Analysis

  • max time kernel
    110s
  • max time network
    101s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250129-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-02-2025 12:53

General

  • Target

    fa4dda528ea80c76a9dcd818142700dc3009a45d9cb9fe451d3222f14b358cdc.dll

  • Size

    816KB

  • MD5

    f0337ae7fb833cb104ed879681ae3970

  • SHA1

    e4348860984dbd7d231836f7cedc6024450974e6

  • SHA256

    fa4dda528ea80c76a9dcd818142700dc3009a45d9cb9fe451d3222f14b358cdc

  • SHA512

    5a3babfefb32649dea5b3bc6fb6e879152bc14348eaa7c33bdca37ba49a02f924b822071c9885c4ae7fe556e1360a0e88478cf5e13064627102bf773c5d4c9a0

  • SSDEEP

    6144:zh7RxJSC3VZLCEixjAoN6StM3LORFxz0Mn0G6oanXCW5DVQGVDmrvcJdR7OsDtoC:zh9fKxjNoYxTw9XrRK0dBOJpy0RXR8pJ

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex family
  • Dridex Loader 'dmod' strings 2 IoCs

    Detects 'dmod' strings in Dridex loader.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 3 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 4 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 24 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of FindShellTrayWindow 34 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\fa4dda528ea80c76a9dcd818142700dc3009a45d9cb9fe451d3222f14b358cdc.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3516
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\fa4dda528ea80c76a9dcd818142700dc3009a45d9cb9fe451d3222f14b358cdc.dll,#1
      2⤵
      • Checks whether UAC is enabled
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2980
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1580
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3272
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4104
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:5068
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:208

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

    Filesize

    471B

    MD5

    4315b7da28e13257152a5ab4bf3f862a

    SHA1

    f90eabb713fb97519721bde0b5f92d793639fc4e

    SHA256

    c06c67cde54e107ae9622fd16154fa4f1a1c3cf5b585630a21c53217eb46a9b5

    SHA512

    5bfe3cb1fb7515c5bcdd2b71ddd39b5b5fa570cb1b8f50687567e194d576e1a84938199960bbf98901f652573344547184bd768c071354db2e2e8a63630e2d58

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

    Filesize

    412B

    MD5

    99f354ddd20701bd7f52ab6caea6f541

    SHA1

    17409cab09e3f552895e554b17e78d3fde619edd

    SHA256

    8f23dd2c9229d3195edf63c81bfe62b57e38d387c54af2a5146ded1fe672bd4c

    SHA512

    fa9d4a4786ad64e8123f095cffa6572a4b6f8add6bdd64f58fd3da79c79221a7f8ff4c3b531c05be743ade3288248ee3209cbeb4245ea2f2714f9bea52b10176

  • memory/2980-0-0x0000000001220000-0x0000000001226000-memory.dmp

    Filesize

    24KB

  • memory/2980-1-0x00000000756C0000-0x000000007578C000-memory.dmp

    Filesize

    816KB

  • memory/2980-12-0x00000000756C0000-0x000000007578C000-memory.dmp

    Filesize

    816KB

  • memory/2980-13-0x0000000001220000-0x0000000001226000-memory.dmp

    Filesize

    24KB