Analysis

  • max time kernel
    115s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02/11/2024, 02:59

General

  • Target

    ff69e56f8ee29f346c9495468b07dc2d2eb486642a1cfcc54d31d7a813bd95ef.dll

  • Size

    672KB

  • MD5

    584c0aedb20485c2e84e74c629507bca

  • SHA1

    68adc01881c74a7e747c02fcc8b3bf6a992595c7

  • SHA256

    ff69e56f8ee29f346c9495468b07dc2d2eb486642a1cfcc54d31d7a813bd95ef

  • SHA512

    f0de47f3fe7cac1ec434e5e29d33c6ace9e3ee64102acd2f5c05860d782f6c74f34b740ad21615fff80054c9bfa2333492a9c9ed51f182dc3f72805901945e4e

  • SSDEEP

    6144:t34xznfAp4x+NWMqW/KZ1vCDTEpc2bysCZR6iwAtUnWKT5WK8Rpv1llfFfCRAuTF:tIKp/UWCZdCDh2IZDwAFRpR6Au

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex family
  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Dridex payload 10 IoCs

    Detects Dridex x64 core DLL in memory.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Event Triggered Execution: Accessibility Features 1 TTPs

    Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ff69e56f8ee29f346c9495468b07dc2d2eb486642a1cfcc54d31d7a813bd95ef.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2492
  • C:\Windows\system32\MpSigStub.exe
    C:\Windows\system32\MpSigStub.exe
    1⤵
      PID:2892
    • C:\Users\Admin\AppData\Local\H2M5ofnrv\MpSigStub.exe
      C:\Users\Admin\AppData\Local\H2M5ofnrv\MpSigStub.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Suspicious behavior: EnumeratesProcesses
      PID:2792
    • C:\Windows\system32\DisplaySwitch.exe
      C:\Windows\system32\DisplaySwitch.exe
      1⤵
        PID:3044
      • C:\Users\Admin\AppData\Local\emVQA\DisplaySwitch.exe
        C:\Users\Admin\AppData\Local\emVQA\DisplaySwitch.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:2344
      • C:\Windows\system32\SystemPropertiesProtection.exe
        C:\Windows\system32\SystemPropertiesProtection.exe
        1⤵
          PID:1616
        • C:\Users\Admin\AppData\Local\YgHLAEwS\SystemPropertiesProtection.exe
          C:\Users\Admin\AppData\Local\YgHLAEwS\SystemPropertiesProtection.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:952

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\H2M5ofnrv\MpSigStub.exe

                Filesize

                264KB

                MD5

                2e6bd16aa62e5e95c7b256b10d637f8f

                SHA1

                350be084477b1fe581af83ca79eb58d4defe260f

                SHA256

                d795968b8067bb610033fa4a5b21eb2f96cef61513aba62912b8eb5c6a5ff7b3

                SHA512

                1f37150f6bcbe0df54bb85a5ad585824cea9332baa9be1649a95c1dfb41723de85c09d98fb2ca8261a49c2184d3bda638b84b2b7b60b97fe42a15ab1620a2542

              • C:\Users\Admin\AppData\Local\H2M5ofnrv\VERSION.dll

                Filesize

                676KB

                MD5

                3e9b37660426409713976996bc4fd1d8

                SHA1

                73999a809db1dbe36132f824f358e5e0f08350f0

                SHA256

                fa31e8e7b3665b4cd2d01a060948d9a9bdd56d6bc070d1fae1f37453d553dab7

                SHA512

                26ccf9eeb29c22073da0a4d1fd5fe925215fc053e5592fc02ce0331c8ceaabd6b545b621ec3640a1330f5a223fcf25496f67d8590bc6de684663367a2af8e0cf

              • C:\Users\Admin\AppData\Local\YgHLAEwS\SYSDM.CPL

                Filesize

                676KB

                MD5

                ff6a5a0c7cd67483dec9942d49347065

                SHA1

                93888bf01a4148dceebebc09275c2df9b2a03944

                SHA256

                29b705d122009cbcfb0430e112cabbed3151850dd3b50a8c82a29cce1f2839a1

                SHA512

                d4c21374e748c3338814ee56832ab551d91c5d08caa0fd24f745201c3433d85a0fd86feeb53629c8c4bbd9f0cb632760e1185e89f805b841ca6d5c6963068ef4

              • C:\Users\Admin\AppData\Local\emVQA\slc.dll

                Filesize

                676KB

                MD5

                b63fab0b41a6cb9658206a79bdd2432e

                SHA1

                856514326a35f30c17a48b2c9c077a8e89fa4a03

                SHA256

                db8ab10b5360dbafe51f17b3a1c37f499c9339618650704b843ea3e0e7e27f01

                SHA512

                d6a3a5c1f18d3c12ecb99732a418bf9a6bd585595a425927e10e8964170d71c0fe5e9c77b89c7911960d46eef357a4be213f2c2c03e966115c44a0ff25ed3637

              • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Ukatmrkmywz.lnk

                Filesize

                1KB

                MD5

                141bb4ca029abc36d7cfdf5c58cfe99c

                SHA1

                754e1a8a9d525e56341521de5a3ffc3bd5d6ba6e

                SHA256

                0a73305124a3650e682efb5b12ca74b259ea0125b0ba4ad76de64997f1a3b3ff

                SHA512

                978f323b2d189a5d6c43858f68a6b3deb0d5f25f3e7e8ec33f01dd4b419e1075f7775f79094205c3e49cc47c71b4d826d9d7d8818fc1c57eedc047d0ae187624

              • \Users\Admin\AppData\Local\YgHLAEwS\SystemPropertiesProtection.exe

                Filesize

                80KB

                MD5

                05138d8f952d3fff1362f7c50158bc38

                SHA1

                780bc59fcddf06a7494d09771b8340acffdcc720

                SHA256

                753a43d8aa74341d06582bd6b3784dc5f8c6f46174c2a306cf284de238a9c6bd

                SHA512

                27fa8c0af3d01f0816852d04693087f3c25d1307d8857a7ea75b0bb3e0ac927d262f5ac5a335afee150142fa3187354d33ebbcf6c3cd5cc33cb4e6cd00c50255

              • \Users\Admin\AppData\Local\emVQA\DisplaySwitch.exe

                Filesize

                517KB

                MD5

                b795e6138e29a37508285fc31e92bd78

                SHA1

                d0fe0c38c7c61adbb77e58d48b96cd4bf98ecd4a

                SHA256

                01a9733871baa8518092bade3fce62dcca14cdf6fc55b98218253580b38d7659

                SHA512

                8312174a77bab5fef7c4e9efff66c43d3515b02f5766ed1d3b9bd0abb3d7344a9a22cbac228132098428c122293d2b1898b3a2d75f5e4247b1dcb9aa9c7913b1

              • memory/952-92-0x000007FEF7540000-0x000007FEF75E9000-memory.dmp

                Filesize

                676KB

              • memory/1200-27-0x0000000077460000-0x0000000077462000-memory.dmp

                Filesize

                8KB

              • memory/1200-46-0x00000000770C6000-0x00000000770C7000-memory.dmp

                Filesize

                4KB

              • memory/1200-15-0x0000000140000000-0x00000001400A8000-memory.dmp

                Filesize

                672KB

              • memory/1200-14-0x0000000140000000-0x00000001400A8000-memory.dmp

                Filesize

                672KB

              • memory/1200-13-0x0000000140000000-0x00000001400A8000-memory.dmp

                Filesize

                672KB

              • memory/1200-11-0x0000000140000000-0x00000001400A8000-memory.dmp

                Filesize

                672KB

              • memory/1200-9-0x0000000140000000-0x00000001400A8000-memory.dmp

                Filesize

                672KB

              • memory/1200-8-0x0000000140000000-0x00000001400A8000-memory.dmp

                Filesize

                672KB

              • memory/1200-7-0x0000000140000000-0x00000001400A8000-memory.dmp

                Filesize

                672KB

              • memory/1200-24-0x0000000002CF0000-0x0000000002CF7000-memory.dmp

                Filesize

                28KB

              • memory/1200-3-0x00000000770C6000-0x00000000770C7000-memory.dmp

                Filesize

                4KB

              • memory/1200-26-0x0000000077430000-0x0000000077432000-memory.dmp

                Filesize

                8KB

              • memory/1200-36-0x0000000140000000-0x00000001400A8000-memory.dmp

                Filesize

                672KB

              • memory/1200-37-0x0000000140000000-0x00000001400A8000-memory.dmp

                Filesize

                672KB

              • memory/1200-4-0x0000000002D10000-0x0000000002D11000-memory.dmp

                Filesize

                4KB

              • memory/1200-16-0x0000000140000000-0x00000001400A8000-memory.dmp

                Filesize

                672KB

              • memory/1200-25-0x0000000140000000-0x00000001400A8000-memory.dmp

                Filesize

                672KB

              • memory/1200-17-0x0000000140000000-0x00000001400A8000-memory.dmp

                Filesize

                672KB

              • memory/1200-6-0x0000000140000000-0x00000001400A8000-memory.dmp

                Filesize

                672KB

              • memory/1200-10-0x0000000140000000-0x00000001400A8000-memory.dmp

                Filesize

                672KB

              • memory/1200-12-0x0000000140000000-0x00000001400A8000-memory.dmp

                Filesize

                672KB

              • memory/2344-76-0x000007FEF7540000-0x000007FEF75E9000-memory.dmp

                Filesize

                676KB

              • memory/2344-73-0x0000000000280000-0x0000000000287000-memory.dmp

                Filesize

                28KB

              • memory/2492-45-0x000007FEF6A60000-0x000007FEF6B08000-memory.dmp

                Filesize

                672KB

              • memory/2492-2-0x0000000000110000-0x0000000000117000-memory.dmp

                Filesize

                28KB

              • memory/2492-0-0x000007FEF6A60000-0x000007FEF6B08000-memory.dmp

                Filesize

                672KB

              • memory/2792-54-0x0000000000090000-0x0000000000097000-memory.dmp

                Filesize

                28KB

              • memory/2792-59-0x000007FEF7540000-0x000007FEF75E9000-memory.dmp

                Filesize

                676KB

              • memory/2792-55-0x000007FEF7540000-0x000007FEF75E9000-memory.dmp

                Filesize

                676KB