Analysis

  • max time kernel
    119s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-01-2025 02:52

General

  • Target

    d4d9ff199368067600f128d3d3ac1fcc3bfbf0cabfe64b14b8484731ae64117d.dll

  • Size

    780KB

  • MD5

    3fa092a0e0ea8a296e20322bcbdc38c4

  • SHA1

    78a2adda053686d8a2ddba3ccd3a5e0f1672575b

  • SHA256

    d4d9ff199368067600f128d3d3ac1fcc3bfbf0cabfe64b14b8484731ae64117d

  • SHA512

    f6b3df5593d62e42f289d59896082d5a4d2a093f01d31e3d790a07223e2ee8728942c5c0b3570fcdfbf79554db89f1c8affdadd42aa5dec2e409878785bd605a

  • SSDEEP

    12288:kbP23onr2XV7KrPqgmNiQhDOy4/AT4r/E16K1QS/lsHAGHdDvRQ2sd1gqQn:kbe42XV7KWgmjDR/T4a/Mdjmi

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex family
  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\d4d9ff199368067600f128d3d3ac1fcc3bfbf0cabfe64b14b8484731ae64117d.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:1660
  • C:\Windows\system32\ddodiag.exe
    C:\Windows\system32\ddodiag.exe
    1⤵
      PID:2756
    • C:\Users\Admin\AppData\Local\UvZtv\ddodiag.exe
      C:\Users\Admin\AppData\Local\UvZtv\ddodiag.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2592
    • C:\Windows\system32\rdpclip.exe
      C:\Windows\system32\rdpclip.exe
      1⤵
        PID:2568
      • C:\Users\Admin\AppData\Local\j7I\rdpclip.exe
        C:\Users\Admin\AppData\Local\j7I\rdpclip.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:2600
      • C:\Windows\system32\unregmp2.exe
        C:\Windows\system32\unregmp2.exe
        1⤵
          PID:1624
        • C:\Users\Admin\AppData\Local\CrM9wT\unregmp2.exe
          C:\Users\Admin\AppData\Local\CrM9wT\unregmp2.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:1112

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\CrM9wT\slc.dll

          Filesize

          784KB

          MD5

          672fc6babd077dafb755c7a6a237d8b4

          SHA1

          1970cf132eaa13a0bd46e6d1125e61c5921a7f75

          SHA256

          f4f1cd0902514be37c3f114b4c61973c08f2b7126829ad0976d7b35eee92e219

          SHA512

          e566881878be9e75a7760db8a43941fd60bff819d3f3dc5239961860a24127fcdde3537c36a6a2d3aa8d0a62d46a751eb64a3238c0fd93e2deb0bfbf02c2eb69

        • C:\Users\Admin\AppData\Local\UvZtv\XmlLite.dll

          Filesize

          780KB

          MD5

          c9a0a902c87205ae8b4e407c669e580b

          SHA1

          b2e58ac8e58b9f5b70abfafb318b7d8706bc79b1

          SHA256

          bc7d5b96c9f4214e75e7c758502beb1316760848eaa107f4f7e05f6fd8fcd9a4

          SHA512

          e565338edd11846b031cd363e5763e14be94c89c14090bee087922099e524df6a8b55ae5df126642d6beb67a0d4aab5a4589463c94c912dc6cefb77411d76c1d

        • C:\Users\Admin\AppData\Local\j7I\WTSAPI32.dll

          Filesize

          784KB

          MD5

          e2fb8a82172f123eea393a82e1192735

          SHA1

          c72e9d5432cc6ef65568079bd77883d287b2ec8f

          SHA256

          d2c7bc90e0d9663bda546bdc837c1c14f024680d9531fb1539602105bff8bd56

          SHA512

          545b13e942e9721fdb8b166c067f3a00a7bf4480c3d8c3a20a2d31ecc90a13440296ec5f6157ce9d9bffbb9fe4e6d8d002f5905d510590bbb1cfab1491108c15

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Yjafzwirjcl.lnk

          Filesize

          1KB

          MD5

          618b210600b6eec0a5c1c7b16c26b256

          SHA1

          d7a1cfd2ada938cb9d77e174fb363e429cc37a47

          SHA256

          0f3deed14b1ade7a401bc0844f776af04baf2c678db1c666fd428c89830b8eed

          SHA512

          819655b2e75a0a113ef29be622432536f1c7737c1e75319482d67b921caace738f1c5f12aa7359df772ec88d97b637d1409620d927aad125e473b091d03d65fb

        • \Users\Admin\AppData\Local\CrM9wT\unregmp2.exe

          Filesize

          316KB

          MD5

          64b328d52dfc8cda123093e3f6e4c37c

          SHA1

          f68f45b21b911906f3aa982e64504e662a92e5ab

          SHA256

          7d6be433ba7dd4a2b8f8b79d7b87055da8daafa3e0404432d40469c39c2040e1

          SHA512

          e29fc068532df36f39c86b79392b5c6191de6f69b7beaba28f9ac96a26089b341b770ff29556eca14f57afd1de59a6f3726818482d6861bdd8ac556ae768df00

        • \Users\Admin\AppData\Local\UvZtv\ddodiag.exe

          Filesize

          42KB

          MD5

          509f9513ca16ba2f2047f5227a05d1a8

          SHA1

          fe8d63259cb9afa17da7b7b8ede4e75081071b1a

          SHA256

          ddf48c333e45c56c9e3f16e492c023bf138629f4c093b8aaab8ea60310c8c96e

          SHA512

          ad3168767e5eba575ae766e1e2923b1db4571bbeb302d7c58e8023612e33913dcd9e5f4a4c1bc7b1556442a0807117066f17c62b38fe2ae0dfaa3817b7318862

        • \Users\Admin\AppData\Local\j7I\rdpclip.exe

          Filesize

          206KB

          MD5

          25d284eb2f12254c001afe9a82575a81

          SHA1

          cf131801fdd5ec92278f9e0ae62050e31c6670a5

          SHA256

          837e0d864c474956c0d9d4e7ae5f884007f19b7f420db9afcf0d266aefa6608b

          SHA512

          7b4f208fa1681a0a139577ebc974e7acfc85e3c906a674e111223783460585eb989cb6b38f215d79f89e747a0e9224d90e1aa43e091d2042edb8bac7b27b968b

        • memory/1112-94-0x0000000140000000-0x00000001400C4000-memory.dmp

          Filesize

          784KB

        • memory/1112-88-0x0000000000330000-0x0000000000337000-memory.dmp

          Filesize

          28KB

        • memory/1224-39-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/1224-25-0x0000000077640000-0x0000000077642000-memory.dmp

          Filesize

          8KB

        • memory/1224-14-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/1224-108-0x00000000773D6000-0x00000000773D7000-memory.dmp

          Filesize

          4KB

        • memory/1224-12-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/1224-11-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/1224-10-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/1224-8-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/1224-34-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/1224-4-0x00000000773D6000-0x00000000773D7000-memory.dmp

          Filesize

          4KB

        • memory/1224-38-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/1224-43-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/1224-24-0x00000000774E1000-0x00000000774E2000-memory.dmp

          Filesize

          4KB

        • memory/1224-15-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/1224-7-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/1224-9-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/1224-22-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/1224-23-0x0000000002FE0000-0x0000000002FE7000-memory.dmp

          Filesize

          28KB

        • memory/1224-5-0x0000000003000000-0x0000000003001000-memory.dmp

          Filesize

          4KB

        • memory/1660-3-0x0000000000190000-0x0000000000197000-memory.dmp

          Filesize

          28KB

        • memory/1660-13-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/1660-0-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/2592-58-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/2592-55-0x00000000000E0000-0x00000000000E7000-memory.dmp

          Filesize

          28KB

        • memory/2600-71-0x0000000140000000-0x00000001400C4000-memory.dmp

          Filesize

          784KB

        • memory/2600-76-0x0000000140000000-0x00000001400C4000-memory.dmp

          Filesize

          784KB

        • memory/2600-70-0x0000000000230000-0x0000000000237000-memory.dmp

          Filesize

          28KB