Analysis

  • max time kernel
    140s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-02-2025 05:50

General

  • Target

    ddd385a03c118320fbb685a6721e11802d0c5051dba3ebec7d9009c51e0cf2b8.dll

  • Size

    608KB

  • MD5

    0c311ee344fe160915960e816b4771a0

  • SHA1

    0e273cbc7016ad0c9264918cd6ef0c369effb57a

  • SHA256

    ddd385a03c118320fbb685a6721e11802d0c5051dba3ebec7d9009c51e0cf2b8

  • SHA512

    fb78264a74d50f38023c370f2b8d401e6b7465ca630c5fe48d541ec86656d1827174eca4ec25fa65c54c64e480f520a35e96b2a546a2296a707c64435f1f619f

  • SSDEEP

    6144:yg12AzW5HsiScvtNybiR8g0ISTFCRVe9/JE+++sKS1JGWWsca65eu9K2zqc4CWAZ:y82AK5HOEksJ1YW7DwzqyQ

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex family
  • Dridex Loader 'dmod' strings 2 IoCs

    Detects 'dmod' strings in Dridex loader.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 7 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 12 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 8 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\ddd385a03c118320fbb685a6721e11802d0c5051dba3ebec7d9009c51e0cf2b8.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\ddd385a03c118320fbb685a6721e11802d0c5051dba3ebec7d9009c51e0cf2b8.dll,#1
      2⤵
      • Checks whether UAC is enabled
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4056
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3360
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2068
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4032
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4240
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2660
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3812
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1012
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of SendNotifyMessage
    PID:4880
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2772
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4708
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:4108
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2952
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3004
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:5112
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2332
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3812
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Modifies registry class
    PID:4524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres

    Filesize

    2KB

    MD5

    19196a74e4918972c420c38861de752e

    SHA1

    24833a1a0d2c824454a2c28fa4c627ecd119211a

    SHA256

    d5eb01a4738803ddf2ff0042a7bb44f833c18c910f6af25b100302a1d92ce1ad

    SHA512

    a4e8edfa97a924e46f6559c64f379d2196c1fa488ad9b213b1dfd83d4b359bf0e04720f44d279f1ea9b9f76cc5d0e4af2bce3b587487e01c5f6a56cb3f3f3a31

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133847634595274711.txt

    Filesize

    75KB

    MD5

    38003936fd4f533fab23bf9ce64cdfa8

    SHA1

    9ea1306eace3af607ce80c5c26ce44d7f4d7cbcf

    SHA256

    b164bb96292b15f1e08708ef9d4876a1d303cfaa6465ae52d01d3051fc1d9ef9

    SHA512

    b3148f3791741756dd66c4389dea956aefa206e3c2daec4c9500326f10dcc707e2917b7c0b05bac489fdda7f658549c7a13ef1232ac318bdb4ca4015c56cc22c

  • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\5018NUY7\microsoft.windows[1].xml

    Filesize

    97B

    MD5

    e3c88c5e43419a9341daaf3ce9d842ca

    SHA1

    35b177cc342d7694793ce3e4a2b09534389ee1a5

    SHA256

    89c375db3fb0fc28facc892ec859010d6b9e0209b53e0960335e84ea59e42095

    SHA512

    3946bbb05f31d9a5881a541787d8a72b0290496d38cc1970210a86a3cbd79accda669dde84f3ffbe9023e7f5a5577ba33425f39510a47e1202302abb074f6e8e

  • memory/1012-26-0x000001AACD420000-0x000001AACD440000-memory.dmp

    Filesize

    128KB

  • memory/1012-10-0x000001AACC300000-0x000001AACC400000-memory.dmp

    Filesize

    1024KB

  • memory/1012-11-0x000001AACC300000-0x000001AACC400000-memory.dmp

    Filesize

    1024KB

  • memory/1012-15-0x000001AACD460000-0x000001AACD480000-memory.dmp

    Filesize

    128KB

  • memory/1012-33-0x000001AACD860000-0x000001AACD880000-memory.dmp

    Filesize

    128KB

  • memory/2660-8-0x0000000002FA0000-0x0000000002FA1000-memory.dmp

    Filesize

    4KB

  • memory/3004-331-0x00000178D9200000-0x00000178D9300000-memory.dmp

    Filesize

    1024KB

  • memory/3004-335-0x00000178D9FE0000-0x00000178DA000000-memory.dmp

    Filesize

    128KB

  • memory/3004-367-0x00000178DA6B0000-0x00000178DA6D0000-memory.dmp

    Filesize

    128KB

  • memory/3004-350-0x00000178D9FA0000-0x00000178D9FC0000-memory.dmp

    Filesize

    128KB

  • memory/3004-330-0x00000178D9200000-0x00000178D9300000-memory.dmp

    Filesize

    1024KB

  • memory/3812-495-0x000001CBC2B40000-0x000001CBC2B60000-memory.dmp

    Filesize

    128KB

  • memory/3812-506-0x000001CBC2F50000-0x000001CBC2F70000-memory.dmp

    Filesize

    128KB

  • memory/3812-484-0x000001CBC2B80000-0x000001CBC2BA0000-memory.dmp

    Filesize

    128KB

  • memory/4056-2-0x00000000756F0000-0x0000000075788000-memory.dmp

    Filesize

    608KB

  • memory/4056-5-0x00000000756F0000-0x0000000075788000-memory.dmp

    Filesize

    608KB

  • memory/4056-6-0x0000000000990000-0x0000000000996000-memory.dmp

    Filesize

    24KB

  • memory/4056-0-0x0000000000990000-0x0000000000996000-memory.dmp

    Filesize

    24KB

  • memory/4108-328-0x0000000004770000-0x0000000004771000-memory.dmp

    Filesize

    4KB

  • memory/4708-194-0x000001BB00600000-0x000001BB00620000-memory.dmp

    Filesize

    128KB

  • memory/4708-207-0x000001BB00A00000-0x000001BB00A20000-memory.dmp

    Filesize

    128KB

  • memory/4708-180-0x000001C37F540000-0x000001C37F640000-memory.dmp

    Filesize

    1024KB

  • memory/4708-184-0x000001BB00640000-0x000001BB00660000-memory.dmp

    Filesize

    128KB

  • memory/4708-179-0x000001C37F540000-0x000001C37F640000-memory.dmp

    Filesize

    1024KB

  • memory/4880-177-0x00000000045B0000-0x00000000045B1000-memory.dmp

    Filesize

    4KB

  • memory/5112-476-0x0000000004A60000-0x0000000004A61000-memory.dmp

    Filesize

    4KB