Analysis

  • max time kernel
    140s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-01-2025 07:10

General

  • Target

    d90d50c0a27b624b69279e6b7e77f2f4d40bb045c42239a314ebf604444ba26f.dll

  • Size

    616KB

  • MD5

    77fb4fb4f00a4351f4d192f08df9b35d

  • SHA1

    143899c9230c071cca561036168d317eac8d5eb5

  • SHA256

    d90d50c0a27b624b69279e6b7e77f2f4d40bb045c42239a314ebf604444ba26f

  • SHA512

    db45c5023c5f742e8f695e59c9d69c5c5457dda1d43d6f4147e749d94d4dcfbd80269e256d35fea3fe46e4ab51430f176eaf92fc51a1664e21325339b00d3338

  • SSDEEP

    6144:Yg12AzW5HsiScvtNybiR8g0ISTFCRVe9/JE+++sKS1JGWWsca65eu9K2zqc4CWAS:Y82AK5HOEksJ1YW7DwzqyQ

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex family
  • Dridex Loader 'dmod' strings 2 IoCs

    Detects 'dmod' strings in Dridex loader.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 5 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 8 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d90d50c0a27b624b69279e6b7e77f2f4d40bb045c42239a314ebf604444ba26f.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\d90d50c0a27b624b69279e6b7e77f2f4d40bb045c42239a314ebf604444ba26f.dll,#1
      2⤵
      • Checks whether UAC is enabled
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2176
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2840
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3616
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4592
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2424
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4388
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3436
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2348
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of SendNotifyMessage
    PID:4188
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2040
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2260
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    PID:208
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
      PID:3252

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

      Filesize

      471B

      MD5

      33b6a15b1397a410fb5624043946dbdf

      SHA1

      142c35062d9b18d960e3eeaf947b86fffd8803a5

      SHA256

      6c230484759e30e5fa400fa608b58ccd2c0faaa37b245068fb961dc95d39a998

      SHA512

      27d4e2643a2b5bf28a07c137c9a6dcabb251f5b433b9f38c3bd9a616d55f6dc7a659f3c9e05e6a3f91c6dd96cd9988bcdabd39d3a7a550ad72cac48bdff7be0b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

      Filesize

      412B

      MD5

      3f1ec2fb520de774dca4ef683231d148

      SHA1

      a9e104508550a5b4485da8e055d8f785e25bc50e

      SHA256

      61e21e259370cbc29cb4a642c911ffbb6c259b0e6db15279c3f4342ad2ca8e7e

      SHA512

      d0e9f673aa74f73c4d18e4fea34fafb7053bbc6a17c21e5a269ff43b1c0df554a607ababcecc852f2af87e2463071cb0292b60c5473823f8995fcda216033c11

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres

      Filesize

      2KB

      MD5

      7279f8db5512c467684031443e7b123b

      SHA1

      47b24ba80ad8b6a467192fbe93a5b4c33e5cbe06

      SHA256

      8533fb8afbbd58b0e194d865a9475763ce2e1f61629cc5429a1e25b351199c91

      SHA512

      0f476ed6a7947671215d30a49d53342ec63f25f575a8a28a23d4c8df659b9e61bc076cd665723521f0943a9b71d668f0986553cfdce981ecd17d2d87d7afcb82

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\https___java_com_help

      Filesize

      36KB

      MD5

      8aaad0f4eb7d3c65f81c6e6b496ba889

      SHA1

      231237a501b9433c292991e4ec200b25c1589050

      SHA256

      813c66ce7dec4cff9c55fb6f809eab909421e37f69ff30e4acaa502365a32bd1

      SHA512

      1a83ce732dc47853bf6e8f4249054f41b0dea8505cda73433b37dfa16114f27bfed3b4b3ba580aa9d53c3dcc8d48bf571a45f7c0468e6a0f2a227a7e59e17d62

    • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\{1AC14E77-02E7-4E5D-B744-2EB1AE5198B7}_osk_exe

      Filesize

      36KB

      MD5

      f6a5ffe5754175d3603c3a77dcfeca6b

      SHA1

      dacd500aeef9dd69b87feae7521899040e7df1d9

      SHA256

      fab3529f4a4df98271fa2f6a7860a28fdc30215144b7eefbaf6d424a2847d035

      SHA512

      66ec46041f1fe20203cda7a4d68b61d2e5bcdd09a36ee8171efa53fe92a9e6e023c5a254a4c43c110a99749829d7b99613f8d13dfb4c42656097cb8d224a531e

    • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\M6JCG2RK\microsoft.windows[1].xml

      Filesize

      96B

      MD5

      732a32ad072ef786d816a4f85b1b6bea

      SHA1

      fe1945717c160ac3266f291564a003c044d409b0

      SHA256

      7dd2262373fcd6ebe2ed2c6e66242c85b1434c3fe23ca92ba41ae328ce8b941e

      SHA512

      55b57d5bf942f20a3557f20adeebb4c01cde4aec9d7a4fa8bfe6281fe0981773d8ce637fdbd1dc64f25abe72d75fad2a6538fadc86483ede9fdc5b59c0d36b79

    • memory/2176-1-0x0000000074D30000-0x0000000074DCA000-memory.dmp

      Filesize

      616KB

    • memory/2176-11-0x0000000000B30000-0x0000000000B36000-memory.dmp

      Filesize

      24KB

    • memory/2176-10-0x0000000074D30000-0x0000000074DCA000-memory.dmp

      Filesize

      616KB

    • memory/2176-0-0x0000000000B30000-0x0000000000B36000-memory.dmp

      Filesize

      24KB

    • memory/2260-170-0x00000213DD600000-0x00000213DD700000-memory.dmp

      Filesize

      1024KB

    • memory/2260-172-0x00000213DD600000-0x00000213DD700000-memory.dmp

      Filesize

      1024KB

    • memory/2260-175-0x00000213DE4E0000-0x00000213DE500000-memory.dmp

      Filesize

      128KB

    • memory/2260-171-0x00000213DD600000-0x00000213DD700000-memory.dmp

      Filesize

      1024KB

    • memory/2260-185-0x00000213DE4A0000-0x00000213DE4C0000-memory.dmp

      Filesize

      128KB

    • memory/2260-207-0x00000213DEAC0000-0x00000213DEAE0000-memory.dmp

      Filesize

      128KB

    • memory/2348-28-0x000002ED9AC70000-0x000002ED9AC90000-memory.dmp

      Filesize

      128KB

    • memory/2348-41-0x000002ED9B080000-0x000002ED9B0A0000-memory.dmp

      Filesize

      128KB

    • memory/2348-20-0x000002ED9ACB0000-0x000002ED9ACD0000-memory.dmp

      Filesize

      128KB

    • memory/2348-15-0x000002ED99D00000-0x000002ED99E00000-memory.dmp

      Filesize

      1024KB

    • memory/4188-168-0x0000000004370000-0x0000000004371000-memory.dmp

      Filesize

      4KB

    • memory/4388-13-0x00000000040B0000-0x00000000040B1000-memory.dmp

      Filesize

      4KB