Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    18-10-2024 05:07

General

  • Target

    43508d520d7e2071ccd08862888e65cb9ae724268835584aec28c355f22f1d92.dll

  • Size

    948KB

  • MD5

    c3da5425420b0f94aa1a58c38ef6d14d

  • SHA1

    891965f46beafca8d84b87e9aa815d8d7b8171fd

  • SHA256

    43508d520d7e2071ccd08862888e65cb9ae724268835584aec28c355f22f1d92

  • SHA512

    1ebc2ca75e6354edd72ef76991569565199267a472756077166deed6fa6b22e46d5df3546910c78b4b80b54e0e98f6eb5142e254feffae2026f46773ac687dee

  • SSDEEP

    6144:D34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:DIKp/UWCZdCDh2IZDwAFRpR6Au

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 11 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\43508d520d7e2071ccd08862888e65cb9ae724268835584aec28c355f22f1d92.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2280
  • C:\Windows\system32\p2phost.exe
    C:\Windows\system32\p2phost.exe
    1⤵
      PID:2644
    • C:\Users\Admin\AppData\Local\jx8oP1J\p2phost.exe
      C:\Users\Admin\AppData\Local\jx8oP1J\p2phost.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious behavior: EnumeratesProcesses
      PID:2792
    • C:\Windows\system32\mstsc.exe
      C:\Windows\system32\mstsc.exe
      1⤵
        PID:3056
      • C:\Users\Admin\AppData\Local\CwCidNoNM\mstsc.exe
        C:\Users\Admin\AppData\Local\CwCidNoNM\mstsc.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:1812
      • C:\Windows\system32\ComputerDefaults.exe
        C:\Windows\system32\ComputerDefaults.exe
        1⤵
          PID:1076
        • C:\Users\Admin\AppData\Local\mm4N\ComputerDefaults.exe
          C:\Users\Admin\AppData\Local\mm4N\ComputerDefaults.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:1840

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\jx8oP1J\P2PCOLLAB.dll

          Filesize

          952KB

          MD5

          ee5f893aaa7fe3f85696d7310c45c433

          SHA1

          e4a2eefc1cf8cc2392b59660ee6645a6c0209461

          SHA256

          7ecd6aec50f37a1ce1c3e87414f5f4db29e96c480e996ebdf8fcb21da7365a59

          SHA512

          1f1cf3e22f60b490e4270c53ea38a19ca9f86b7c41daea8f8ac860666df6da7fdd441e3b15e98e2350cb22e833ca39cd338ee06aca52124184b45d46001dff7b

        • C:\Users\Admin\AppData\Local\mm4N\appwiz.cpl

          Filesize

          952KB

          MD5

          9b554a8736724ed86f187771c9962fa8

          SHA1

          58abecc99678d7479ad3256ed0e975e1ca6eb349

          SHA256

          dfdcb7d5a52b7b1d9129ef6f7426373ad667714a2596d44e99a1f3d666affd01

          SHA512

          179cbb51200773e920c3fb03c05fb03ceccc2877dc4691f95cf35b830528d329d04aeea51b84796ea7c13007fcfd4a143e4f7c6a346da9fd0b6ccb8f52c40170

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Ygxjfqh.lnk

          Filesize

          1KB

          MD5

          842f1bcc1e8577e74f0df10297401e7d

          SHA1

          e088a75e6d53b89a18a7320de472cc34266e3fb9

          SHA256

          4e386f34b9d57d647d9eecefff72b6a992f8820e8e53e36103f15e6f44674c0e

          SHA512

          62012ec1a0e66c3324f8e57574a4da5814b0dc5d059fd066b231c952acdd0dcc74f19434f31f060794cb89aed8f1cdea02b0f704f581bd74779df25907a6da5e

        • \Users\Admin\AppData\Local\CwCidNoNM\Secur32.dll

          Filesize

          952KB

          MD5

          2b2bb87c0e611f2bca267ea5fb4f12fe

          SHA1

          d8b6401c0ec7cc27b12e50fbf5e1475229a0c2a6

          SHA256

          6e9a2a7ad8e2d75a3b7c2a3e43413f06be604774c958c6cd8273934d58d18e99

          SHA512

          b80e3680f6e336c70979267a9e9eed7697ed37e1dd239c28bcfa35f3bb6bfe9a0a94029c4c11c07f9e1f8d0be2b3638300b84909498909e7074fd1c1f51afefe

        • \Users\Admin\AppData\Local\CwCidNoNM\mstsc.exe

          Filesize

          1.1MB

          MD5

          50f739538ef014b2e7ec59431749d838

          SHA1

          b439762b8efe8cfb977e7374c11a7e4d8ed05eb3

          SHA256

          85c510c7fa8d64c70886ea01ec99e7b9064594f021a95b4cf88359421e732be3

          SHA512

          02e231ddc4ac012c597b9db42f8a77fbf35ca8253c030d443a0dd4db3d76a9ee1cced600f12d7bb06305e7a4da4a8fda980faad335adcb12738d80d453cb3cc8

        • \Users\Admin\AppData\Local\jx8oP1J\p2phost.exe

          Filesize

          172KB

          MD5

          0dbd420477352b278dfdc24f4672b79c

          SHA1

          df446f25be33ac60371557717073249a64e04bb2

          SHA256

          1baba169de6c8f3b3c33cea96314c67b709a171bdc8ea9c250a0d016db767345

          SHA512

          84014b2dcc00f9fa1a337089ad4d4abcaa9e3155171978ec07bc155ddaebebfabb529d8de3578e564b3aae59545f52d71af173ebb50d2af252f219ac60b453d1

        • \Users\Admin\AppData\Local\mm4N\ComputerDefaults.exe

          Filesize

          36KB

          MD5

          86bd981f55341273753ac42ea200a81e

          SHA1

          14fe410efc9aeb0a905b984ac27719ff0dd10ea7

          SHA256

          40b194be2bad2d3d4d1b69f9aec2853c8b663130810a11607ff72a9e3a06d5b3

          SHA512

          49bb6d4bf7a9356fadde7f6165af6973630827d28b69db10ad477a84d98b08fb82e4daae777166e1ddddb5b5efcdf634e4e9bd34b255dae87462ba32e8bba143

        • memory/1216-10-0x0000000140000000-0x00000001400ED000-memory.dmp

          Filesize

          948KB

        • memory/1216-8-0x0000000140000000-0x00000001400ED000-memory.dmp

          Filesize

          948KB

        • memory/1216-17-0x0000000140000000-0x00000001400ED000-memory.dmp

          Filesize

          948KB

        • memory/1216-16-0x0000000140000000-0x00000001400ED000-memory.dmp

          Filesize

          948KB

        • memory/1216-15-0x0000000140000000-0x00000001400ED000-memory.dmp

          Filesize

          948KB

        • memory/1216-14-0x0000000140000000-0x00000001400ED000-memory.dmp

          Filesize

          948KB

        • memory/1216-13-0x0000000140000000-0x00000001400ED000-memory.dmp

          Filesize

          948KB

        • memory/1216-12-0x0000000140000000-0x00000001400ED000-memory.dmp

          Filesize

          948KB

        • memory/1216-27-0x0000000076F90000-0x0000000076F92000-memory.dmp

          Filesize

          8KB

        • memory/1216-26-0x0000000076F60000-0x0000000076F62000-memory.dmp

          Filesize

          8KB

        • memory/1216-11-0x0000000140000000-0x00000001400ED000-memory.dmp

          Filesize

          948KB

        • memory/1216-3-0x0000000076CF6000-0x0000000076CF7000-memory.dmp

          Filesize

          4KB

        • memory/1216-24-0x0000000002D70000-0x0000000002D77000-memory.dmp

          Filesize

          28KB

        • memory/1216-36-0x0000000140000000-0x00000001400ED000-memory.dmp

          Filesize

          948KB

        • memory/1216-37-0x0000000140000000-0x00000001400ED000-memory.dmp

          Filesize

          948KB

        • memory/1216-4-0x0000000002D90000-0x0000000002D91000-memory.dmp

          Filesize

          4KB

        • memory/1216-46-0x0000000076CF6000-0x0000000076CF7000-memory.dmp

          Filesize

          4KB

        • memory/1216-7-0x0000000140000000-0x00000001400ED000-memory.dmp

          Filesize

          948KB

        • memory/1216-9-0x0000000140000000-0x00000001400ED000-memory.dmp

          Filesize

          948KB

        • memory/1216-6-0x0000000140000000-0x00000001400ED000-memory.dmp

          Filesize

          948KB

        • memory/1216-25-0x0000000140000000-0x00000001400ED000-memory.dmp

          Filesize

          948KB

        • memory/1812-73-0x00000000001B0000-0x00000000001B7000-memory.dmp

          Filesize

          28KB

        • memory/1812-71-0x000007FEF5E40000-0x000007FEF5F2E000-memory.dmp

          Filesize

          952KB

        • memory/1812-76-0x000007FEF5E40000-0x000007FEF5F2E000-memory.dmp

          Filesize

          952KB

        • memory/1840-92-0x000007FEF5E40000-0x000007FEF5F2E000-memory.dmp

          Filesize

          952KB

        • memory/2280-45-0x000007FEF5E40000-0x000007FEF5F2D000-memory.dmp

          Filesize

          948KB

        • memory/2280-0-0x000007FEF5E40000-0x000007FEF5F2D000-memory.dmp

          Filesize

          948KB

        • memory/2280-2-0x0000000000290000-0x0000000000297000-memory.dmp

          Filesize

          28KB

        • memory/2792-59-0x000007FEF64A0000-0x000007FEF658E000-memory.dmp

          Filesize

          952KB

        • memory/2792-56-0x0000000000110000-0x0000000000117000-memory.dmp

          Filesize

          28KB

        • memory/2792-54-0x000007FEF64A0000-0x000007FEF658E000-memory.dmp

          Filesize

          952KB