Analysis

  • max time kernel
    120s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-01-2025 04:58

General

  • Target

    5f40fbec7483c678b7c827fd03e09068b8d95072ad350f27915c4e40889da7bbN.dll

  • Size

    788KB

  • MD5

    69de4bfc31cfc35a3dad7ed9eee22670

  • SHA1

    69d8d4ba7eb29d52a748e065491396ce182831f2

  • SHA256

    5f40fbec7483c678b7c827fd03e09068b8d95072ad350f27915c4e40889da7bb

  • SHA512

    c993ff43d75b5ba6c616df1e408268c788542c61c277038fd84db93553334c2b54de3d3bff1aed2464eb4e593be2b809003b28531b4a9016b0f76e163a3d36fa

  • SSDEEP

    12288:ibP23onr2XV7KrPqgmNiQhDOy4/AT4r/E16K1QS/lsHAGHdDvRQ2sd1gqQ:ibe42XV7KWgmjDR/T4a/Mdjm

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex family
  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\5f40fbec7483c678b7c827fd03e09068b8d95072ad350f27915c4e40889da7bbN.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:1832
  • C:\Windows\system32\slui.exe
    C:\Windows\system32\slui.exe
    1⤵
      PID:2512
    • C:\Users\Admin\AppData\Local\gHrlqi\slui.exe
      C:\Users\Admin\AppData\Local\gHrlqi\slui.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:2904
    • C:\Windows\system32\mblctr.exe
      C:\Windows\system32\mblctr.exe
      1⤵
        PID:1668
      • C:\Users\Admin\AppData\Local\oTUcPUX\mblctr.exe
        C:\Users\Admin\AppData\Local\oTUcPUX\mblctr.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:2620
      • C:\Windows\system32\rdpshell.exe
        C:\Windows\system32\rdpshell.exe
        1⤵
          PID:772
        • C:\Users\Admin\AppData\Local\CHqo\rdpshell.exe
          C:\Users\Admin\AppData\Local\CHqo\rdpshell.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:1572

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\gHrlqi\WINBRAND.dll

          Filesize

          788KB

          MD5

          09afdfcae794fe6f07d31cf2a5179dbc

          SHA1

          ee3788bf7a39bfa73bbec224d6b136992cb5fdd1

          SHA256

          eb4367e253dbcc0e4ffca8688788ff33e8a8873f05ad883b13963e8f75303b4d

          SHA512

          93a85f91d32757286dcb79409148e6264e88e6d154e4e856a544609990eef3526a1e868cd4f4ab9e2b4a1108ee26020e9d7cea6c2f9f9541be9fddd8abe89e69

        • C:\Users\Admin\AppData\Local\gHrlqi\slui.exe

          Filesize

          341KB

          MD5

          c5ce5ce799387e82b7698a0ee5544a6d

          SHA1

          ed37fdb169bb539271c117d3e8a5f14fd8df1c0d

          SHA256

          34aa7ca0ea833263a6883827e161a5c218576c5ad97e0ce386fad4250676b42c

          SHA512

          79453b45e1f38d164ee3dbc232f774ff121d4394c22783140f5c8c722f184a69f499f2fb9621bdb28f565065b791883526e1a1d4abef9df82289613c2ce97a5c

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Ukatmrkmywz.lnk

          Filesize

          1KB

          MD5

          97eca00125de6d9ba2a621048f08a1e1

          SHA1

          903c1687e84d7e2740077f9fcaf46e722dd19aea

          SHA256

          04526712dfc6c442e570c399765871320e4fd3e24735b26d378d26a727d5e41c

          SHA512

          1ac55e522ed2ff80550f7a1f34f20a9b64f11f19eb0aef911c1e78aa115497dd96c4ae058fe29d5c92ba25b29de7943bb14cc423c93844fea599647122d6a67a

        • \Users\Admin\AppData\Local\CHqo\WTSAPI32.dll

          Filesize

          792KB

          MD5

          430b03635eedba7d5e72b49ccb858799

          SHA1

          e4a45c3fdd8c5bc59f25d1be84992ab9e9251161

          SHA256

          e80ef7bc40382cd8976896368fb5e5a6fcf95b844c6a3e34a56dd7c3d7eb8b90

          SHA512

          53bb75016d006dabeec49645a1f33773a7077e4fc68b16b156ee501c438ab60445731c79a0fd579a229f9346e72e0b3615cb1e0ff6e56d8a188057c4a9ea2632

        • \Users\Admin\AppData\Local\CHqo\rdpshell.exe

          Filesize

          292KB

          MD5

          a62dfcea3a58ba8fcf32f831f018fe3f

          SHA1

          75f7690b19866f2c2b3dd3bfdff8a1c6fa8e958b

          SHA256

          f8346a44f12e5b1ca6beaae5fbdf5f7f494ba204379c21d1875b03ba6da6152e

          SHA512

          9a3df5be95017c23ab144302d2275654e86193e2cd94957d5f72bda3cb171ec2a6da14e6631a7fd4fd053b4529f4083aa287ada57484ad0ee01a8e5b2b54c603

        • \Users\Admin\AppData\Local\oTUcPUX\WINMM.dll

          Filesize

          796KB

          MD5

          8244769e503a2961ef3bc6392698d83d

          SHA1

          d5dfa05d79dcc1e1cb22239b859e514bc23e87b4

          SHA256

          ac198308277a6f5c86b0f55bb6682d6d629dd05c4133747fb2e439bc2c20ad17

          SHA512

          8f44ba671d99bbe88e8e2508d7e78cd0ee32a0cfe97fd7033d46a9adefc20526ac940c5c7dab5fa06144810968ff64bbc6b22bcd1e5baa4b744858a10ae5f41e

        • \Users\Admin\AppData\Local\oTUcPUX\mblctr.exe

          Filesize

          935KB

          MD5

          fa4c36b574bf387d9582ed2c54a347a8

          SHA1

          149077715ee56c668567e3a9cb9842284f4fe678

          SHA256

          b71cdf708d4a4f045f784de5e5458ebf9a4fa2b188c3f7422e2fbfe19310be3f

          SHA512

          1f04ce0440eec7477153ebc2ce56eaabcbbac58d9d703c03337f030e160d22cd635ae201752bc2962643c75bbf2036afdd69d97e8cbc81260fd0e2f55946bb55

        • memory/1156-35-0x0000000140000000-0x00000001400C5000-memory.dmp

          Filesize

          788KB

        • memory/1156-8-0x0000000140000000-0x00000001400C5000-memory.dmp

          Filesize

          788KB

        • memory/1156-23-0x0000000140000000-0x00000001400C5000-memory.dmp

          Filesize

          788KB

        • memory/1156-26-0x0000000077BB0000-0x0000000077BB2000-memory.dmp

          Filesize

          8KB

        • memory/1156-25-0x0000000077A51000-0x0000000077A52000-memory.dmp

          Filesize

          4KB

        • memory/1156-16-0x0000000140000000-0x00000001400C5000-memory.dmp

          Filesize

          788KB

        • memory/1156-15-0x0000000140000000-0x00000001400C5000-memory.dmp

          Filesize

          788KB

        • memory/1156-14-0x0000000140000000-0x00000001400C5000-memory.dmp

          Filesize

          788KB

        • memory/1156-13-0x0000000140000000-0x00000001400C5000-memory.dmp

          Filesize

          788KB

        • memory/1156-12-0x0000000140000000-0x00000001400C5000-memory.dmp

          Filesize

          788KB

        • memory/1156-107-0x0000000077846000-0x0000000077847000-memory.dmp

          Filesize

          4KB

        • memory/1156-4-0x0000000077846000-0x0000000077847000-memory.dmp

          Filesize

          4KB

        • memory/1156-41-0x0000000140000000-0x00000001400C5000-memory.dmp

          Filesize

          788KB

        • memory/1156-10-0x0000000140000000-0x00000001400C5000-memory.dmp

          Filesize

          788KB

        • memory/1156-45-0x0000000140000000-0x00000001400C5000-memory.dmp

          Filesize

          788KB

        • memory/1156-24-0x0000000002500000-0x0000000002507000-memory.dmp

          Filesize

          28KB

        • memory/1156-5-0x0000000002520000-0x0000000002521000-memory.dmp

          Filesize

          4KB

        • memory/1156-7-0x0000000140000000-0x00000001400C5000-memory.dmp

          Filesize

          788KB

        • memory/1156-9-0x0000000140000000-0x00000001400C5000-memory.dmp

          Filesize

          788KB

        • memory/1572-89-0x0000000000180000-0x0000000000187000-memory.dmp

          Filesize

          28KB

        • memory/1572-90-0x0000000140000000-0x00000001400C6000-memory.dmp

          Filesize

          792KB

        • memory/1572-95-0x0000000140000000-0x00000001400C6000-memory.dmp

          Filesize

          792KB

        • memory/1832-0-0x0000000000520000-0x0000000000527000-memory.dmp

          Filesize

          28KB

        • memory/1832-11-0x0000000140000000-0x00000001400C5000-memory.dmp

          Filesize

          788KB

        • memory/1832-1-0x0000000140000000-0x00000001400C5000-memory.dmp

          Filesize

          788KB

        • memory/2620-71-0x0000000000200000-0x0000000000207000-memory.dmp

          Filesize

          28KB

        • memory/2620-72-0x0000000140000000-0x00000001400C7000-memory.dmp

          Filesize

          796KB

        • memory/2620-77-0x0000000140000000-0x00000001400C7000-memory.dmp

          Filesize

          796KB

        • memory/2904-56-0x0000000001AC0000-0x0000000001AC7000-memory.dmp

          Filesize

          28KB

        • memory/2904-59-0x0000000140000000-0x00000001400C5000-memory.dmp

          Filesize

          788KB