Analysis

  • max time kernel
    120s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-11-2024 16:18

General

  • Target

    b6f78736575bea5b38983159e95a2f629265f4cd083f5773fc418b4c88ce0f41N.dll

  • Size

    1.5MB

  • MD5

    c026fef0b6c83c6a08c9087fc4fb41c0

  • SHA1

    d029a15df448443c79f3880f07bad27cd0e514d7

  • SHA256

    b6f78736575bea5b38983159e95a2f629265f4cd083f5773fc418b4c88ce0f41

  • SHA512

    f5fb293ef024d11d6cae0142e199c134ce3ddd03bab007f41d07ca896ff7dd38cc86556174f1da5f6affeedd1e09d245680e294f7629c5b73fe9d9de7fa12a6d

  • SSDEEP

    12288:SVI0W/TtlPLfJCm3WIYxJ9yK5IQ9PElOlidGAWilgm5Qq0nB6wtt4AenZ1:PfP7fWsK5z9A+WGAW+V5SB6Ct4bnb

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex family
  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\b6f78736575bea5b38983159e95a2f629265f4cd083f5773fc418b4c88ce0f41N.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:400
  • C:\Windows\system32\SystemPropertiesAdvanced.exe
    C:\Windows\system32\SystemPropertiesAdvanced.exe
    1⤵
      PID:3320
    • C:\Users\Admin\AppData\Local\iTQ0dF5\SystemPropertiesAdvanced.exe
      C:\Users\Admin\AppData\Local\iTQ0dF5\SystemPropertiesAdvanced.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:4532
    • C:\Windows\system32\SysResetErr.exe
      C:\Windows\system32\SysResetErr.exe
      1⤵
        PID:1592
      • C:\Users\Admin\AppData\Local\sjrbJT2\SysResetErr.exe
        C:\Users\Admin\AppData\Local\sjrbJT2\SysResetErr.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:3308
      • C:\Windows\system32\sdclt.exe
        C:\Windows\system32\sdclt.exe
        1⤵
          PID:1812
        • C:\Users\Admin\AppData\Local\SCzD5\sdclt.exe
          C:\Users\Admin\AppData\Local\SCzD5\sdclt.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:440

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\SCzD5\SPP.dll

          Filesize

          1.5MB

          MD5

          b6ee322a48ed5482a9c6a99b910f3936

          SHA1

          4f82d0b85c556c4cf884cae3c660e019c233cded

          SHA256

          285cb55a8c7511a861a11aa40a02033853c479456ccc97a5f2ca8e4733228bc2

          SHA512

          087b63e74cd767628fae21606d6f4f303407ffaddeeac4c1354b862931d4b31ef46e5ee108e45dade1fe9e95d090861e2ddac2faac19ef0a435a6a17a801032b

        • C:\Users\Admin\AppData\Local\SCzD5\sdclt.exe

          Filesize

          1.2MB

          MD5

          e09d48f225e7abcab14ebd3b8a9668ec

          SHA1

          1c5b9322b51c09a407d182df481609f7cb8c425d

          SHA256

          efd238ea79b93d07852d39052f1411618c36e7597e8af0966c4a3223f0021dc3

          SHA512

          384d606b90c4803e5144b4de24edc537cb22dd59336a18a58d229500ed36aec92c8467cae6d3f326647bd044d8074931da553c7809727fb70227e99c257df0b4

        • C:\Users\Admin\AppData\Local\iTQ0dF5\SYSDM.CPL

          Filesize

          1.5MB

          MD5

          7f46aeb679ae69fce0a826194df2664c

          SHA1

          6719d6cd638b51e1ef23ddd52b7b1651ee863494

          SHA256

          f8118f658b108b1ed856c68f2f903261f9d990e226218eb0f157a9ae41c0473a

          SHA512

          64cafb1feb76552f00be8087a9b1fa8ace67a240b21148670a7595cd44384cc0267eb2c7aa24c17017b3ef8c8de2ee8a16d7fdf294e20f7da0111a8b46aec93b

        • C:\Users\Admin\AppData\Local\iTQ0dF5\SystemPropertiesAdvanced.exe

          Filesize

          82KB

          MD5

          fa040b18d2d2061ab38cf4e52e753854

          SHA1

          b1b37124e9afd6c860189ce4d49cebbb2e4c57bc

          SHA256

          c61fa0f8c5d8d61110adbcceaa453a6c1d31255b3244dc7e3b605a4a931c245c

          SHA512

          511f5981bd2c446f1f3039f6674f972651512305630bd688b1ef159af36a23cb836b43d7010b132a86b5f4d6c46206057abd31600f1e7dc930cb32ed962298a4

        • C:\Users\Admin\AppData\Local\sjrbJT2\DUI70.dll

          Filesize

          1.8MB

          MD5

          ea2c9c85835a628e9fca21b0740d3146

          SHA1

          26e4bbda18626523b11aa0f821cf598cbbd24486

          SHA256

          993bace994056a24c1291c4437a7dcb77e9bdd94d29f349b8ef47dade9ea2610

          SHA512

          5c40e0cbae15684c1fa5a213a2bd084fd61ce0e5a4a1151b816cc049a3c4832367e532eb4df1217013c7c6bde468b62bca2e99bbd2a98b2073c8f2c89ae8be7f

        • C:\Users\Admin\AppData\Local\sjrbJT2\SysResetErr.exe

          Filesize

          41KB

          MD5

          090c6f458d61b7ddbdcfa54e761b8b57

          SHA1

          c5a93e9d6eca4c3842156cc0262933b334113864

          SHA256

          a324e3ba7309164f215645a6db3e74ed35c7034cc07a011ebed2fa60fda4d9cd

          SHA512

          c9ef79397f3a843dcf2bcb5f761d90a4bdadb08e2ca85a35d8668cb13c308b275ed6aa2c8b9194a1f29964e0754ad05e89589025a0b670656386a8d448a1f542

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Yxuzhivmkyvewy.lnk

          Filesize

          1KB

          MD5

          f5276d6275817417bb60449ec8ad8de8

          SHA1

          8488c24f03f100ae2fc6f104407d56555187e962

          SHA256

          76c60b7dc3a3c7bc52a17b13e42d8c4c53a36667c7e74da82b6627d330796768

          SHA512

          f48225e51ae3d9a888dcfaff192ed69256a1512580e7fef1e9003751d8fc2698eb8f324ec1b0c2d5905ff0537483139ce0f3dac028021d1ae97d75b98e5db10e

        • memory/400-20-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/400-1-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/400-0-0x00000290B5370000-0x00000290B5377000-memory.dmp

          Filesize

          28KB

        • memory/440-116-0x000002256F3B0000-0x000002256F3B7000-memory.dmp

          Filesize

          28KB

        • memory/3308-97-0x00000252FFB20000-0x00000252FFB27000-memory.dmp

          Filesize

          28KB

        • memory/3308-94-0x0000000140000000-0x00000001401CB000-memory.dmp

          Filesize

          1.8MB

        • memory/3376-21-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-13-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-44-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-43-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-41-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-40-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-39-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-38-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-37-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-36-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-33-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-31-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-30-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-29-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-28-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-27-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-26-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-66-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-22-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-47-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-19-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-18-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-17-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-16-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-15-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-46-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-12-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-11-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-10-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-45-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-9-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-42-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-8-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-35-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-34-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-7-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-32-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-25-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-24-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-14-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-48-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-64-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-72-0x0000000000680000-0x0000000000687000-memory.dmp

          Filesize

          28KB

        • memory/3376-73-0x00007FFBE31A0000-0x00007FFBE31B0000-memory.dmp

          Filesize

          64KB

        • memory/3376-55-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-23-0x0000000140000000-0x0000000140185000-memory.dmp

          Filesize

          1.5MB

        • memory/3376-6-0x00007FFBE128A000-0x00007FFBE128B000-memory.dmp

          Filesize

          4KB

        • memory/3376-4-0x00000000025F0000-0x00000000025F1000-memory.dmp

          Filesize

          4KB

        • memory/4532-82-0x00000230966E0000-0x00000230966E7000-memory.dmp

          Filesize

          28KB

        • memory/4532-83-0x0000000140000000-0x0000000140186000-memory.dmp

          Filesize

          1.5MB

        • memory/4532-77-0x0000000140000000-0x0000000140186000-memory.dmp

          Filesize

          1.5MB