Analysis

  • max time kernel
    149s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-01-2025 07:48

General

  • Target

    bc159e0f9536f64b6e6ed1b51f693cb2b62b82de2ca7b1450e2ef058ae01eb80.dll

  • Size

    780KB

  • MD5

    a182362bcd4f647cddb6970228afe715

  • SHA1

    d197931c9255dfe7daba645d328656bc1e2dfa39

  • SHA256

    bc159e0f9536f64b6e6ed1b51f693cb2b62b82de2ca7b1450e2ef058ae01eb80

  • SHA512

    c49efae658487b0d76eaefd119d585572b72f8cf789daa9b3e7070c461886d33df8120d389057f9ea278cb37964d878514e49711451be22cd218f7ecb846496c

  • SSDEEP

    12288:rbP23onr2XV7KrPqgmNiQhDOy4/AT4r/E16K1QS/lsHAGHdDvRQ2sd1gqQ:rbe42XV7KWgmjDR/T4a/Mdjm

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex family
  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\bc159e0f9536f64b6e6ed1b51f693cb2b62b82de2ca7b1450e2ef058ae01eb80.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2648
  • C:\Windows\system32\slui.exe
    C:\Windows\system32\slui.exe
    1⤵
      PID:2572
    • C:\Users\Admin\AppData\Local\KT4\slui.exe
      C:\Users\Admin\AppData\Local\KT4\slui.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2620
    • C:\Windows\system32\msra.exe
      C:\Windows\system32\msra.exe
      1⤵
        PID:1756
      • C:\Users\Admin\AppData\Local\bx4gOcKla\msra.exe
        C:\Users\Admin\AppData\Local\bx4gOcKla\msra.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:1296
      • C:\Windows\system32\Netplwiz.exe
        C:\Windows\system32\Netplwiz.exe
        1⤵
          PID:2140
        • C:\Users\Admin\AppData\Local\3vnBg2\Netplwiz.exe
          C:\Users\Admin\AppData\Local\3vnBg2\Netplwiz.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:2452

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\3vnBg2\NETPLWIZ.dll

          Filesize

          780KB

          MD5

          cc4ef609534e0ff076da79b4e154aeb6

          SHA1

          93959983fc2ac332a35922abd17bb34d99723d6b

          SHA256

          410c5ebc343d853a0a6d2becaafa0a4d830a5e6598c1dc16a2eb406dacd31e65

          SHA512

          569e603c600c90fa2abb0629512333f9d242748894990b0b92b3b220e73abf767140f410604a4edc74808bcf195b24dbfbfb02b1447cf76bd5ee77e804f5d91c

        • C:\Users\Admin\AppData\Local\KT4\WINBRAND.dll

          Filesize

          780KB

          MD5

          7205601ecf57685763f49702491da6c7

          SHA1

          53d17a767a7e481f22da10fde47969077af6d6a4

          SHA256

          4f55cb1117daf9586ea382ef3a38155d04a988b75d59bdbe5637567f818e9a71

          SHA512

          fdc6e469ce1ba8c52353acbd5b9af7de260e9e2055d417de624715cb2dea1e893a12b8dfe05900df146913c07c549bf4d3dba2cadabc5924bab58c7ca01ef02a

        • C:\Users\Admin\AppData\Local\bx4gOcKla\UxTheme.dll

          Filesize

          784KB

          MD5

          ff324829b68ad7f17cbbac5d4d2161f7

          SHA1

          2e27e75d99cf7000da6efb76aab7079904a0cecd

          SHA256

          f444dc4a4f1ae7af55e7da0c38ddd6db29d467a14d6482f865b4babafeadb9d5

          SHA512

          ea7d1cbe64f8859ba7847bd5a9d6e0b1469f84c6b2a5b0dec249e012c730f3b8702cd2309e42ce3abd160d56982756cc4e0d785483965c95cb56e0f5fef3e143

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Adlnwv.lnk

          Filesize

          1KB

          MD5

          f36ea6e6eb7d09274f64f853ffbce786

          SHA1

          8dd543970553081129829f86384e089a071e350a

          SHA256

          86a76c3c81e7e52d62ad511210d6baf8dc558c8f39f604bfedde40c20b2573d1

          SHA512

          d4cd1d1f2f2632ce2ce5b226d4cc03f726fa3f603baa1b2dc5d808e1be3e6a36e230a92863ada4395b0eaba2313ed631b8b2ef74da31c4dff78fe2b0a2c2df81

        • \Users\Admin\AppData\Local\3vnBg2\Netplwiz.exe

          Filesize

          26KB

          MD5

          e43ec3c800d4c0716613392e81fba1d9

          SHA1

          37de6a235e978ecf3bb0fc2c864016c5b0134348

          SHA256

          636606415a85a16a7e6c5c8fcbdf35494991bce1c37dfc19c75ecb7ce12dc65c

          SHA512

          176c6d8b87bc5a9ca06698e2542ff34d474bcbbf21278390127981366eda89769bd9dd712f3b34f4dd8332a0b40ee0e609276400f16b51999471c8ff24522a08

        • \Users\Admin\AppData\Local\KT4\slui.exe

          Filesize

          341KB

          MD5

          c5ce5ce799387e82b7698a0ee5544a6d

          SHA1

          ed37fdb169bb539271c117d3e8a5f14fd8df1c0d

          SHA256

          34aa7ca0ea833263a6883827e161a5c218576c5ad97e0ce386fad4250676b42c

          SHA512

          79453b45e1f38d164ee3dbc232f774ff121d4394c22783140f5c8c722f184a69f499f2fb9621bdb28f565065b791883526e1a1d4abef9df82289613c2ce97a5c

        • \Users\Admin\AppData\Local\bx4gOcKla\msra.exe

          Filesize

          636KB

          MD5

          e79df53bad587e24b3cf965a5746c7b6

          SHA1

          87a97ec159a3fc1db211f3c2c62e4d60810e7a70

          SHA256

          4e7c22648acf664ab13dfeb2dc062ae90af1e6c621186981f395fb279bbc9b9d

          SHA512

          9a329c39ce0bc5aede01e96c4190cc7ccd17729fbc3a2b6df73057be8efaa3fa92cfef6e26a25bde6f7f94f64f6d6d0e4c5459aef2aead367e43178dd275acfb

        • memory/1188-40-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/1188-25-0x0000000076EE0000-0x0000000076EE2000-memory.dmp

          Filesize

          8KB

        • memory/1188-22-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/1188-15-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/1188-14-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/1188-13-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/1188-12-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/1188-10-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/1188-8-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/1188-5-0x0000000002550000-0x0000000002551000-memory.dmp

          Filesize

          4KB

        • memory/1188-34-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/1188-107-0x0000000076C76000-0x0000000076C77000-memory.dmp

          Filesize

          4KB

        • memory/1188-39-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/1188-23-0x0000000002530000-0x0000000002537000-memory.dmp

          Filesize

          28KB

        • memory/1188-9-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/1188-4-0x0000000076C76000-0x0000000076C77000-memory.dmp

          Filesize

          4KB

        • memory/1188-7-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/1188-24-0x0000000076D81000-0x0000000076D82000-memory.dmp

          Filesize

          4KB

        • memory/1296-71-0x0000000140000000-0x00000001400C4000-memory.dmp

          Filesize

          784KB

        • memory/1296-77-0x0000000140000000-0x00000001400C4000-memory.dmp

          Filesize

          784KB

        • memory/1296-76-0x0000000000430000-0x0000000000437000-memory.dmp

          Filesize

          28KB

        • memory/2452-92-0x0000000000100000-0x0000000000107000-memory.dmp

          Filesize

          28KB

        • memory/2452-95-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/2620-58-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/2620-59-0x00000000000A0000-0x00000000000A7000-memory.dmp

          Filesize

          28KB

        • memory/2620-52-0x00000000000A0000-0x00000000000A7000-memory.dmp

          Filesize

          28KB

        • memory/2648-11-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/2648-3-0x0000000000330000-0x0000000000337000-memory.dmp

          Filesize

          28KB

        • memory/2648-0-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB