Analysis
-
max time kernel
138s -
max time network
134s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
02-11-2020 13:01
Static task
static1
Behavioral task
behavioral1
Sample
Inv_121314_42664.xlsm
Resource
win7v20201028
General
-
Target
Inv_121314_42664.xlsm
-
Size
26KB
-
MD5
1b109efade90ace7d953507adb1f1563
-
SHA1
e4eef787b94f80e5374a2058cafc6a37d3fa2c0f
-
SHA256
2ec35da14989692e77df25d56c7b1d43a3e93a72ec2fc7cce67b2fa448744752
-
SHA512
4c16f6fcbb91b7a75cf7f1b2bb9938aa4275c0954f9ec1a2b189e100b53e225d0bfb2ae95dd167a794a6e88feb8fece8d05c6ce8149ae975d34886cff32a937f
Malware Config
Extracted
dridex
10444
195.154.237.245:443
46.105.131.73:8172
91.238.160.158:18443
213.183.128.99:3786
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
regsvr32.exeregsvr32.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2100 648 regsvr32.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3860 648 regsvr32.exe EXCEL.EXE -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\ykgippie._BQ cryptone C:\Users\Admin\AppData\Local\Temp\wtmxhg._OH cryptone \Users\Admin\AppData\Local\Temp\ykgippie._BQ cryptone \Users\Admin\AppData\Local\Temp\wtmxhg._OH cryptone -
Processes:
resource yara_rule behavioral2/memory/3856-12-0x00000000033A0000-0x00000000033DD000-memory.dmp dridex_ldr behavioral2/memory/2196-13-0x0000000003470000-0x00000000034AD000-memory.dmp dridex_ldr -
Loads dropped DLL 2 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 2196 regsvr32.exe 3856 regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 648 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
EXCEL.EXEpid process 648 EXCEL.EXE 648 EXCEL.EXE 648 EXCEL.EXE 648 EXCEL.EXE 648 EXCEL.EXE 648 EXCEL.EXE 648 EXCEL.EXE 648 EXCEL.EXE 648 EXCEL.EXE 648 EXCEL.EXE 648 EXCEL.EXE 648 EXCEL.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
EXCEL.EXEregsvr32.exeregsvr32.exedescription pid process target process PID 648 wrote to memory of 2100 648 EXCEL.EXE regsvr32.exe PID 648 wrote to memory of 2100 648 EXCEL.EXE regsvr32.exe PID 648 wrote to memory of 3860 648 EXCEL.EXE regsvr32.exe PID 648 wrote to memory of 3860 648 EXCEL.EXE regsvr32.exe PID 2100 wrote to memory of 3856 2100 regsvr32.exe regsvr32.exe PID 2100 wrote to memory of 3856 2100 regsvr32.exe regsvr32.exe PID 2100 wrote to memory of 3856 2100 regsvr32.exe regsvr32.exe PID 3860 wrote to memory of 2196 3860 regsvr32.exe regsvr32.exe PID 3860 wrote to memory of 2196 3860 regsvr32.exe regsvr32.exe PID 3860 wrote to memory of 2196 3860 regsvr32.exe regsvr32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Inv_121314_42664.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" -s C:\Users\Admin\AppData\Local\Temp\ykgippie._BQ2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\regsvr32.exe-s C:\Users\Admin\AppData\Local\Temp\ykgippie._BQ3⤵
- Loads dropped DLL
PID:3856 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" -s C:\Users\Admin\AppData\Local\Temp\wtmxhg._OH2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\SysWOW64\regsvr32.exe-s C:\Users\Admin\AppData\Local\Temp\wtmxhg._OH3⤵
- Loads dropped DLL
PID:2196
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\wtmxhg._OHMD5
745ec2e78f46e4708d61b0c53ff17e9e
SHA1c59243926c629ed640370e78e62ac95645f1d850
SHA25698b86b84236397a88c69916d68734c815b97a00529d1bf513584c81421083e59
SHA5122be9bd3c6870ad57d4feed51337d7e65d5a6d91506c12e2add04760c4cc49ab7ff7890355c5a2c7339de0d848bca815472fc475b250d5012b237b7bf30143b33
-
C:\Users\Admin\AppData\Local\Temp\ykgippie._BQMD5
745ec2e78f46e4708d61b0c53ff17e9e
SHA1c59243926c629ed640370e78e62ac95645f1d850
SHA25698b86b84236397a88c69916d68734c815b97a00529d1bf513584c81421083e59
SHA5122be9bd3c6870ad57d4feed51337d7e65d5a6d91506c12e2add04760c4cc49ab7ff7890355c5a2c7339de0d848bca815472fc475b250d5012b237b7bf30143b33
-
\Users\Admin\AppData\Local\Temp\wtmxhg._OHMD5
745ec2e78f46e4708d61b0c53ff17e9e
SHA1c59243926c629ed640370e78e62ac95645f1d850
SHA25698b86b84236397a88c69916d68734c815b97a00529d1bf513584c81421083e59
SHA5122be9bd3c6870ad57d4feed51337d7e65d5a6d91506c12e2add04760c4cc49ab7ff7890355c5a2c7339de0d848bca815472fc475b250d5012b237b7bf30143b33
-
\Users\Admin\AppData\Local\Temp\ykgippie._BQMD5
745ec2e78f46e4708d61b0c53ff17e9e
SHA1c59243926c629ed640370e78e62ac95645f1d850
SHA25698b86b84236397a88c69916d68734c815b97a00529d1bf513584c81421083e59
SHA5122be9bd3c6870ad57d4feed51337d7e65d5a6d91506c12e2add04760c4cc49ab7ff7890355c5a2c7339de0d848bca815472fc475b250d5012b237b7bf30143b33
-
memory/648-0-0x00007FF91E870000-0x00007FF91EEA7000-memory.dmpFilesize
6.2MB
-
memory/2100-4-0x0000000000000000-mapping.dmp
-
memory/2196-9-0x0000000000000000-mapping.dmp
-
memory/2196-13-0x0000000003470000-0x00000000034AD000-memory.dmpFilesize
244KB
-
memory/3856-7-0x0000000000000000-mapping.dmp
-
memory/3856-12-0x00000000033A0000-0x00000000033DD000-memory.dmpFilesize
244KB
-
memory/3860-6-0x0000000000000000-mapping.dmp