Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-01-2025 07:48

General

  • Target

    bc159e0f9536f64b6e6ed1b51f693cb2b62b82de2ca7b1450e2ef058ae01eb80.dll

  • Size

    780KB

  • MD5

    a182362bcd4f647cddb6970228afe715

  • SHA1

    d197931c9255dfe7daba645d328656bc1e2dfa39

  • SHA256

    bc159e0f9536f64b6e6ed1b51f693cb2b62b82de2ca7b1450e2ef058ae01eb80

  • SHA512

    c49efae658487b0d76eaefd119d585572b72f8cf789daa9b3e7070c461886d33df8120d389057f9ea278cb37964d878514e49711451be22cd218f7ecb846496c

  • SSDEEP

    12288:rbP23onr2XV7KrPqgmNiQhDOy4/AT4r/E16K1QS/lsHAGHdDvRQ2sd1gqQ:rbe42XV7KWgmjDR/T4a/Mdjm

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex family
  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\bc159e0f9536f64b6e6ed1b51f693cb2b62b82de2ca7b1450e2ef058ae01eb80.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:4072
  • C:\Windows\system32\systemreset.exe
    C:\Windows\system32\systemreset.exe
    1⤵
      PID:4160
    • C:\Users\Admin\AppData\Local\uvV\systemreset.exe
      C:\Users\Admin\AppData\Local\uvV\systemreset.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:4872
    • C:\Windows\system32\DmNotificationBroker.exe
      C:\Windows\system32\DmNotificationBroker.exe
      1⤵
        PID:3928
      • C:\Users\Admin\AppData\Local\z8b5ALD\DmNotificationBroker.exe
        C:\Users\Admin\AppData\Local\z8b5ALD\DmNotificationBroker.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:4480
      • C:\Windows\system32\SystemPropertiesHardware.exe
        C:\Windows\system32\SystemPropertiesHardware.exe
        1⤵
          PID:1044
        • C:\Users\Admin\AppData\Local\4Bd0vLh\SystemPropertiesHardware.exe
          C:\Users\Admin\AppData\Local\4Bd0vLh\SystemPropertiesHardware.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:3980

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\4Bd0vLh\SYSDM.CPL

          Filesize

          780KB

          MD5

          d0b4d885840c3a28629258c9cc6f667a

          SHA1

          db8cf33da8606492e3602ec5148f744f848e32c3

          SHA256

          4d61c6633fa7d0ca9bd5dbb4597b6f4a987bd9d5f22086ef3254b16bceec680c

          SHA512

          02b9e8c904f9fe7b3a33c0aaf1254de9e0db4100921cb0458d6ef063267251d1fe2e8110436a15cf6e0679e2bffd000ac6f5650e7de625e32c9df970ab66c913

        • C:\Users\Admin\AppData\Local\4Bd0vLh\SystemPropertiesHardware.exe

          Filesize

          82KB

          MD5

          bf5bc0d70a936890d38d2510ee07a2cd

          SHA1

          69d5971fd264d8128f5633db9003afef5fad8f10

          SHA256

          c8ebd920399ebcf3ab72bd325b71a6b4c6119dfecea03f25059a920c4d32acc7

          SHA512

          0e129044777cbbf5ea995715159c50773c1818fc5e8faa5c827fd631b44c086b34dfdcbe174b105891ccc3882cc63a8664d189fb6a631d8f589de4e01a862f51

        • C:\Users\Admin\AppData\Local\uvV\DUI70.dll

          Filesize

          1.0MB

          MD5

          b6e51ff018ccbda32c07eb59722725dd

          SHA1

          32f6f01f3ae54964b9d939bb45ece73245052280

          SHA256

          e182954591a10dadcae93bdaab9ba33fc30590c370ef1a458f0745c138222aea

          SHA512

          0bf79b56705d697f13ba02fe0214903120547e97535572d9ac5975dfbf5fe5149e4797aa21e296b28bb1521f75b57c7d3dc9529666c6467d94a0f471e0b0599a

        • C:\Users\Admin\AppData\Local\uvV\systemreset.exe

          Filesize

          508KB

          MD5

          325ff647506adb89514defdd1c372194

          SHA1

          84234ff97d6ddc8a4ea21303ea842aa76a74e0ea

          SHA256

          ebff6159a7627234f94f606afa2e55e98e1548fd197d22779a5fcff24aa477ad

          SHA512

          8a9758f4af0264be08d684125827ef11efe651138059f6b463c52476f8a8e1bed94d093042f85893cb3e37c5f3ba7b55c6ce9394595001e661bccbc578da3868

        • C:\Users\Admin\AppData\Local\z8b5ALD\DUI70.dll

          Filesize

          1.0MB

          MD5

          3e62bd3a5d4bd9482b6ce4fe342b39a0

          SHA1

          bd0adaf28839273ddad4d4607bcdac73179056fb

          SHA256

          187f2f2147faf17bcef6c1e672aa0ff73e008bc4a5b219b47850260c224069a5

          SHA512

          38637bdf9752617c32530dd850f4673c1064bbc8b0ded1fd719a58a8bc06f2afbc71e1607ca52f522ad22581318ccda2d1449b12ecc46bdbd03e25e77c10c744

        • C:\Users\Admin\AppData\Local\z8b5ALD\DmNotificationBroker.exe

          Filesize

          32KB

          MD5

          f0bdc20540d314a2aad951c7e2c88420

          SHA1

          4ab344595a4a81ab5f31ed96d72f217b4cee790b

          SHA256

          f87537e5f26193a2273380f86cc9ac16d977f65b0eff2435e40be830fd99f7b5

          SHA512

          cb69e35b2954406735264a4ae8fe1eca1bd4575f553ab2178c70749ab997bda3c06496d2fce97872c51215a19093e51eea7cc8971af62ad9d5726f3a0d2730aa

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Eswctkc.lnk

          Filesize

          1KB

          MD5

          ef514f1e6214ec73cd41ecf54b080d1a

          SHA1

          7698a73029d77e43e594856e6900e66f0d56ffcb

          SHA256

          b8537af9b958a302de23f263b5efc08e2f0ffcab44e4be853a4621f44fd0bece

          SHA512

          a68e503f74e4ecd186c41d5b4150f1603483c060554c0299039e75441deaa1b5e5726585b4d516455f5e9a233db682bb968f90b2357db7e550ebddbb07db3987

        • memory/3564-22-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/3564-33-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/3564-15-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/3564-13-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/3564-12-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/3564-11-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/3564-10-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/3564-9-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/3564-8-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/3564-5-0x0000000000CD0000-0x0000000000CD1000-memory.dmp

          Filesize

          4KB

        • memory/3564-35-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/3564-24-0x00007FF99FFE0000-0x00007FF99FFF0000-memory.dmp

          Filesize

          64KB

        • memory/3564-23-0x0000000000AC0000-0x0000000000AC7000-memory.dmp

          Filesize

          28KB

        • memory/3564-4-0x00007FF99E40A000-0x00007FF99E40B000-memory.dmp

          Filesize

          4KB

        • memory/3564-7-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/3980-78-0x000001D5053E0000-0x000001D5053E7000-memory.dmp

          Filesize

          28KB

        • memory/3980-84-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/4072-14-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/4072-3-0x0000017E4DB30000-0x0000017E4DB37000-memory.dmp

          Filesize

          28KB

        • memory/4072-0-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/4480-64-0x000002166EAD0000-0x000002166EAD7000-memory.dmp

          Filesize

          28KB

        • memory/4480-67-0x0000000140000000-0x0000000140109000-memory.dmp

          Filesize

          1.0MB

        • memory/4872-50-0x0000000140000000-0x0000000140109000-memory.dmp

          Filesize

          1.0MB

        • memory/4872-47-0x000001961B330000-0x000001961B337000-memory.dmp

          Filesize

          28KB

        • memory/4872-44-0x0000000140000000-0x0000000140109000-memory.dmp

          Filesize

          1.0MB