Analysis

  • max time kernel
    120s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-01-2025 00:37

General

  • Target

    a6f60e617596fae22bfc758d49593f3a413ffab053d4d37128849496bc82100e.dll

  • Size

    776KB

  • MD5

    267ebe7f32597e6cbbd20590a180d77f

  • SHA1

    12acab01e939ca2cbd0b2d419a5292127f76f91b

  • SHA256

    a6f60e617596fae22bfc758d49593f3a413ffab053d4d37128849496bc82100e

  • SHA512

    15d78c31ce57f90230c0a9acac167791197b1178e1a7cb9988f71b953f3c3c3a8ae4d522fe3ec8b4091b99b1e5b98929c46a32f5f3e796e0facf8f35a0557d67

  • SSDEEP

    12288:fbP23onr2XO7KrPqgmNiQhDOy4/AT4r/E16K1QS/lsHAGHdDvRQ2sd1gqQg:fbe42XO7KWgmjDR/T4a/MdjmJ

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex family
  • Dridex Shellcode 1 IoCs

    Detects Dridex Payload shellcode injected in Explorer process.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\a6f60e617596fae22bfc758d49593f3a413ffab053d4d37128849496bc82100e.dll,#1
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    PID:2436
  • C:\Windows\system32\MoUsoCoreWorker.exe
    C:\Windows\system32\MoUsoCoreWorker.exe
    1⤵
      PID:2820
    • C:\Users\Admin\AppData\Local\43c\MoUsoCoreWorker.exe
      C:\Users\Admin\AppData\Local\43c\MoUsoCoreWorker.exe
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      PID:3480
    • C:\Windows\system32\EhStorAuthn.exe
      C:\Windows\system32\EhStorAuthn.exe
      1⤵
        PID:1212
      • C:\Users\Admin\AppData\Local\BxwryXB\EhStorAuthn.exe
        C:\Users\Admin\AppData\Local\BxwryXB\EhStorAuthn.exe
        1⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        PID:2956
      • C:\Windows\system32\mblctr.exe
        C:\Windows\system32\mblctr.exe
        1⤵
          PID:3940
        • C:\Users\Admin\AppData\Local\31g9ox6Av\mblctr.exe
          C:\Users\Admin\AppData\Local\31g9ox6Av\mblctr.exe
          1⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:3916

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\31g9ox6Av\WINMM.dll

          Filesize

          784KB

          MD5

          6436e5c2a610b8d2ccbb304039602dc3

          SHA1

          2de4420ca46bfd473c388c6d62b048a763c21c7d

          SHA256

          4801f93d1904fe9e18c8314cb8780f8d97b378d70a0ab0612605beecf0d7ca83

          SHA512

          4a5f15b8aa9631c40ab02499fb4971ca8a5262adf356a2751a64ee3f87120c1e89a408c3ea1c85c148a52d19e7ee66e3a64e004360c7b218fd8eca2d9e75e871

        • C:\Users\Admin\AppData\Local\31g9ox6Av\mblctr.exe

          Filesize

          790KB

          MD5

          d3db14eabb2679e08020bcd0c96fa9f6

          SHA1

          578dca7aad29409634064579d269e61e1f07d9dd

          SHA256

          3baa1dc0756ebb0c2c70a31be7147863d8d8ba056c1aa7f979307f8790d1ff69

          SHA512

          14dc895ae458ff0ca13d9c27aa5b4cfc906d338603d43389bb5f4429be593a587818855d1fe938f9ebebf46467fb0c1ab28247e8f9f5357098e8b822ecd8fffe

        • C:\Users\Admin\AppData\Local\43c\MoUsoCoreWorker.exe

          Filesize

          1.6MB

          MD5

          47c6b45ff22b73caf40bb29392386ce3

          SHA1

          7e29a8d98fbb9b02d3d22e3576f4fd61ab50ffe9

          SHA256

          cbccb642725edb42e749e26ded68a16b3aa20e291a1a7793a2d4efebb75f99c0

          SHA512

          c919ab84a497616e7969d58c251f4e6efc337b41ef6956864b86d66ae1437294c124232fec54433eab3a6518ed529f8445dd0b23706b2f42f3fa42e69711f331

        • C:\Users\Admin\AppData\Local\43c\XmlLite.dll

          Filesize

          776KB

          MD5

          59c75eb33c157f0cffbcfa0758caa482

          SHA1

          0f8e77f0591f06f34bc3761db357a6df279665db

          SHA256

          a7fe0553acc5302c379ee76b059ce4cc342411ce19bfb6ed6c84812190dedeb3

          SHA512

          2210d053d0d67d6b7ca873aefe81404eb0a6b71165d900dcd7aed036f528cbb73cd3c45421a366a5e19308e18fb654f9568c03cc45946374e136e48c4c0046d5

        • C:\Users\Admin\AppData\Local\BxwryXB\EhStorAuthn.exe

          Filesize

          128KB

          MD5

          d45618e58303edb4268a6cca5ec99ecc

          SHA1

          1f8049fc5ea8b57bb68e19fb55cb9dc1e18e9513

          SHA256

          d527323643be9df4d174c3169c6f2c7854a59b781654bcaebd154cb51fb4219c

          SHA512

          5d7ae663dcfedfaf00836dc018131851e5a40778bd582b417b9f0bbd4bb6d1b2eb8f37f7f5a01cd2beed78b6037ef6eb2a3290248d5e901173b1407990a202bd

        • C:\Users\Admin\AppData\Local\BxwryXB\UxTheme.dll

          Filesize

          780KB

          MD5

          024e8ab13a5456834ebeb22d8e4ba83e

          SHA1

          50b185583b2b898afdfb5697ebe11ad647fb5323

          SHA256

          1778c54ad9c420cb05de84ed040e2f286fe48b13504a2c0d373c5fd91f368358

          SHA512

          ca60a5fb5423a006b9d8e4d8cad5497151af48b990aa6a90e737d1300d2aa7949e761afc350578ea41bb590c2dc1bc873f74ec0411ffc2756231ee01c0960ed4

        • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Zugrajzkhopu.lnk

          Filesize

          1KB

          MD5

          18d327dfbcc99443cb9151326ba03f00

          SHA1

          9526967283387e93efed0abecbcc9534632eed0b

          SHA256

          95c7b17c51e0d2bfc7212f5bb9ed93019f32679489b26df4417917f05275de90

          SHA512

          f17f86840a691296643be6c122fe68bb5e5537b7d68a3e579c1122fda9edbe6eefc856b9eee703973ee17b240d17f87f4add07f9f2ca952f51ba078d61169e00

        • memory/2436-13-0x0000000140000000-0x00000001400C2000-memory.dmp

          Filesize

          776KB

        • memory/2436-0-0x0000000140000000-0x00000001400C2000-memory.dmp

          Filesize

          776KB

        • memory/2436-3-0x000002587D580000-0x000002587D587000-memory.dmp

          Filesize

          28KB

        • memory/2956-60-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/2956-63-0x0000014ED8460000-0x0000014ED8467000-memory.dmp

          Filesize

          28KB

        • memory/2956-66-0x0000000140000000-0x00000001400C3000-memory.dmp

          Filesize

          780KB

        • memory/3432-21-0x0000000140000000-0x00000001400C2000-memory.dmp

          Filesize

          776KB

        • memory/3432-12-0x0000000140000000-0x00000001400C2000-memory.dmp

          Filesize

          776KB

        • memory/3432-32-0x0000000140000000-0x00000001400C2000-memory.dmp

          Filesize

          776KB

        • memory/3432-34-0x0000000140000000-0x00000001400C2000-memory.dmp

          Filesize

          776KB

        • memory/3432-9-0x0000000140000000-0x00000001400C2000-memory.dmp

          Filesize

          776KB

        • memory/3432-10-0x0000000140000000-0x00000001400C2000-memory.dmp

          Filesize

          776KB

        • memory/3432-5-0x0000000002510000-0x0000000002511000-memory.dmp

          Filesize

          4KB

        • memory/3432-4-0x00007FFA2109A000-0x00007FFA2109B000-memory.dmp

          Filesize

          4KB

        • memory/3432-11-0x0000000140000000-0x00000001400C2000-memory.dmp

          Filesize

          776KB

        • memory/3432-8-0x0000000140000000-0x00000001400C2000-memory.dmp

          Filesize

          776KB

        • memory/3432-23-0x00007FFA21FC0000-0x00007FFA21FD0000-memory.dmp

          Filesize

          64KB

        • memory/3432-22-0x0000000000AA0000-0x0000000000AA7000-memory.dmp

          Filesize

          28KB

        • memory/3432-14-0x0000000140000000-0x00000001400C2000-memory.dmp

          Filesize

          776KB

        • memory/3432-7-0x0000000140000000-0x00000001400C2000-memory.dmp

          Filesize

          776KB

        • memory/3480-49-0x0000000140000000-0x00000001400C2000-memory.dmp

          Filesize

          776KB

        • memory/3480-43-0x0000027D07580000-0x0000027D07587000-memory.dmp

          Filesize

          28KB

        • memory/3916-77-0x0000000140000000-0x00000001400C4000-memory.dmp

          Filesize

          784KB

        • memory/3916-83-0x0000000140000000-0x00000001400C4000-memory.dmp

          Filesize

          784KB

        • memory/3916-80-0x000001F0198F0000-0x000001F0198F7000-memory.dmp

          Filesize

          28KB