Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-01-2025 23:26

General

  • Target

    3fe07a9b47a19d1e5bd7a3ab151c4702292dad575ccee38241c830a55f285814.dll

  • Size

    780KB

  • MD5

    12c235157458058ad181f648cf1fcb96

  • SHA1

    8d7076f1a88190f2a4f2004e77ff973dd642f6c3

  • SHA256

    3fe07a9b47a19d1e5bd7a3ab151c4702292dad575ccee38241c830a55f285814

  • SHA512

    c46d5c8ba89760d9ce8649283e9980ecba0d8221fd97514d4e3abd0a8e6838dea50dd63d95ce01f2453aebe9dc5dc4e9aa33c15676d74e49115c83862e608807

  • SSDEEP

    12288:PbP23onr2XV7KrPqgmNiQhDOy4/AT4r/E16K1QS/lsHAGHdDvRQ2sd1gqQ:Pbe42XV7KWgmjDR/T4a/Mdjm

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex family
  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\3fe07a9b47a19d1e5bd7a3ab151c4702292dad575ccee38241c830a55f285814.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:1044
  • C:\Windows\system32\WMPDMC.exe
    C:\Windows\system32\WMPDMC.exe
    1⤵
      PID:4416
    • C:\Users\Admin\AppData\Local\tzhbn0\WMPDMC.exe
      C:\Users\Admin\AppData\Local\tzhbn0\WMPDMC.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:1004
    • C:\Windows\system32\wusa.exe
      C:\Windows\system32\wusa.exe
      1⤵
        PID:1668
      • C:\Users\Admin\AppData\Local\8xVdu\wusa.exe
        C:\Users\Admin\AppData\Local\8xVdu\wusa.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:1172
      • C:\Windows\system32\dpapimig.exe
        C:\Windows\system32\dpapimig.exe
        1⤵
          PID:1608
        • C:\Users\Admin\AppData\Local\OX4346GPP\dpapimig.exe
          C:\Users\Admin\AppData\Local\OX4346GPP\dpapimig.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:4684

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\8xVdu\WTSAPI32.dll

          Filesize

          784KB

          MD5

          a6cbd3afc74789e6ec12e7e030e83e72

          SHA1

          5c4704a20270f9b7fda9bb15625eb4acdfa9404e

          SHA256

          98d53eb986f3be07c9986d1a26f3f11c3b79196f0d57cc28bfa5dd377a54e6a6

          SHA512

          fc0b7521092776f5e38e90a07f366bc663127babb35af5ac9087fa0f43a2a865e1b344729573971e782901dd75b37143fc952a6f3dd7062e9aedb3f46f6936ea

        • C:\Users\Admin\AppData\Local\8xVdu\wusa.exe

          Filesize

          309KB

          MD5

          e43499ee2b4cf328a81bace9b1644c5d

          SHA1

          b2b55641f2799e3fdb3bea709c9532017bbac59d

          SHA256

          3e30230bbf3ceee3e58162b61eed140e9616210833a6ad7df3e106bc7492d2fb

          SHA512

          04823764520871f9202d346b08a194bdd5f5929db6d5c2f113911f84aece7471c8d3bd2c4256119a303dbe18a0c055dbc5034d80b1f27a43744104544731f52b

        • C:\Users\Admin\AppData\Local\OX4346GPP\DUI70.dll

          Filesize

          1.0MB

          MD5

          aab50c6d058a445e7eacd2d6147178d5

          SHA1

          e0a87cfcf8c318ea464921d438f4db43ace420f4

          SHA256

          21a896429f5ec616079405c14dbe052071f36c47702ca4cb8ef67097c84747bc

          SHA512

          042d2b4d24b66991805eea48c673dc12238c84ef5279df932bf7f10b988dba3bce6dacfa3672fa42b46499dab205930993009e1f32726dcae1b13bc456dcb690

        • C:\Users\Admin\AppData\Local\OX4346GPP\dpapimig.exe

          Filesize

          76KB

          MD5

          b6d6477a0c90a81624c6a8548026b4d0

          SHA1

          e6eac6941d27f76bbd306c2938c0a962dbf1ced1

          SHA256

          a8147d08b82609c72d588a0a604cd3c1f2076befcc719d282c7cbd6525ae89eb

          SHA512

          72ec8b79e3438f0f981129a323ad39db84df7dd14a796a820bdbc74ea8fa13eee843d1ea030a0c1caeda2e2d69952f14a821a73825b38dd9415047aca597b1fe

        • C:\Users\Admin\AppData\Local\tzhbn0\OLEACC.dll

          Filesize

          784KB

          MD5

          dfab9ba8ed794055266ee44c33b2fc2e

          SHA1

          64c3775c7a59c7d4b74e652dafc0331c1862fbcb

          SHA256

          1edd4fed114421cf8f5326c505f223f8cedfb6f1c20ae7f473b2c5b81453d6d0

          SHA512

          b7330bcbe3af4941233fb827e9f4dbe8d2dcefb996b08c8e1e935296caf91580bf2ef8afe94501e23eba536e25055bec94186972b7c19f9c12689a6bb1ac59bc

        • C:\Users\Admin\AppData\Local\tzhbn0\WMPDMC.exe

          Filesize

          1.5MB

          MD5

          59ce6e554da0a622febce19eb61c4d34

          SHA1

          176a4a410cb97b3d4361d2aea0edbf17e15d04c7

          SHA256

          c36eba7186f7367fe717595f3372a49503c9613893c2ab2eff38b625a50d04ba

          SHA512

          e9b0d310416b66e0055381391bb6b0c19ee26bbcf0e3bb9ea7d696d5851e6efbdd9bdeb250c74638b7d73b20528ea1dfb718e75ad5977aaad77aae36cc7b7e18

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Womuvunldsugi.lnk

          Filesize

          1KB

          MD5

          fe6649bfa356f9cf9427fd62e3cdf883

          SHA1

          f91893cd1e60fee94f64db42399b804a5fd75ffe

          SHA256

          8286ca89b6e4b93ff038afa64106a361a37755bff5dd7bff6aaff8c958219a6c

          SHA512

          c0d49f71b30037c091fe8bce0619efa9c7a387413d235a611b0f41ec129ec47f626b509eebd47b32cfd7fc2a0c8d1628f84baf8a0ff2bdeb1989e5086d04f195

        • memory/1004-50-0x0000000140000000-0x00000001400C4000-memory.dmp

          Filesize

          784KB

        • memory/1004-47-0x00000282CD9C0000-0x00000282CD9C7000-memory.dmp

          Filesize

          28KB

        • memory/1004-44-0x0000000140000000-0x00000001400C4000-memory.dmp

          Filesize

          784KB

        • memory/1044-0-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/1044-3-0x000001E0F4020000-0x000001E0F4027000-memory.dmp

          Filesize

          28KB

        • memory/1044-14-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/1172-67-0x0000000140000000-0x00000001400C4000-memory.dmp

          Filesize

          784KB

        • memory/1172-64-0x0000025CF4F70000-0x0000025CF4F77000-memory.dmp

          Filesize

          28KB

        • memory/3368-23-0x0000000000730000-0x0000000000737000-memory.dmp

          Filesize

          28KB

        • memory/3368-24-0x00007FF920620000-0x00007FF920630000-memory.dmp

          Filesize

          64KB

        • memory/3368-33-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/3368-8-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/3368-9-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/3368-10-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/3368-11-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/3368-12-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/3368-15-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/3368-35-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/3368-22-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/3368-13-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/3368-7-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/3368-4-0x00000000023B0000-0x00000000023B1000-memory.dmp

          Filesize

          4KB

        • memory/3368-5-0x00007FF92037A000-0x00007FF92037B000-memory.dmp

          Filesize

          4KB

        • memory/4684-84-0x0000000140000000-0x0000000140109000-memory.dmp

          Filesize

          1.0MB

        • memory/4684-78-0x0000000140000000-0x0000000140109000-memory.dmp

          Filesize

          1.0MB

        • memory/4684-83-0x000001B032A50000-0x000001B032A57000-memory.dmp

          Filesize

          28KB