Analysis

  • max time kernel
    103s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    11-11-2020 13:48

General

  • Target

    Sales_Invoice_186311_725945_from_Inc.xls

  • Size

    51KB

  • MD5

    e696a3e6497ced315b344d6ab1aa6c5f

  • SHA1

    66c6efb7cc4b48bd6e4a14d9edae16bb7e21ffd0

  • SHA256

    7bb7de3215d3e8a98b95fee746692f710b91da494b80bc7fe73636875dc610b7

  • SHA512

    3879731cb03d4b5d7bc441ca30495cd781cec86205a8fdf6091695598f23974be1c71bbd1e34b17a2989412f5725ef5e7d504ff7c6452014d9e5d3def2dfab61

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

77.220.64.39:443

69.164.207.140:3388

78.47.139.43:4443

103.244.206.74:33443

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Dridex Loader 1 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Loads dropped DLL 2 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 280 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\Sales_Invoice_186311_725945_from_Inc.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" -s C:\Users\Admin\AppData\Local\Temp\vxomr._ZO
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      PID:1608
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" -s C:\Users\Admin\AppData\Local\Temp\gzvmr._OL
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      PID:1760

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    1f9d130ab8b5380d6899d489d2380f00

    SHA1

    f3eae0334d20898a92871c266a6f80d27810a55a

    SHA256

    ee8ae8d82241c99c241d2f3d0d4c10bd41305339ab2497d9546fdc983b90d602

    SHA512

    3ae355fe7a47f443f98588e8285841aad31c924f0264d8872caa2aef58de659a0697ed74a3eacdb0261aa813a8fba26012b0f1e347e0cdd496f412d1fc02ffad

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    622a82bbfedc3b7e254274df5b9ae864

    SHA1

    1b86bbcae9ec28ade2be3f446fb93dd9e3b69a99

    SHA256

    5ec9cc8ae1346fe5ed25aa2ccd664f7197fbf51ae89799c383bb9320b6ea15a7

    SHA512

    58f8e6bc5135328d1367fbd56bfb2ae227d14722a0e0fcca0b94466066c2c77ab16b64640e2471ed7bdcd6bdedcfe753f6e3dc286455b350480c9d0196976efd

  • C:\Users\Admin\AppData\Local\Temp\gzvmr._OL
    MD5

    c151c22bf1425d8adfa4313ee1f2387c

    SHA1

    a18a5feb2495d5daeae01be7ae4a0ae58b233278

    SHA256

    b7416f6229dae7bc167f6f18c25b993c7c11a88a139a77178102bd7ca84c469c

    SHA512

    9748d5c307facc0a819816ec00fb60c975cbdaa534df5ab6871396f25a258930f45aaeac7d17e8d2e20012ac29cf678510c601914e11b4c965380154d668e170

  • C:\Users\Admin\AppData\Local\Temp\vxomr._ZO
    MD5

    c151c22bf1425d8adfa4313ee1f2387c

    SHA1

    a18a5feb2495d5daeae01be7ae4a0ae58b233278

    SHA256

    b7416f6229dae7bc167f6f18c25b993c7c11a88a139a77178102bd7ca84c469c

    SHA512

    9748d5c307facc0a819816ec00fb60c975cbdaa534df5ab6871396f25a258930f45aaeac7d17e8d2e20012ac29cf678510c601914e11b4c965380154d668e170

  • \Users\Admin\AppData\Local\Temp\gzvmr._OL
    MD5

    c151c22bf1425d8adfa4313ee1f2387c

    SHA1

    a18a5feb2495d5daeae01be7ae4a0ae58b233278

    SHA256

    b7416f6229dae7bc167f6f18c25b993c7c11a88a139a77178102bd7ca84c469c

    SHA512

    9748d5c307facc0a819816ec00fb60c975cbdaa534df5ab6871396f25a258930f45aaeac7d17e8d2e20012ac29cf678510c601914e11b4c965380154d668e170

  • \Users\Admin\AppData\Local\Temp\vxomr._ZO
    MD5

    c151c22bf1425d8adfa4313ee1f2387c

    SHA1

    a18a5feb2495d5daeae01be7ae4a0ae58b233278

    SHA256

    b7416f6229dae7bc167f6f18c25b993c7c11a88a139a77178102bd7ca84c469c

    SHA512

    9748d5c307facc0a819816ec00fb60c975cbdaa534df5ab6871396f25a258930f45aaeac7d17e8d2e20012ac29cf678510c601914e11b4c965380154d668e170

  • memory/1604-0-0x000007FEF7F70000-0x000007FEF81EA000-memory.dmp
    Filesize

    2.5MB

  • memory/1608-1-0x0000000000000000-mapping.dmp
  • memory/1608-7-0x0000000010000000-0x000000001003D000-memory.dmp
    Filesize

    244KB

  • memory/1760-4-0x0000000000000000-mapping.dmp