Analysis

  • max time kernel
    149s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-10-2024 05:07

General

  • Target

    12165e6cc5aa936770832b61eada40b38d30dc9ec123117868d795165810d108.dll

  • Size

    668KB

  • MD5

    53f22cec29ddc10f57ffe3e4348d5d8c

  • SHA1

    9d3c7d20606c1b9fe7f302b7d62eb9fbfd66a5c8

  • SHA256

    12165e6cc5aa936770832b61eada40b38d30dc9ec123117868d795165810d108

  • SHA512

    6ee3f97e5e536b31ebfcc422eb5fcfdf995bb49ac79335bb1e9e36cc61da9a7899cb72e31147e44a50dbd247231caa700c27aa26388792c422e256920c955e84

  • SSDEEP

    6144:D34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuT9:DIKp/UWCZdCDh2IZDwAFRpR6Au

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 12 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\12165e6cc5aa936770832b61eada40b38d30dc9ec123117868d795165810d108.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:1716
  • C:\Windows\system32\mmc.exe
    C:\Windows\system32\mmc.exe
    1⤵
      PID:2496
    • C:\Users\Admin\AppData\Local\cz2xQ\mmc.exe
      C:\Users\Admin\AppData\Local\cz2xQ\mmc.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2532
    • C:\Windows\system32\BitLockerWizard.exe
      C:\Windows\system32\BitLockerWizard.exe
      1⤵
        PID:576
      • C:\Users\Admin\AppData\Local\3az3iwN\BitLockerWizard.exe
        C:\Users\Admin\AppData\Local\3az3iwN\BitLockerWizard.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:824
      • C:\Windows\system32\dpapimig.exe
        C:\Windows\system32\dpapimig.exe
        1⤵
          PID:844
        • C:\Users\Admin\AppData\Local\Ta9bMC\dpapimig.exe
          C:\Users\Admin\AppData\Local\Ta9bMC\dpapimig.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:2848

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\3az3iwN\FVEWIZ.dll

          Filesize

          672KB

          MD5

          72bb0b2077d377a9ec271811946c321e

          SHA1

          d9c9cf1a2a1176bae36a87bcab40b7a64d782d09

          SHA256

          d9550656de5ae25e37bf906a1c175df38820193e2bff5a30526bbacc8c4dd942

          SHA512

          dcbf2f956ff24f5407b882355fb578333d0f9018222492977331abfa68c5ca9c33dadfb1e8ded98eb11a8edeef43dee3310a3eb9ba89f318a540d0016a597cfd

        • C:\Users\Admin\AppData\Local\Ta9bMC\dpapimig.exe

          Filesize

          73KB

          MD5

          0e8b8abea4e23ddc9a70614f3f651303

          SHA1

          6d332ba4e7a78039f75b211845514ab35ab467b2

          SHA256

          66fc6b68e54b8840a38b4de980cc22aed21009afc1494a9cc68e892329f076a1

          SHA512

          4feded78f9b953472266693e0943030d00f82a5cc8559df60ae0479de281164155e19687afc67cba74d04bb9ad092f5c7732f2d2f9b06274ca2ae87dc2d4a6dc

        • C:\Users\Admin\AppData\Local\cz2xQ\UxTheme.dll

          Filesize

          672KB

          MD5

          08e7e168d17bd6f499c6b7db6a82dbc6

          SHA1

          9235ad78fa903438a968d435093e0a9459156bae

          SHA256

          f8bd479c4ab5e4d5cf1ba757e8dbe837c2948384a888d0dc4cc95be708e43bb0

          SHA512

          ab7b8936bf951beac30caab88e4e74bbd9e541d3855ce10e476104d7e69592f8307e81557d4714999f6911e49e93cd64dcf4c87f98e0323044bbde18cdb3f327

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Ukatmrkmywz.lnk

          Filesize

          1KB

          MD5

          abf16ead421073215dcec1da9f8f8cc7

          SHA1

          346070b34f2105c9c3475d46e26fe5477ce9a4e0

          SHA256

          132feec79815a799e91ff90d005096117b90d933b4e99f3d2044fc4214c7785a

          SHA512

          f802363e2ff4bd5a1deef7f69d777385baacca676bbf294cfa4003210e1c0f7487e92a978d899527910381efc54d1e828cac0238193ada1242edcbf27bb3b3d9

        • \Users\Admin\AppData\Local\3az3iwN\BitLockerWizard.exe

          Filesize

          98KB

          MD5

          08a761595ad21d152db2417d6fdb239a

          SHA1

          d84c1bc2e8c9afce9fb79916df9bca169f93a936

          SHA256

          ec0b9e5f29a43f9db44fa76b85701058f26776ab974044c1d4741591b74d0620

          SHA512

          8b07828e9c0edf09277f89294b8e1a54816f6f3d1fe132b3eb70370b81feb82d056ec31566793bd6f451725f79c3b4aeedb15a83216115e00943e0c19cab37c9

        • \Users\Admin\AppData\Local\Ta9bMC\DUI70.dll

          Filesize

          876KB

          MD5

          613c4c9d44b6e3f8f30ab59ad43c570b

          SHA1

          550420977cb06e0d21463ceae9c33c36d1ae15a3

          SHA256

          d06d48f69089ec566aa3e2102bd392c3bd74704e1cd0d78f0aae90bc10e2ec28

          SHA512

          e9b98710b7d7593ad79b7ea7dc6e926e3b2a32979d67a54b0e7cb76c3841d1de6830309c11801c9c475e35375938ba21163b27b977c70fae7cd6a784e371fe4b

        • \Users\Admin\AppData\Local\cz2xQ\mmc.exe

          Filesize

          2.0MB

          MD5

          9fea051a9585f2a303d55745b4bf63aa

          SHA1

          f5dc12d658402900a2b01af2f018d113619b96b8

          SHA256

          b212e59e4c7fe77f6f189138d9d8b151e50eb83a35d6eadfb1e4bb0b4262c484

          SHA512

          beba79f0b6710929871fbdf378d3c0a41f230ac30cbfa87173f7b77c35e06425f48db42ed3b16d5d9bcb7ef0098dffcd0d2947da8fb7ec1136ea62205f1afc76

        • memory/824-76-0x0000000000280000-0x0000000000287000-memory.dmp

          Filesize

          28KB

        • memory/824-73-0x000007FEF6440000-0x000007FEF64E8000-memory.dmp

          Filesize

          672KB

        • memory/824-71-0x000007FEF6440000-0x000007FEF64E8000-memory.dmp

          Filesize

          672KB

        • memory/824-70-0x0000000000280000-0x0000000000287000-memory.dmp

          Filesize

          28KB

        • memory/1200-25-0x0000000077420000-0x0000000077422000-memory.dmp

          Filesize

          8KB

        • memory/1200-9-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1200-15-0x00000000024C0000-0x00000000024C7000-memory.dmp

          Filesize

          28KB

        • memory/1200-14-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1200-13-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1200-24-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1200-26-0x0000000077450000-0x0000000077452000-memory.dmp

          Filesize

          8KB

        • memory/1200-3-0x00000000770B6000-0x00000000770B7000-memory.dmp

          Filesize

          4KB

        • memory/1200-35-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1200-36-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1200-4-0x00000000024E0000-0x00000000024E1000-memory.dmp

          Filesize

          4KB

        • memory/1200-45-0x00000000770B6000-0x00000000770B7000-memory.dmp

          Filesize

          4KB

        • memory/1200-17-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1200-12-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1200-6-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1200-10-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1200-11-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1200-7-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1200-8-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1200-16-0x0000000140000000-0x00000001400A7000-memory.dmp

          Filesize

          668KB

        • memory/1716-44-0x000007FEF69B0000-0x000007FEF6A57000-memory.dmp

          Filesize

          668KB

        • memory/1716-0-0x000007FEF69B0000-0x000007FEF6A57000-memory.dmp

          Filesize

          668KB

        • memory/1716-2-0x0000000000190000-0x0000000000197000-memory.dmp

          Filesize

          28KB

        • memory/2532-58-0x000007FEF6380000-0x000007FEF6428000-memory.dmp

          Filesize

          672KB

        • memory/2532-54-0x000007FEF6380000-0x000007FEF6428000-memory.dmp

          Filesize

          672KB

        • memory/2532-53-0x00000000001E0000-0x00000000001E7000-memory.dmp

          Filesize

          28KB

        • memory/2848-88-0x000007FEF6410000-0x000007FEF64EB000-memory.dmp

          Filesize

          876KB

        • memory/2848-92-0x000007FEF6410000-0x000007FEF64EB000-memory.dmp

          Filesize

          876KB