Analysis

  • max time kernel
    138s
  • max time network
    134s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    02-11-2020 13:01

General

  • Target

    Inv_121314_42664.xlsm

  • Size

    26KB

  • MD5

    1b109efade90ace7d953507adb1f1563

  • SHA1

    e4eef787b94f80e5374a2058cafc6a37d3fa2c0f

  • SHA256

    2ec35da14989692e77df25d56c7b1d43a3e93a72ec2fc7cce67b2fa448744752

  • SHA512

    4c16f6fcbb91b7a75cf7f1b2bb9938aa4275c0954f9ec1a2b189e100b53e225d0bfb2ae95dd167a794a6e88feb8fece8d05c6ce8149ae975d34886cff32a937f

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

195.154.237.245:443

46.105.131.73:8172

91.238.160.158:18443

213.183.128.99:3786

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • CryptOne packer 4 IoCs

    Detects CryptOne packer defined in NCC blogpost.

  • Dridex Loader 2 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Loads dropped DLL 2 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Inv_121314_42664.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:648
    • C:\Windows\System32\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" -s C:\Users\Admin\AppData\Local\Temp\ykgippie._BQ
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:2100
      • C:\Windows\SysWOW64\regsvr32.exe
        -s C:\Users\Admin\AppData\Local\Temp\ykgippie._BQ
        3⤵
        • Loads dropped DLL
        PID:3856
    • C:\Windows\System32\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" -s C:\Users\Admin\AppData\Local\Temp\wtmxhg._OH
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:3860
      • C:\Windows\SysWOW64\regsvr32.exe
        -s C:\Users\Admin\AppData\Local\Temp\wtmxhg._OH
        3⤵
        • Loads dropped DLL
        PID:2196

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\wtmxhg._OH
    MD5

    745ec2e78f46e4708d61b0c53ff17e9e

    SHA1

    c59243926c629ed640370e78e62ac95645f1d850

    SHA256

    98b86b84236397a88c69916d68734c815b97a00529d1bf513584c81421083e59

    SHA512

    2be9bd3c6870ad57d4feed51337d7e65d5a6d91506c12e2add04760c4cc49ab7ff7890355c5a2c7339de0d848bca815472fc475b250d5012b237b7bf30143b33

  • C:\Users\Admin\AppData\Local\Temp\ykgippie._BQ
    MD5

    745ec2e78f46e4708d61b0c53ff17e9e

    SHA1

    c59243926c629ed640370e78e62ac95645f1d850

    SHA256

    98b86b84236397a88c69916d68734c815b97a00529d1bf513584c81421083e59

    SHA512

    2be9bd3c6870ad57d4feed51337d7e65d5a6d91506c12e2add04760c4cc49ab7ff7890355c5a2c7339de0d848bca815472fc475b250d5012b237b7bf30143b33

  • \Users\Admin\AppData\Local\Temp\wtmxhg._OH
    MD5

    745ec2e78f46e4708d61b0c53ff17e9e

    SHA1

    c59243926c629ed640370e78e62ac95645f1d850

    SHA256

    98b86b84236397a88c69916d68734c815b97a00529d1bf513584c81421083e59

    SHA512

    2be9bd3c6870ad57d4feed51337d7e65d5a6d91506c12e2add04760c4cc49ab7ff7890355c5a2c7339de0d848bca815472fc475b250d5012b237b7bf30143b33

  • \Users\Admin\AppData\Local\Temp\ykgippie._BQ
    MD5

    745ec2e78f46e4708d61b0c53ff17e9e

    SHA1

    c59243926c629ed640370e78e62ac95645f1d850

    SHA256

    98b86b84236397a88c69916d68734c815b97a00529d1bf513584c81421083e59

    SHA512

    2be9bd3c6870ad57d4feed51337d7e65d5a6d91506c12e2add04760c4cc49ab7ff7890355c5a2c7339de0d848bca815472fc475b250d5012b237b7bf30143b33

  • memory/648-0-0x00007FF91E870000-0x00007FF91EEA7000-memory.dmp
    Filesize

    6.2MB

  • memory/2100-4-0x0000000000000000-mapping.dmp
  • memory/2196-9-0x0000000000000000-mapping.dmp
  • memory/2196-13-0x0000000003470000-0x00000000034AD000-memory.dmp
    Filesize

    244KB

  • memory/3856-7-0x0000000000000000-mapping.dmp
  • memory/3856-12-0x00000000033A0000-0x00000000033DD000-memory.dmp
    Filesize

    244KB

  • memory/3860-6-0x0000000000000000-mapping.dmp