Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-10-2024 00:14

General

  • Target

    4ac846154d1f91c30a373dc364d880d7f36b0d1f23edbf8e854b38b804db7549.dll

  • Size

    700KB

  • MD5

    bfbcb9e4b4723629dda33d1406a87d3a

  • SHA1

    d342007297faf30e3cd1a703b31287e735470858

  • SHA256

    4ac846154d1f91c30a373dc364d880d7f36b0d1f23edbf8e854b38b804db7549

  • SHA512

    d0679c2dead14ccc998bf6ae31c79e3e4570a345401374a099e2feb3252eb1a2a2159b559a0963523f39e4080d6ecf672d2c397c12cdce7d1a142c7eb81afd41

  • SSDEEP

    12288:dEwgKnIhABTW0HcD5a1PKxdZhC+k+V9Hgeb/tf/B9P632vHAA:dEwXnOAx5HcDM1Sxd3ChCHg2/P9yGo

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 9 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\4ac846154d1f91c30a373dc364d880d7f36b0d1f23edbf8e854b38b804db7549.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2336
  • C:\Windows\system32\quickassist.exe
    C:\Windows\system32\quickassist.exe
    1⤵
      PID:3612
    • C:\Users\Admin\AppData\Local\D0Kt\quickassist.exe
      C:\Users\Admin\AppData\Local\D0Kt\quickassist.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:1652
    • C:\Windows\system32\usocoreworker.exe
      C:\Windows\system32\usocoreworker.exe
      1⤵
        PID:2372
      • C:\Users\Admin\AppData\Local\9zA8Cqc\usocoreworker.exe
        C:\Users\Admin\AppData\Local\9zA8Cqc\usocoreworker.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:3900
      • C:\Windows\system32\CameraSettingsUIHost.exe
        C:\Windows\system32\CameraSettingsUIHost.exe
        1⤵
          PID:5076
        • C:\Users\Admin\AppData\Local\PRTQW9q\CameraSettingsUIHost.exe
          C:\Users\Admin\AppData\Local\PRTQW9q\CameraSettingsUIHost.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:4524

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\9zA8Cqc\XmlLite.dll

          Filesize

          704KB

          MD5

          92b265726eee41ec42569e4c27f0d186

          SHA1

          ab12316f8f3c3052fdd58ebf205f42848518332b

          SHA256

          24d40311f2e8ba84bf05fd18fbee78efd476d20ad17f4f10d7079e286a36f29c

          SHA512

          2fcc0c39da23b9948a901b070d32f631804f45b2c0978a6738e2f61fcdf8c83694d14d13fa4e8fadcdc457c05be05f1710f92c975e36930bdab07e655377f4e0

        • C:\Users\Admin\AppData\Local\9zA8Cqc\usocoreworker.exe

          Filesize

          1.3MB

          MD5

          2c5efb321aa64af37dedc6383ce3198e

          SHA1

          a06d7020dd43a57047a62bfb443091cd9de946ba

          SHA256

          0fb6688a32340036f3eaab4a09a82dee533bfb2ca266c36f6142083134de6f0e

          SHA512

          5448ea01b24af7444505bda80064849a2efcc459011d32879e021e836fd573c9b1b9d3b37291d3f53ff536c691ac13a545b12f318a16c8a367421986bbf002ed

        • C:\Users\Admin\AppData\Local\D0Kt\UxTheme.dll

          Filesize

          704KB

          MD5

          58e0eb27a532bf355004b8fbff916991

          SHA1

          111d0e80fbbfb80452c30aebd8887ec6d8ca289d

          SHA256

          6aa14728d23fcb33d3184da5d013869570d01475f4c486e8d39b46914eb8d290

          SHA512

          45234ea0a638db74caaf38ec60e83b1b2f7cc54b570423cca293b8e574079e8b6146f183172efbf67af63f293f6739cdb88f04bc1f8c74945957c84223deddd6

        • C:\Users\Admin\AppData\Local\D0Kt\quickassist.exe

          Filesize

          665KB

          MD5

          d1216f9b9a64fd943539cc2b0ddfa439

          SHA1

          6fad9aeb7780bdfd88a9a5a73b35b3e843605e6c

          SHA256

          c1e8fda00da574e8759ba262d76b6edc1d5f4a80620730ef0be7527e0d803db2

          SHA512

          c5fd7d81d1d478056fcbed0ba887ce551832f0104e7c31753c3c8760b4d63f38324f74e996684042acc8f9682fce8a8c85172741a868257e87d5e0f988c4e567

        • C:\Users\Admin\AppData\Local\PRTQW9q\CameraSettingsUIHost.exe

          Filesize

          31KB

          MD5

          9e98636523a653c7a648f37be229cf69

          SHA1

          bd4da030e7cf4d55b7c644dfacd26b152e6a14c4

          SHA256

          3bf20bc5a208dfa1ea26a042fd0010b1268dcfedc94ed775f11890bc1d95e717

          SHA512

          41966166e2ddfe40e6f4e6da26bc490775caac9997465c6dd94ba6a664d3a797ffc2aa5684c95702e8657e5cea62a46a75aee3e7d5e07a47dcaaa5c4da565e78

        • C:\Users\Admin\AppData\Local\PRTQW9q\DUI70.dll

          Filesize

          980KB

          MD5

          290901bfe64ffdbe1b3940ab43a56a00

          SHA1

          6c9eb7703fd3872a3a5f15a5084c656a540c6f26

          SHA256

          f02ae93ba8ad9fe306721bcbf469730f1a248a7ebdaf4958a8c0bf99a5798a92

          SHA512

          805de588d3be2ecc374d13b91925a9deb3e747314a39815535fe809832a94245b994ef7b411cffa216a5295b879c96086b1bbed12e54908ef403cb0a7592cad3

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Ybgihhkn.lnk

          Filesize

          1KB

          MD5

          6bd4d0ab2baf67f75a3cff999259a474

          SHA1

          ae545c56d639d9f54663521139bcf176195fc660

          SHA256

          78205aba6af28704ca9e98f457f31d724369f8f4e3172b43a4100901ef09a5be

          SHA512

          63f912759be73747af4684f9307357c580b8abd86c858be44e719a5745631f7961368cb78bd01a7e87c77818a9547792941d8629f5bed751cc9736cd5949a0cd

        • memory/1652-50-0x0000000140000000-0x00000001400B0000-memory.dmp

          Filesize

          704KB

        • memory/1652-46-0x0000000140000000-0x00000001400B0000-memory.dmp

          Filesize

          704KB

        • memory/1652-45-0x000002012B180000-0x000002012B187000-memory.dmp

          Filesize

          28KB

        • memory/2336-38-0x0000000140000000-0x00000001400AF000-memory.dmp

          Filesize

          700KB

        • memory/2336-2-0x00000152017A0000-0x00000152017A7000-memory.dmp

          Filesize

          28KB

        • memory/2336-0-0x0000000140000000-0x00000001400AF000-memory.dmp

          Filesize

          700KB

        • memory/3508-13-0x0000000140000000-0x00000001400AF000-memory.dmp

          Filesize

          700KB

        • memory/3508-15-0x0000000140000000-0x00000001400AF000-memory.dmp

          Filesize

          700KB

        • memory/3508-9-0x0000000140000000-0x00000001400AF000-memory.dmp

          Filesize

          700KB

        • memory/3508-8-0x0000000140000000-0x00000001400AF000-memory.dmp

          Filesize

          700KB

        • memory/3508-7-0x0000000140000000-0x00000001400AF000-memory.dmp

          Filesize

          700KB

        • memory/3508-6-0x0000000140000000-0x00000001400AF000-memory.dmp

          Filesize

          700KB

        • memory/3508-25-0x00007FFED21E0000-0x00007FFED21F0000-memory.dmp

          Filesize

          64KB

        • memory/3508-35-0x0000000140000000-0x00000001400AF000-memory.dmp

          Filesize

          700KB

        • memory/3508-26-0x00007FFED21D0000-0x00007FFED21E0000-memory.dmp

          Filesize

          64KB

        • memory/3508-24-0x0000000140000000-0x00000001400AF000-memory.dmp

          Filesize

          700KB

        • memory/3508-11-0x0000000140000000-0x00000001400AF000-memory.dmp

          Filesize

          700KB

        • memory/3508-10-0x0000000140000000-0x00000001400AF000-memory.dmp

          Filesize

          700KB

        • memory/3508-23-0x0000000004E00000-0x0000000004E07000-memory.dmp

          Filesize

          28KB

        • memory/3508-14-0x0000000140000000-0x00000001400AF000-memory.dmp

          Filesize

          700KB

        • memory/3508-5-0x00007FFED1B7A000-0x00007FFED1B7B000-memory.dmp

          Filesize

          4KB

        • memory/3508-3-0x0000000008B70000-0x0000000008B71000-memory.dmp

          Filesize

          4KB

        • memory/3508-12-0x0000000140000000-0x00000001400AF000-memory.dmp

          Filesize

          700KB

        • memory/3900-66-0x0000000140000000-0x00000001400B0000-memory.dmp

          Filesize

          704KB

        • memory/3900-63-0x000001F2F2CA0000-0x000001F2F2CA7000-memory.dmp

          Filesize

          28KB

        • memory/4524-77-0x0000000140000000-0x00000001400F5000-memory.dmp

          Filesize

          980KB

        • memory/4524-81-0x0000000140000000-0x00000001400F5000-memory.dmp

          Filesize

          980KB