Analysis

  • max time kernel
    149s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/10/2024, 05:07

General

  • Target

    5a9312f37fc4f6e40e1cf12c15df2a7d84199ac4d594831db9f6ca1c4a6cbfab.dll

  • Size

    668KB

  • MD5

    f640bf21877302ba5a105a1cc52c4aef

  • SHA1

    7f84c86e274bed6a64be7123cb15f4e1fc477ff6

  • SHA256

    5a9312f37fc4f6e40e1cf12c15df2a7d84199ac4d594831db9f6ca1c4a6cbfab

  • SHA512

    d0f670cd9a926c674bfb926b6d080ecc8e0b3d6f2350567cb0d8ff56a15c53b461064026f5b9604afbab6035b4aed7786c66d3ef529fa789708910c1d6acc3fd

  • SSDEEP

    6144:f34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuT9:fIKp/UWCZdCDh2IZDwAFRpR6Auz1

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 10 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\5a9312f37fc4f6e40e1cf12c15df2a7d84199ac4d594831db9f6ca1c4a6cbfab.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:5024
  • C:\Windows\system32\sigverif.exe
    C:\Windows\system32\sigverif.exe
    1⤵
      PID:8
    • C:\Users\Admin\AppData\Local\gDAQ6\sigverif.exe
      C:\Users\Admin\AppData\Local\gDAQ6\sigverif.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:3700
    • C:\Windows\system32\WindowsActionDialog.exe
      C:\Windows\system32\WindowsActionDialog.exe
      1⤵
        PID:756
      • C:\Users\Admin\AppData\Local\U5I\WindowsActionDialog.exe
        C:\Users\Admin\AppData\Local\U5I\WindowsActionDialog.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:1584
      • C:\Windows\system32\msconfig.exe
        C:\Windows\system32\msconfig.exe
        1⤵
          PID:3184
        • C:\Users\Admin\AppData\Local\PMcndVV\msconfig.exe
          C:\Users\Admin\AppData\Local\PMcndVV\msconfig.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:648

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\PMcndVV\VERSION.dll

                Filesize

                672KB

                MD5

                5c8cee3633c52170ed02e8f5404aec20

                SHA1

                0b676d48b0ad7246738617acf280a6aa8756e4b0

                SHA256

                7b3d8f0f33ddde6f7b3da2f620939342356f9f98b8468923123ab6ef4dc23e53

                SHA512

                6f42710a14c871aecd14ffa7a50d08e94dfdfb1a18c89596491ff6162862d74a15cd940fca91ca88c7023bb7619381396d40a111a6deb40b80a76e86e9636851

              • C:\Users\Admin\AppData\Local\PMcndVV\msconfig.exe

                Filesize

                193KB

                MD5

                39009536cafe30c6ef2501fe46c9df5e

                SHA1

                6ff7b4d30f31186de899665c704a105227704b72

                SHA256

                93d2604f7fdf7f014ac5bef63ab177b6107f3cfc26da6cbd9a7ab50c96564a04

                SHA512

                95c9a8bc61c79108634f5578825544323e3d980ae97a105a325c58bc0e44b1d500637459969602f08d6d23d346baec6acd07d8351803981000c797190d48f03a

              • C:\Users\Admin\AppData\Local\U5I\DUI70.dll

                Filesize

                948KB

                MD5

                ae3e46694ac329f8d79a06589b60ed6e

                SHA1

                b5e5db8641afd0e5eb9dd73f4a51e690cadc34f5

                SHA256

                90e05a25845ee1132686f8c2c9cf6a4d9a9596be705c39d4cec2cc38e92b52b5

                SHA512

                c3456a616bcf491a6512877edd08ca4f640f21272a58d2b7c1ad2b5963d3419db5e953a55d41e76ed8a1cf613b09cae17d8979198ecb6667ce11fbadc30466ac

              • C:\Users\Admin\AppData\Local\U5I\WindowsActionDialog.exe

                Filesize

                61KB

                MD5

                73c523b6556f2dc7eefc662338d66f8d

                SHA1

                1e6f9a1d885efa4d76f1e7a8be2e974f2b65cea5

                SHA256

                0c6397bfbcd7b1fcefb6de01a506578e36651725a61078c69708f1f92c41ea31

                SHA512

                69d0f23d1abaad657dd4672532936ef35f0e9d443caf9e19898017656a66ed46e75e7e05261c7e7636799c58feccd01dc93975d6a598cbb73242ddb48c6ec912

              • C:\Users\Admin\AppData\Local\gDAQ6\VERSION.dll

                Filesize

                672KB

                MD5

                dc0ad163b13e0f5be1b83107ca07b4b4

                SHA1

                e23fa8799f2f5ffdc0076e4f8f269423bc1c2246

                SHA256

                740ec0a84b2b69041405e211c1af2b53c4acb580d0f03d9b03d5d63a0b803ac8

                SHA512

                87883b46f79f666079eb2204564cc066116e0930922ce9f086feb6532e5e3fb62b3777001aeb83e255b82d4d66d9987ecf04afc5b6b0980c61185baaca34f176

              • C:\Users\Admin\AppData\Local\gDAQ6\sigverif.exe

                Filesize

                77KB

                MD5

                2151a535274b53ba8a728e542cbc07a8

                SHA1

                a2304c0f2616a7d12298540dce459dd9ccf07443

                SHA256

                064de47877b00dc35886e829a697e4adb3d3cfdf294ddba13b6009a0f415b1bd

                SHA512

                e6fd520ee1bd80a5fe8a7c2ae6446dcaabd4e335a602c36356f85305abef751b7dffa7eaac1ec13c105ccd8c3e9070bd32ed4b14bc8a9e52dc5f47b936d69a9f

              • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Rasxaa.lnk

                Filesize

                1KB

                MD5

                8e3ae67d051c8a6c7a25fe4a13d47302

                SHA1

                39061781c41ee999a57031b1a751c2c103351acf

                SHA256

                57c6d2f65b9e96c0129ea10a605a4ff93a412aabdd4dce6ec090f6cbe85f1d10

                SHA512

                26780913b414936b0423f8de9ee7fd8d19ee5dc14ac88f755881afe101c218c0233f49fbdb9d6e6e781873bc00de5addb335b15f84962deda7777873772c3782

              • memory/648-81-0x00007FFFD2A10000-0x00007FFFD2AB8000-memory.dmp

                Filesize

                672KB

              • memory/1584-66-0x00007FFFD28C0000-0x00007FFFD29AD000-memory.dmp

                Filesize

                948KB

              • memory/1584-61-0x00007FFFD28C0000-0x00007FFFD29AD000-memory.dmp

                Filesize

                948KB

              • memory/1584-63-0x0000023D88840000-0x0000023D88847000-memory.dmp

                Filesize

                28KB

              • memory/3500-8-0x0000000140000000-0x00000001400A7000-memory.dmp

                Filesize

                668KB

              • memory/3500-14-0x0000000140000000-0x00000001400A7000-memory.dmp

                Filesize

                668KB

              • memory/3500-10-0x0000000140000000-0x00000001400A7000-memory.dmp

                Filesize

                668KB

              • memory/3500-16-0x0000000140000000-0x00000001400A7000-memory.dmp

                Filesize

                668KB

              • memory/3500-9-0x0000000140000000-0x00000001400A7000-memory.dmp

                Filesize

                668KB

              • memory/3500-3-0x0000000002380000-0x0000000002381000-memory.dmp

                Filesize

                4KB

              • memory/3500-7-0x0000000140000000-0x00000001400A7000-memory.dmp

                Filesize

                668KB

              • memory/3500-6-0x0000000140000000-0x00000001400A7000-memory.dmp

                Filesize

                668KB

              • memory/3500-4-0x00007FFFEF0EA000-0x00007FFFEF0EB000-memory.dmp

                Filesize

                4KB

              • memory/3500-23-0x00000000021F0000-0x00000000021F7000-memory.dmp

                Filesize

                28KB

              • memory/3500-12-0x0000000140000000-0x00000001400A7000-memory.dmp

                Filesize

                668KB

              • memory/3500-11-0x0000000140000000-0x00000001400A7000-memory.dmp

                Filesize

                668KB

              • memory/3500-15-0x0000000140000000-0x00000001400A7000-memory.dmp

                Filesize

                668KB

              • memory/3500-26-0x00007FFFF01D0000-0x00007FFFF01E0000-memory.dmp

                Filesize

                64KB

              • memory/3500-35-0x0000000140000000-0x00000001400A7000-memory.dmp

                Filesize

                668KB

              • memory/3500-13-0x0000000140000000-0x00000001400A7000-memory.dmp

                Filesize

                668KB

              • memory/3500-24-0x0000000140000000-0x00000001400A7000-memory.dmp

                Filesize

                668KB

              • memory/3500-25-0x00007FFFF01E0000-0x00007FFFF01F0000-memory.dmp

                Filesize

                64KB

              • memory/3700-50-0x00007FFFD2A10000-0x00007FFFD2AB8000-memory.dmp

                Filesize

                672KB

              • memory/3700-45-0x00007FFFD2A10000-0x00007FFFD2AB8000-memory.dmp

                Filesize

                672KB

              • memory/3700-47-0x0000019BD63F0000-0x0000019BD63F7000-memory.dmp

                Filesize

                28KB

              • memory/5024-38-0x00007FFFE1B40000-0x00007FFFE1BE7000-memory.dmp

                Filesize

                668KB

              • memory/5024-0-0x00007FFFE1B40000-0x00007FFFE1BE7000-memory.dmp

                Filesize

                668KB

              • memory/5024-2-0x000001708C510000-0x000001708C517000-memory.dmp

                Filesize

                28KB