Analysis

  • max time kernel
    110s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/02/2025, 18:54

General

  • Target

    e8ae8cd7f089c4d8ce942cc5099b69881dc860a49fde6ca20198a9f03673e25cN.dll

  • Size

    840KB

  • MD5

    961ceeaf3c8ae0fcd64c90ae40a63770

  • SHA1

    06965fcda2e5758c8ea9328817b5fe2c634e1db2

  • SHA256

    e8ae8cd7f089c4d8ce942cc5099b69881dc860a49fde6ca20198a9f03673e25c

  • SHA512

    98fe6dde368d32fdd66c1b501e8b6415720d5a5f82291b8bf5f0baa45711cac0e853f2235a185770bdd806947682f3a7a57db6d8f945be473324eed4bc034771

  • SSDEEP

    12288:5CZm9D4/gh4XcJVaMQCW9hYN0h2ZmrbbFSq08YAXJIUKOe1Et:5km9Dugh66aMk2ZmrbJSWJmEt

Malware Config

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex family
  • Dridex Loader 'dmod' strings 2 IoCs

    Detects 'dmod' strings in Dridex loader.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 10 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 16 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 11 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\e8ae8cd7f089c4d8ce942cc5099b69881dc860a49fde6ca20198a9f03673e25cN.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3572
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\e8ae8cd7f089c4d8ce942cc5099b69881dc860a49fde6ca20198a9f03673e25cN.dll,#1
      2⤵
      • Checks whether UAC is enabled
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4552
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1064
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2044
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4528
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:968
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1204
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4620
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SendNotifyMessage
    PID:4200
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of SendNotifyMessage
    PID:4340
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2624
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4144
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    PID:3612
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:3132
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4012
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4880
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:4868
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3728
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4836
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:1636
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3880
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4140
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    PID:4632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

    Filesize

    471B

    MD5

    9438ca3e3a165181b043945f1dd694ef

    SHA1

    cabc9ef75f1aac438b826a9286639e11058b63ac

    SHA256

    56dd2a747defc9356eb4db73c4661205f08126b8fc12744b7388ae96a5a5858a

    SHA512

    aa86d8844c0bc0eca32350c989ed91731c89c22d8a90bf2ec043b61f0f18ac86dbf499450f591edb39fa3f51d5ceff16bbb2bde677f4375fd095f21547ce32df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

    Filesize

    412B

    MD5

    9a7f0cd0ead1e018ffe438e5b731fa04

    SHA1

    7254ed4b8678e7b11dd3481886ac3a60348f618a

    SHA256

    fae736aecbb0d03be96cd1a17a628c25a6b8b9b28447d6acb10b00eccfebfadc

    SHA512

    8bcde2f98db3c54c06255b3d2a99d3597f63299ac40314e1536e0cbcc40601c9a23a676541c1ae0f1ec4e24832961c096a63f518457d5f96288d013588e18775

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres

    Filesize

    2KB

    MD5

    4fa80e56bde1a54c259a92db3c0580a1

    SHA1

    7407d8391ef398034155098c1fabae7d78e06bfa

    SHA256

    b9122dfa699a1e52f5a3a794220556aaaba1c885402dce98dddf11c4f4654dcf

    SHA512

    7f7005c57910e9b8b4d5de76fc7c45732d6827cedabb3c5e7575b50874a4920f780de1d0863d55ac35870f6ec5724224f027535ae67fd3dc0617ce58d46e698e

  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133848968804971835.txt

    Filesize

    76KB

    MD5

    7e226f6dcca32b4c18f340af174b8a55

    SHA1

    8902e7a96cdc1807d8c8d55b5f0f264cb2ad67e9

    SHA256

    449426ea1fce689ca235188caae4e4fae01edc0fe060f106910a10267ccfe18a

    SHA512

    679d68f303da9a9cde9e6b833e4394813955bd63012858bdbff1d442445d5368d6833c92ba11bbb652e75b7e4273bafb68836eca9a54477927fddf9c77236e55

  • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\UW3I337Z\microsoft.windows[1].xml

    Filesize

    97B

    MD5

    506fad66cfeb0e9c8eeb20d207386bfb

    SHA1

    5e64617a6e6faf5a01509e03f406d9af1e510720

    SHA256

    199b34a97a2a28ad7454329d812cd5334cd2e18f9a933d7acd6ea57ed39eb44d

    SHA512

    84e40b07552a4e2b71b635c7d1905bf3ed59899015c328bc474c869009d97b2fe4b967a2931f743db89ac3566ce4a88ea18ba25c50cf5778d8f28d6913d4363a

  • memory/968-13-0x0000000003740000-0x0000000003741000-memory.dmp

    Filesize

    4KB

  • memory/1636-617-0x00000000041D0000-0x00000000041D1000-memory.dmp

    Filesize

    4KB

  • memory/3132-319-0x0000000004DA0000-0x0000000004DA1000-memory.dmp

    Filesize

    4KB

  • memory/4140-621-0x0000024ED5160000-0x0000024ED5260000-memory.dmp

    Filesize

    1024KB

  • memory/4140-634-0x0000024ED6080000-0x0000024ED60A0000-memory.dmp

    Filesize

    128KB

  • memory/4140-619-0x0000024ED5160000-0x0000024ED5260000-memory.dmp

    Filesize

    1024KB

  • memory/4140-624-0x0000024ED60C0000-0x0000024ED60E0000-memory.dmp

    Filesize

    128KB

  • memory/4140-646-0x0000024ED66A0000-0x0000024ED66C0000-memory.dmp

    Filesize

    128KB

  • memory/4144-174-0x000001465B120000-0x000001465B220000-memory.dmp

    Filesize

    1024KB

  • memory/4144-179-0x000001465C300000-0x000001465C320000-memory.dmp

    Filesize

    128KB

  • memory/4144-203-0x000001465C8C0000-0x000001465C8E0000-memory.dmp

    Filesize

    128KB

  • memory/4144-192-0x000001465BFB0000-0x000001465BFD0000-memory.dmp

    Filesize

    128KB

  • memory/4340-172-0x00000000049E0000-0x00000000049E1000-memory.dmp

    Filesize

    4KB

  • memory/4552-0-0x0000000000D10000-0x0000000000D16000-memory.dmp

    Filesize

    24KB

  • memory/4552-7-0x00000000748C0000-0x0000000074992000-memory.dmp

    Filesize

    840KB

  • memory/4552-8-0x0000000000D10000-0x0000000000D16000-memory.dmp

    Filesize

    24KB

  • memory/4552-1-0x00000000748C0000-0x0000000074992000-memory.dmp

    Filesize

    840KB

  • memory/4620-50-0x000002C2FF110000-0x000002C2FF130000-memory.dmp

    Filesize

    128KB

  • memory/4620-14-0x000002C2FDD20000-0x000002C2FDE20000-memory.dmp

    Filesize

    1024KB

  • memory/4620-15-0x000002C2FDD20000-0x000002C2FDE20000-memory.dmp

    Filesize

    1024KB

  • memory/4620-19-0x000002C2FED40000-0x000002C2FED60000-memory.dmp

    Filesize

    128KB

  • memory/4620-23-0x000002C2FED00000-0x000002C2FED20000-memory.dmp

    Filesize

    128KB

  • memory/4836-484-0x0000027D00140000-0x0000027D00160000-memory.dmp

    Filesize

    128KB

  • memory/4836-503-0x0000027D00550000-0x0000027D00570000-memory.dmp

    Filesize

    128KB

  • memory/4836-472-0x0000027D00180000-0x0000027D001A0000-memory.dmp

    Filesize

    128KB

  • memory/4868-464-0x0000000004D80000-0x0000000004D81000-memory.dmp

    Filesize

    4KB

  • memory/4880-357-0x000001F818430000-0x000001F818450000-memory.dmp

    Filesize

    128KB

  • memory/4880-337-0x000001F818020000-0x000001F818040000-memory.dmp

    Filesize

    128KB

  • memory/4880-320-0x000001F816F00000-0x000001F817000000-memory.dmp

    Filesize

    1024KB

  • memory/4880-321-0x000001F816F00000-0x000001F817000000-memory.dmp

    Filesize

    1024KB

  • memory/4880-325-0x000001F818060000-0x000001F818080000-memory.dmp

    Filesize

    128KB