Analysis

  • max time kernel
    140s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-01-2025 20:17

General

  • Target

    1264bb47a1d1ec4d6fae193f1fcfefb46aa268090e88718a2f9f42b830cfb4d1.dll

  • Size

    656KB

  • MD5

    1c8173fa2438ffec53246a0fa7a3eb64

  • SHA1

    82ea924767787f06c73ee345853f05d1a6b55b1f

  • SHA256

    1264bb47a1d1ec4d6fae193f1fcfefb46aa268090e88718a2f9f42b830cfb4d1

  • SHA512

    5f8ef3e4c4f3c61c7acd192c769beccd7890e54d1b923ea0d574a59ce0732a48f6f0fab4d869bdde84621ee5d217afa67fc4da697b9163996951577d771b7b47

  • SSDEEP

    6144:og12AzW5HsiScvtNybiR8g0ISTFCRVe9/JE+++sKS1JGWWsca65eu9K2zqc4CWAZ:o82AK5HOEksJ1YW7DwzqyQ

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex family
  • Dridex Loader 'dmod' strings 2 IoCs

    Detects 'dmod' strings in Dridex loader.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 8 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\1264bb47a1d1ec4d6fae193f1fcfefb46aa268090e88718a2f9f42b830cfb4d1.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1132
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\1264bb47a1d1ec4d6fae193f1fcfefb46aa268090e88718a2f9f42b830cfb4d1.dll,#1
      2⤵
      • Checks whether UAC is enabled
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:5024
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3824
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2404
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1776
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3080
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4908
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3556
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3992
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of SendNotifyMessage
    PID:2228
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2380
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1920
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
      PID:3504
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
        PID:4056

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

        Filesize

        471B

        MD5

        61f6a655c20229b4746fa11b7ff55a9d

        SHA1

        1e8fbc873d19d68806a850893a3023b32a5c2a42

        SHA256

        ed4b185baa177add91ad2308a53add4e6fc8e9e62dd3e2899f17b263098fa392

        SHA512

        b565537871ba7751a8230696d8a072e427671d2c1981b742f269ec6bc7850e5e4b98fa5fb133a1f654d868ee0a8a12cb938e19dc95ffb9dcea49760fad119e85

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

        Filesize

        412B

        MD5

        01333744f07903c9a328adce718fef42

        SHA1

        57f3d6cf82580e603474f94dc49f825d34f4d13e

        SHA256

        fba4ac7fca6e4d8d0ade6bf44e1245d737fd989f6e41ecedad19381a407a3b54

        SHA512

        9f2c4b0fe1f359a1b757d1c59f012297675946cd297192c87941ea8d79efed6d323314ed38774136133e88e0fa425ba130488fe5f02d5963736827647dcac193

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres

        Filesize

        2KB

        MD5

        2349589eb13cf8ff9c9750c52d014993

        SHA1

        7a717d45102e5766a9e3a602b0b10c5b5ccc0bb8

        SHA256

        dc819d5e6c8a7b1442358104b11eb7bcb122bf6524ee7a80551b1d6e849cb5d7

        SHA512

        b9480589f83ea3df8611dec174c642027407717331cc58a3597ca73bffb914393cd51af2402a6e2a9ca829c6ca3e16e9cbb894dc378cfe1f5b887284b89d8780

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Windows_ControlPanel

        Filesize

        36KB

        MD5

        fb5f8866e1f4c9c1c7f4d377934ff4b2

        SHA1

        d0a329e387fb7bcba205364938417a67dbb4118a

        SHA256

        1649ec9493be27f76ae7304927d383f8a53dd3e41ea1678bacaff33120ea4170

        SHA512

        0fbe2843dfeab7373cde0643b20c073fdc2fcbefc5ae581fd1656c253dfa94e8bba4d348e95cc40d1e872456ecca894b462860aeac8b92cedb11a7cad634798c

      • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\https___java_com_help

        Filesize

        36KB

        MD5

        8aaad0f4eb7d3c65f81c6e6b496ba889

        SHA1

        231237a501b9433c292991e4ec200b25c1589050

        SHA256

        813c66ce7dec4cff9c55fb6f809eab909421e37f69ff30e4acaa502365a32bd1

        SHA512

        1a83ce732dc47853bf6e8f4249054f41b0dea8505cda73433b37dfa16114f27bfed3b4b3ba580aa9d53c3dcc8d48bf571a45f7c0468e6a0f2a227a7e59e17d62

      • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\YCLWQ4BV\microsoft.windows[1].xml

        Filesize

        97B

        MD5

        781c2d6d1f6f2f8ae243c569925a6c44

        SHA1

        6d5d26acc2002f5a507bd517051095a97501931b

        SHA256

        70687e419879f006d0c50c08657c66b1187b94ea216cfe0a2e6be8bd2de77bc8

        SHA512

        3599fa8f2ffe140a8f68ec735810d24a5b367a9a551d620baa6dc611ca755dce1a662bf22b90f842d499d2c9530fb8acd634d1654d5e2c1b319574cbf35eadf7

      • memory/1920-164-0x00000207CE100000-0x00000207CE200000-memory.dmp

        Filesize

        1024KB

      • memory/1920-201-0x00000207CF810000-0x00000207CF830000-memory.dmp

        Filesize

        128KB

      • memory/1920-177-0x00000207CF400000-0x00000207CF420000-memory.dmp

        Filesize

        128KB

      • memory/1920-169-0x00000207CF440000-0x00000207CF460000-memory.dmp

        Filesize

        128KB

      • memory/1920-166-0x00000207CE100000-0x00000207CE200000-memory.dmp

        Filesize

        1024KB

      • memory/1920-165-0x00000207CE100000-0x00000207CE200000-memory.dmp

        Filesize

        1024KB

      • memory/2228-162-0x00000000043B0000-0x00000000043B1000-memory.dmp

        Filesize

        4KB

      • memory/3992-42-0x000001E51CAC0000-0x000001E51CAE0000-memory.dmp

        Filesize

        128KB

      • memory/3992-30-0x000001E51C6B0000-0x000001E51C6D0000-memory.dmp

        Filesize

        128KB

      • memory/3992-20-0x000001E51C6F0000-0x000001E51C710000-memory.dmp

        Filesize

        128KB

      • memory/3992-16-0x000001E51B700000-0x000001E51B800000-memory.dmp

        Filesize

        1024KB

      • memory/3992-15-0x000001E51B700000-0x000001E51B800000-memory.dmp

        Filesize

        1024KB

      • memory/4908-14-0x00000000035B0000-0x00000000035B1000-memory.dmp

        Filesize

        4KB

      • memory/5024-1-0x0000000074BD0000-0x0000000074C74000-memory.dmp

        Filesize

        656KB

      • memory/5024-11-0x00000000004D0000-0x00000000004D6000-memory.dmp

        Filesize

        24KB

      • memory/5024-10-0x0000000074BD0000-0x0000000074C74000-memory.dmp

        Filesize

        656KB

      • memory/5024-0-0x00000000004D0000-0x00000000004D6000-memory.dmp

        Filesize

        24KB