Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2024, 20:49

General

  • Target

    02381d7d554ad7da5ee83db9cb0de32a4c83a05525750c8a89d8152a383725be.dll

  • Size

    1.4MB

  • MD5

    48ed0fa711c99b5dd370d33fd7283d7e

  • SHA1

    afc37df20ce5ebeff233832df9e90027589efddb

  • SHA256

    02381d7d554ad7da5ee83db9cb0de32a4c83a05525750c8a89d8152a383725be

  • SHA512

    c6a8e79fc63d5354221e45ea9e2cde1e079f4916f0cb53377b131f3d477fcb3d6650f79cd10fa8331e36947e335c032755027db07916d0c40d55c56553082935

  • SSDEEP

    12288:TkMZ+g4TyilMqFvPIV93i/S0hzmOBt5nihfSxI/mhjEvqJ0D/eAQsroXAkH64C:TkMZ+gf4ltGd8H1fYO0q2G1Ah

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex family
  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 11 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Event Triggered Execution: Accessibility Features 1 TTPs

    Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\02381d7d554ad7da5ee83db9cb0de32a4c83a05525750c8a89d8152a383725be.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:1736
  • C:\Windows\system32\Utilman.exe
    C:\Windows\system32\Utilman.exe
    1⤵
      PID:2648
    • C:\Users\Admin\AppData\Local\aQt6\Utilman.exe
      C:\Users\Admin\AppData\Local\aQt6\Utilman.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2600
    • C:\Windows\system32\rrinstaller.exe
      C:\Windows\system32\rrinstaller.exe
      1⤵
        PID:668
      • C:\Users\Admin\AppData\Local\aLpggal\rrinstaller.exe
        C:\Users\Admin\AppData\Local\aLpggal\rrinstaller.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:1944
      • C:\Windows\system32\eudcedit.exe
        C:\Windows\system32\eudcedit.exe
        1⤵
          PID:2668
        • C:\Users\Admin\AppData\Local\rvJ0Fw\eudcedit.exe
          C:\Users\Admin\AppData\Local\rvJ0Fw\eudcedit.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:2856

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\aLpggal\MFPlat.DLL

                Filesize

                1.4MB

                MD5

                71961a7eab625d987afc3832766798c7

                SHA1

                2c2e4f093d6db6051969db6759ae026ddb7e8926

                SHA256

                62ef72edf9c4df98f64ec16a1c61675f7a38db79e7272e6fa75329646213d078

                SHA512

                d596e25faffccf66c2a375960643526598ee92a0cd47845b6155635fedb3523b562558b2c59105d6bfd2670990280876b842896a891fba74293d362b5b1e573e

              • C:\Users\Admin\AppData\Local\aQt6\DUI70.dll

                Filesize

                1.6MB

                MD5

                6dbe4987109acf78b520b67d1abb12ea

                SHA1

                fe1352332912d2e2b27ab135306182547d13ea85

                SHA256

                2d08da3d3e63068dd8db2673ad2e0cae8296797ce0cc500930876d352548dbd2

                SHA512

                042a6e1e2a69b167962a7152d0b59884ab55d73a1756ca8b4af7d73687502f39aa1d790add6b5c5b32d410499051a0f820768b1c83c5ab2224f2eef673a12fb3

              • C:\Users\Admin\AppData\Local\rvJ0Fw\MFC42u.dll

                Filesize

                1.4MB

                MD5

                9b2604b3079d62189cbd29817a21f705

                SHA1

                b7a0d38afb2cbed9aa36de620eff663161fbbe18

                SHA256

                3fe59b1393267850244f4f29884f7d794377371c0938e39a97a2779bfa3f23b7

                SHA512

                a5c74ff7aaa1853c9fbaec9ad2a994ade6c28a33cedaa3057c70e4d062846ea1eb9ac1489d734fe586f8fcc6b4936c3c6b065d0648b5f616563ab9a3490ae244

              • C:\Users\Admin\AppData\Local\rvJ0Fw\eudcedit.exe

                Filesize

                351KB

                MD5

                35e397d6ca8407b86d8a7972f0c90711

                SHA1

                6b39830003906ef82442522d22b80460c03f6082

                SHA256

                1f64118bdc3515e8e9fce6ad182f6d0c8a6528d638fedb4901a6152cde4c7cde

                SHA512

                71b0c4ac120e5841308b0c19718bdc28366b0d79c8177091328ef5421392b9ee5e4758816ffb8c0977f178e1b33ed064f64781eaf7d6952878dc8aea402f035e

              • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Adlnwv.lnk

                Filesize

                1003B

                MD5

                4a97b4079470dc8d7efd12e7f4df9ca8

                SHA1

                eee8a4332378fc7376b0729445fa9e300bcc89b0

                SHA256

                d023a7dcd202446421af406d28c5ee51341069eff4d4f2a2c8b29975af542be0

                SHA512

                7bb90c200997e47be6e77239ca0c631a44c673f58a254a27bef349f125602aac16528e36add358e5b7f8a2d4cae84c843f0278ff11592ee0744ea9d2de6fa4a4

              • \Users\Admin\AppData\Local\aLpggal\rrinstaller.exe

                Filesize

                54KB

                MD5

                0d3a73b0b30252680b383532f1758649

                SHA1

                9f098d2037e4dd94eca6d04c37b3d4ad8b0cc931

                SHA256

                fc8a992b6ac311e1b1491ec3e31e273a41f7fdf3f68176321307b68489a03fbc

                SHA512

                a7961f4d8d0e07959d1501d721c7751b01af6704c7da5c1f31e40de5372ee6a1fce2f3e0077c8e6a1bed017e11ce4be9b0d17c04e30b222fb3f0df67b870b2d4

              • \Users\Admin\AppData\Local\aQt6\Utilman.exe

                Filesize

                1.3MB

                MD5

                32c5ee55eadfc071e57851e26ac98477

                SHA1

                8f8d0aee344e152424143da49ce2c7badabb8f9d

                SHA256

                7ca90616e68bc851f14658a366d80f21ddb7a7dd8a866049e54651158784a9ea

                SHA512

                e0943efa81f3087c84a5909c72a436671ee8cc3cc80154901430e83ec7966aac800ad4b26f4a174a0071da617c0982ceda584686c6e2056e1a83e864aca6c975

              • memory/1204-14-0x0000000140000000-0x0000000140167000-memory.dmp

                Filesize

                1.4MB

              • memory/1204-48-0x0000000076FB6000-0x0000000076FB7000-memory.dmp

                Filesize

                4KB

              • memory/1204-15-0x0000000140000000-0x0000000140167000-memory.dmp

                Filesize

                1.4MB

              • memory/1204-3-0x0000000076FB6000-0x0000000076FB7000-memory.dmp

                Filesize

                4KB

              • memory/1204-13-0x0000000140000000-0x0000000140167000-memory.dmp

                Filesize

                1.4MB

              • memory/1204-12-0x0000000140000000-0x0000000140167000-memory.dmp

                Filesize

                1.4MB

              • memory/1204-11-0x0000000140000000-0x0000000140167000-memory.dmp

                Filesize

                1.4MB

              • memory/1204-10-0x0000000140000000-0x0000000140167000-memory.dmp

                Filesize

                1.4MB

              • memory/1204-9-0x0000000140000000-0x0000000140167000-memory.dmp

                Filesize

                1.4MB

              • memory/1204-8-0x0000000140000000-0x0000000140167000-memory.dmp

                Filesize

                1.4MB

              • memory/1204-27-0x0000000140000000-0x0000000140167000-memory.dmp

                Filesize

                1.4MB

              • memory/1204-18-0x0000000140000000-0x0000000140167000-memory.dmp

                Filesize

                1.4MB

              • memory/1204-29-0x0000000077250000-0x0000000077252000-memory.dmp

                Filesize

                8KB

              • memory/1204-28-0x0000000077220000-0x0000000077222000-memory.dmp

                Filesize

                8KB

              • memory/1204-38-0x0000000140000000-0x0000000140167000-memory.dmp

                Filesize

                1.4MB

              • memory/1204-40-0x0000000140000000-0x0000000140167000-memory.dmp

                Filesize

                1.4MB

              • memory/1204-4-0x0000000002540000-0x0000000002541000-memory.dmp

                Filesize

                4KB

              • memory/1204-16-0x0000000140000000-0x0000000140167000-memory.dmp

                Filesize

                1.4MB

              • memory/1204-19-0x0000000002520000-0x0000000002527000-memory.dmp

                Filesize

                28KB

              • memory/1204-17-0x0000000140000000-0x0000000140167000-memory.dmp

                Filesize

                1.4MB

              • memory/1204-6-0x0000000140000000-0x0000000140167000-memory.dmp

                Filesize

                1.4MB

              • memory/1204-7-0x0000000140000000-0x0000000140167000-memory.dmp

                Filesize

                1.4MB

              • memory/1736-47-0x0000000140000000-0x0000000140167000-memory.dmp

                Filesize

                1.4MB

              • memory/1736-2-0x00000000001A0000-0x00000000001A7000-memory.dmp

                Filesize

                28KB

              • memory/1736-0-0x0000000140000000-0x0000000140167000-memory.dmp

                Filesize

                1.4MB

              • memory/1944-73-0x0000000000090000-0x0000000000097000-memory.dmp

                Filesize

                28KB

              • memory/1944-74-0x0000000140000000-0x0000000140169000-memory.dmp

                Filesize

                1.4MB

              • memory/1944-78-0x0000000140000000-0x0000000140169000-memory.dmp

                Filesize

                1.4MB

              • memory/2600-61-0x0000000140000000-0x000000014019B000-memory.dmp

                Filesize

                1.6MB

              • memory/2600-58-0x0000000000410000-0x0000000000417000-memory.dmp

                Filesize

                28KB

              • memory/2600-56-0x0000000140000000-0x000000014019B000-memory.dmp

                Filesize

                1.6MB

              • memory/2856-90-0x0000000140000000-0x000000014016E000-memory.dmp

                Filesize

                1.4MB

              • memory/2856-94-0x0000000140000000-0x000000014016E000-memory.dmp

                Filesize

                1.4MB