Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-10-2024 07:16

General

  • Target

    4b773db138c8cc3dc18a140ff7641053a01214ebb3dd8135e53e8d47e9f39d2a.dll

  • Size

    952KB

  • MD5

    b432d15a89c0b864b8f28153733c9e2e

  • SHA1

    7dd1e2dd2f3a78cecee6cee02c5725d93a412b46

  • SHA256

    4b773db138c8cc3dc18a140ff7641053a01214ebb3dd8135e53e8d47e9f39d2a

  • SHA512

    4c5eaebdb580839d6611dd34196bb084b79550ee2aa0b19ce26175fa5746ab6921a5b932a59587431abadba12ee95b048f0d2a2bb66e4ca69597bc51f41dec8b

  • SSDEEP

    6144:p34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:pIKp/UWCZdCDh2IZDwAFRpR6Au

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 11 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Event Triggered Execution: Accessibility Features 1 TTPs

    Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\4b773db138c8cc3dc18a140ff7641053a01214ebb3dd8135e53e8d47e9f39d2a.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2128
  • C:\Windows\system32\SystemPropertiesProtection.exe
    C:\Windows\system32\SystemPropertiesProtection.exe
    1⤵
      PID:936
    • C:\Users\Admin\AppData\Local\9Z7f1t\SystemPropertiesProtection.exe
      C:\Users\Admin\AppData\Local\9Z7f1t\SystemPropertiesProtection.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:4204
    • C:\Windows\system32\Magnify.exe
      C:\Windows\system32\Magnify.exe
      1⤵
        PID:376
      • C:\Users\Admin\AppData\Local\MMb3\Magnify.exe
        C:\Users\Admin\AppData\Local\MMb3\Magnify.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:1344
      • C:\Windows\system32\LockScreenContentServer.exe
        C:\Windows\system32\LockScreenContentServer.exe
        1⤵
          PID:1784
        • C:\Users\Admin\AppData\Local\kZE\LockScreenContentServer.exe
          C:\Users\Admin\AppData\Local\kZE\LockScreenContentServer.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:872

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\9Z7f1t\SYSDM.CPL

          Filesize

          956KB

          MD5

          531ac372a5a5a192037e803f6312289d

          SHA1

          d229c3ee83b88b695dadb1d2d51ce714ffe71366

          SHA256

          4e7088ca73ea2f919cf0f0d7becf8b9396b9f61ac72a4ee20212fa4b49aeaa18

          SHA512

          0feda61cf5207d3c046002360b0f8f6923f8e039b137eb8b790d2ca9f3dbf25c1f920fe9c43f7690f950427d4fa6dc2fad25b7462141e1b7e98bfd2ec4d210dd

        • C:\Users\Admin\AppData\Local\9Z7f1t\SystemPropertiesProtection.exe

          Filesize

          82KB

          MD5

          26640d2d4fa912fc9a354ef6cfe500ff

          SHA1

          a343fd82659ce2d8de3beb587088867cf2ab8857

          SHA256

          a8ddf1b17b0cbc96a7eaedb0003aa7b1631da09ebfe85b387f8f630222511b37

          SHA512

          26162a3d9d4a8e3290dbcf6fe387b5c48ab1d9552aa02a38954649d877f408cb282e57580f81e15128e3a41da0eb58328d1d6253e1b57232f9a8cecdd99991dc

        • C:\Users\Admin\AppData\Local\MMb3\Magnify.exe

          Filesize

          639KB

          MD5

          4029890c147e3b4c6f41dfb5f9834d42

          SHA1

          10d08b3f6dabe8171ca2dd52e5737e3402951c75

          SHA256

          57137f784594793dc0669042ccd3a71ddbfedeb77da6d97173d82613e08add4d

          SHA512

          dbdc60f8692f13c23dbed0b76e9c6758a5b413bd6aaf4e4d0ba74e69c0871eb759da95c3f85a31d972388b545dcf3bb8abbcbedd29a1e7e48c065130b98b893d

        • C:\Users\Admin\AppData\Local\MMb3\dwmapi.dll

          Filesize

          956KB

          MD5

          f4e54b76f1a46cac2b9f48bce556425d

          SHA1

          04d9c998e794062fef71021f5e4708e18486befd

          SHA256

          397549f5f54d12d10628ba300b30d3d2e75bea0b9d45acaef36a46fc99af993d

          SHA512

          958e9d0980ecded609dac8149994327e6abd858a303c34e30ae10ceefaf45e7d271dd633752afcffb94f1ef79aa4e5a02cf1a595dae0beca0dea3eb6fe2df2ed

        • C:\Users\Admin\AppData\Local\kZE\DUser.dll

          Filesize

          960KB

          MD5

          02ed3c524f0fcec61c0b10afd00168f7

          SHA1

          ee465d905996397d690b50c869ee437435a2c3a0

          SHA256

          aa6cceb3cd557877f6e1f66c9dfa8b4dc35503ae70b6cc1d47e9305ab7b7bb72

          SHA512

          62d6290fb70ff0290705f6d860cbcbeb7c53ac46a7586fe1c843cfebb7e7b70aa66b08a5a08dbed157aba1241bac7fa3627306b685017972979f72b18f4a24b6

        • C:\Users\Admin\AppData\Local\kZE\LockScreenContentServer.exe

          Filesize

          47KB

          MD5

          a0b7513c98cf46ca2cea3a567fec137c

          SHA1

          2307fc8e3fc620ea3c2fdc6248ad4658479ba995

          SHA256

          cb2278884f04fd34753f7a20e5865ef5fc4fa47c28df9ac14ad6e922713af8c6

          SHA512

          3928485a60ffa7f2d2b7d0be51863e1f8197578cfb397f1086a1ab5132843a23bbc4042b04b5d01fafad04878bd839161fa492d0cf1a6bac6be92023cdee3d15

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Zugrajzkhopu.lnk

          Filesize

          1KB

          MD5

          c428f26c3663a31266f0d0bff59ff72d

          SHA1

          403592a99c0f15411cf9dac60e7833a5b5c05c67

          SHA256

          13b1a8871450d6c03c1aea1303e8464aeccb3c059bc0463d969d77d5a97f070c

          SHA512

          306730fde3ebebc964b6efed4b0f85c519f0501a2579105cc7fdf4a5ae441bff540754199c28677d7cb2520e7975f8ed8d4b44b672c0a6fcc899a3b2523dd5f3

        • memory/872-80-0x00007FFCBFFE0000-0x00007FFCC00D0000-memory.dmp

          Filesize

          960KB

        • memory/872-76-0x00007FFCBFFE0000-0x00007FFCC00D0000-memory.dmp

          Filesize

          960KB

        • memory/1344-63-0x000001E025000000-0x000001E025007000-memory.dmp

          Filesize

          28KB

        • memory/1344-64-0x00007FFCC0D50000-0x00007FFCC0E3F000-memory.dmp

          Filesize

          956KB

        • memory/1344-67-0x00007FFCC0D50000-0x00007FFCC0E3F000-memory.dmp

          Filesize

          956KB

        • memory/2128-0-0x0000015620510000-0x0000015620517000-memory.dmp

          Filesize

          28KB

        • memory/2128-1-0x00007FFCCEEA0000-0x00007FFCCEF8E000-memory.dmp

          Filesize

          952KB

        • memory/2128-40-0x00007FFCCEEA0000-0x00007FFCCEF8E000-memory.dmp

          Filesize

          952KB

        • memory/3424-7-0x0000000140000000-0x00000001400EE000-memory.dmp

          Filesize

          952KB

        • memory/3424-28-0x00007FFCDE730000-0x00007FFCDE740000-memory.dmp

          Filesize

          64KB

        • memory/3424-9-0x0000000140000000-0x00000001400EE000-memory.dmp

          Filesize

          952KB

        • memory/3424-11-0x0000000140000000-0x00000001400EE000-memory.dmp

          Filesize

          952KB

        • memory/3424-15-0x0000000140000000-0x00000001400EE000-memory.dmp

          Filesize

          952KB

        • memory/3424-6-0x0000000140000000-0x00000001400EE000-memory.dmp

          Filesize

          952KB

        • memory/3424-37-0x0000000140000000-0x00000001400EE000-memory.dmp

          Filesize

          952KB

        • memory/3424-12-0x0000000140000000-0x00000001400EE000-memory.dmp

          Filesize

          952KB

        • memory/3424-13-0x0000000140000000-0x00000001400EE000-memory.dmp

          Filesize

          952KB

        • memory/3424-14-0x0000000140000000-0x00000001400EE000-memory.dmp

          Filesize

          952KB

        • memory/3424-4-0x0000000002800000-0x0000000002801000-memory.dmp

          Filesize

          4KB

        • memory/3424-3-0x00007FFCDC98A000-0x00007FFCDC98B000-memory.dmp

          Filesize

          4KB

        • memory/3424-10-0x0000000140000000-0x00000001400EE000-memory.dmp

          Filesize

          952KB

        • memory/3424-17-0x0000000140000000-0x00000001400EE000-memory.dmp

          Filesize

          952KB

        • memory/3424-26-0x0000000140000000-0x00000001400EE000-memory.dmp

          Filesize

          952KB

        • memory/3424-27-0x00007FFCDE740000-0x00007FFCDE750000-memory.dmp

          Filesize

          64KB

        • memory/3424-8-0x0000000140000000-0x00000001400EE000-memory.dmp

          Filesize

          952KB

        • memory/3424-25-0x0000000000EC0000-0x0000000000EC7000-memory.dmp

          Filesize

          28KB

        • memory/3424-18-0x0000000140000000-0x00000001400EE000-memory.dmp

          Filesize

          952KB

        • memory/3424-16-0x0000000140000000-0x00000001400EE000-memory.dmp

          Filesize

          952KB

        • memory/4204-48-0x00007FFCC0DB0000-0x00007FFCC0E9F000-memory.dmp

          Filesize

          956KB

        • memory/4204-52-0x00007FFCC0DB0000-0x00007FFCC0E9F000-memory.dmp

          Filesize

          956KB

        • memory/4204-47-0x0000020DD8110000-0x0000020DD8117000-memory.dmp

          Filesize

          28KB