    • C:\Users\Admin\AppData\Local\Zfw\PresentationSettings.exe
      C:\Users\Admin\AppData\Local\Zfw\PresentationSettings.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2672
    • C:\Windows\system32\Magnify.exe
      C:\Windows\system32\Magnify.exe
      1⤵
        PID:2576
      • C:\Users\Admin\AppData\Local\sZCp\Magnify.exe
        C:\Users\Admin\AppData\Local\sZCp\Magnify.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:2632
      • C:\Windows\system32\SystemPropertiesRemote.exe
        C:\Windows\system32\SystemPropertiesRemote.exe
        1⤵
          PID:2024
        • C:\Users\Admin\AppData\Local\d95ox\SystemPropertiesRemote.exe
          C:\Users\Admin\AppData\Local\d95ox\SystemPropertiesRemote.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:2000

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Zfw\slc.dll

          Filesize

          672KB

          MD5

          94e0b028c53ee811c2c25d877dbd0059

          SHA1

          905b6030b395a6691ac26e2b237c5b63ea8f2024

          SHA256

          d307c11c9393583e6455dd1b0b5b20e21b0865c8fc8fbf3cba229bcb75d5a4d0

          SHA512

          4b5a017c62b9c789478d28386d73f161e07fe16e35fb3e9eac22b3e2e699a36d22b7cb8e07ccbfd6bc08644aecb0ec2585898e08e3b6fd2c8a8a19399de0095c

        • C:\Users\Admin\AppData\Local\d95ox\SYSDM.CPL

          Filesize

          672KB

          MD5

          a4f26e1263b65a4020081f08e92fcdbc

          SHA1

          bae8c8fb1376c3cf709605d0d66776d243a48a58

          SHA256

          bfc57c5bb845261948ac0881173158e77d69d41f319a82b294ea175fdba168d4

          SHA512

          cdd375362e94931ec14990f55d65692caf2c3727f64671ea6bb0f8156d47f073be2c0ae47ba2dc3c7eb08bd012fa68441f2a707174ae568245dbca64f5c7c150

        • C:\Users\Admin\AppData\Local\sZCp\MAGNIFICATION.dll

          Filesize

          672KB

          MD5

          fbc5e5f8458f3402b8fbe55bcfff7e44

          SHA1

          6d305ddd409039137087870600d9657f0eeff7b7

          SHA256

          5cb9bc1b8495280ac6d8da2b26db311b96a325ed00f8c3e998523a9641d2d76b

          SHA512

          8b1de579f2081e44169fa100bc948bfdab16c5eef0fbe7915f3d150d540cf91ef2517437959de51badf9409d3dad87a212a006917919cc687a968dd8741f011d

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Ncfyujonfo.lnk

          Filesize

          1KB

          MD5

          aa33789b0c9e23bde4bdc2cd8a3e6496

          SHA1

          0a3fbb73954222c06adf9cbcec56442462c985ee

          SHA256

          9e32dacce120aeb939408166cd5edd0b461a1c4b6ecdd2812045b1c4db2707ab

          SHA512

          3a4374a9fba542befe3630f09a17ac06f3f3c6025f3e7d193b1cc1278c2ad2ec8059797abd6da92a2de53b957f68fe20dfef75364f439e724ccc58b5952dfce8

        • \Users\Admin\AppData\Local\Zfw\PresentationSettings.exe

          Filesize

          172KB

          MD5

          a6f8d318f6041334889481b472000081

          SHA1

          b8cf08ec17b30c8811f2514246fcdff62731dd58

          SHA256

          208b94fd66a6ce266c3195f87029a41a0622fff47f2a5112552cb087adbb1258

          SHA512

          60f70fa8a19e6ea6f08f4907dd7fede3665ad3f2e013d49f6649442ea5871a967b9a53ec4d3328a06cb83b69be1b7af1bb14bf122b568bd1f8432ee1d0bfee69

        • \Users\Admin\AppData\Local\d95ox\SystemPropertiesRemote.exe

          Filesize

          80KB

          MD5

          d0d7ac869aa4e179da2cc333f0440d71

          SHA1

          e7b9a58f5bfc1ec321f015641a60978c0c683894

          SHA256

          5762e1570de6ca4ff4254d03c8f6e572f3b9c065bf5c78fd5a9ea3769c33818a

          SHA512

          1808b10dc85f8755a0074d1ea00794b46b4254573b6862c2813a89ca171ad94f95262e8b59a8f9a596c9bd6a724f440a14a813eab93aa140e818ee97af106db7

        • \Users\Admin\AppData\Local\sZCp\Magnify.exe

          Filesize

          637KB

          MD5

          233b45ddf77bd45e53872881cff1839b

          SHA1

          d4b8cafce4664bb339859a90a9dd1506f831756d

          SHA256

          adfd109ec03cd57e44dbd5fd1c4d8c47f8f58f887f690ba3c92f744b670fd75a

          SHA512

          6fb5f730633bfb2d063e6bc8cf37a7624bdcde2bd1d0c92b6b9a557484e7acf5d3a2be354808cade751f7ac5c5fe936e765f6494ef54b4fdb2725179f0d0fe39

        • memory/1200-25-0x0000000077510000-0x0000000077512000-memory.dmp

          Filesize

          8KB

        • memory/1200-45-0x00000000771A6000-0x00000000771A7000-memory.dmp

          Filesize

          4KB

        • memory/1200-14-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1200-13-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1200-12-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1200-10-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1200-9-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1200-8-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1200-24-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1200-7-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1200-26-0x0000000077540000-0x0000000077542000-memory.dmp

          Filesize

          8KB

        • memory/1200-3-0x00000000771A6000-0x00000000771A7000-memory.dmp

          Filesize

          4KB

        • memory/1200-36-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1200-37-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1200-4-0x0000000002540000-0x0000000002541000-memory.dmp

          Filesize

          4KB

        • memory/1200-15-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1200-23-0x0000000002520000-0x0000000002527000-memory.dmp

          Filesize

          28KB

        • memory/1200-16-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1200-6-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1200-11-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/2000-91-0x000007FEF6290000-0x000007FEF6338000-memory.dmp

          Filesize

          672KB

        • memory/2476-44-0x000007FEF6AC0000-0x000007FEF6B67000-memory.dmp

          Filesize

          668KB

        • memory/2476-0-0x000007FEF6AC0000-0x000007FEF6B67000-memory.dmp

          Filesize

          668KB

        • memory/2476-2-0x0000000000320000-0x0000000000327000-memory.dmp

          Filesize

          28KB

        • memory/2632-70-0x000007FEF6290000-0x000007FEF6338000-memory.dmp

          Filesize

          672KB

        • memory/2632-72-0x00000000002A0000-0x00000000002A7000-memory.dmp

          Filesize

          28KB

        • memory/2632-73-0x000007FEF6290000-0x000007FEF6338000-memory.dmp

          Filesize

          672KB

        • memory/2672-58-0x000007FEF6B70000-0x000007FEF6C18000-memory.dmp

          Filesize

          672KB

        • memory/2672-54-0x000007FEF6B70000-0x000007FEF6C18000-memory.dmp

          Filesize

          672KB

        • memory/2672-53-0x0000000000180000-0x0000000000187000-memory.dmp

          Filesize

          28KB