Analysis

  • max time kernel
    109s
  • max time network
    86s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    14-01-2021 07:10

General

  • Target

    Rep #1018.xls

  • Size

    710KB

  • MD5

    0dc55d9f0ea057357c90243c0efddd9e

  • SHA1

    7f0fa3b16a4172026b727ee80d8db9138807fbdc

  • SHA256

    eef479f5835aa89881a9b44dd39da8cfb8ba0c82f25064370bdbd76ba32cbdf3

  • SHA512

    5f9125ffffb193db8849aadf70b61aa389629efbcd2d2e6ed4fb327b9d9fb82512e88270f0610a8567df5dafba886470f5b150c9f9911ea72043b89ee111e182

Malware Config

Extracted

Family

dridex

Botnet

111

C2

52.73.70.149:443

8.4.9.152:3786

185.246.87.202:3098

50.116.111.64:5353

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Dridex Loader 1 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Blocklisted process makes network request 2 IoCs
  • Loads dropped DLL 4 IoCs
  • JavaScript code in executable 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 280 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\Rep #1018.xls"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1844
  • C:\Windows\system32\wbem\wMIC.exe
    wMIC
    1⤵
    • Process spawned unexpected child process
    • Blocklisted process makes network request
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:824
    • C:\Windows\System32\rundll32.exe
      "C:\Windows\System32\rundll32.exe" C:/Windows/Temp//y5fiy.dll InitHelperDll
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:828
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:/Windows/Temp//y5fiy.dll InitHelperDll
        3⤵
        • Loads dropped DLL
        PID:1680

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\17925.xsL
    MD5

    50a2bb59eb70d408515193ab18c330ac

    SHA1

    9c36d0b80bb7b6127267aee4b682ed66b438f216

    SHA256

    dba2fc37965af849cd5a0a8201482aeba7213f14dc305c19283ed1db58e5db1f

    SHA512

    814f47c87463e60e47a631f40dbb7c94f51ec160659552bb82d960e01ec4b8fe4fa5447e3444766aad56a573196957eb25d2df9e940bf5363c7bf7e2845d68fa

  • C:\Windows\Temp\y5fiy.dll
    MD5

    5bd15960322d8e18f133168dec03c8e7

    SHA1

    6197858510dd189ea1ad72534474ee2c7d51042d

    SHA256

    7f0a86c116254fceb36449468ab52c949542d13d5880c766a7fb33a3dbe0364a

    SHA512

    2bbf0a782582ec9b6cd8ac2b4dc24d8daf961ef9bb0fe34a2ae1414b1f0c5ef26ec7839c639f1b606b80909392b630da7b22629ce1dadfb95cfb8d2dc3fa1bf9

  • \Windows\Temp\y5fiy.dll
    MD5

    5bd15960322d8e18f133168dec03c8e7

    SHA1

    6197858510dd189ea1ad72534474ee2c7d51042d

    SHA256

    7f0a86c116254fceb36449468ab52c949542d13d5880c766a7fb33a3dbe0364a

    SHA512

    2bbf0a782582ec9b6cd8ac2b4dc24d8daf961ef9bb0fe34a2ae1414b1f0c5ef26ec7839c639f1b606b80909392b630da7b22629ce1dadfb95cfb8d2dc3fa1bf9

  • \Windows\Temp\y5fiy.dll
    MD5

    5bd15960322d8e18f133168dec03c8e7

    SHA1

    6197858510dd189ea1ad72534474ee2c7d51042d

    SHA256

    7f0a86c116254fceb36449468ab52c949542d13d5880c766a7fb33a3dbe0364a

    SHA512

    2bbf0a782582ec9b6cd8ac2b4dc24d8daf961ef9bb0fe34a2ae1414b1f0c5ef26ec7839c639f1b606b80909392b630da7b22629ce1dadfb95cfb8d2dc3fa1bf9

  • \Windows\Temp\y5fiy.dll
    MD5

    5bd15960322d8e18f133168dec03c8e7

    SHA1

    6197858510dd189ea1ad72534474ee2c7d51042d

    SHA256

    7f0a86c116254fceb36449468ab52c949542d13d5880c766a7fb33a3dbe0364a

    SHA512

    2bbf0a782582ec9b6cd8ac2b4dc24d8daf961ef9bb0fe34a2ae1414b1f0c5ef26ec7839c639f1b606b80909392b630da7b22629ce1dadfb95cfb8d2dc3fa1bf9

  • \Windows\Temp\y5fiy.dll
    MD5

    5bd15960322d8e18f133168dec03c8e7

    SHA1

    6197858510dd189ea1ad72534474ee2c7d51042d

    SHA256

    7f0a86c116254fceb36449468ab52c949542d13d5880c766a7fb33a3dbe0364a

    SHA512

    2bbf0a782582ec9b6cd8ac2b4dc24d8daf961ef9bb0fe34a2ae1414b1f0c5ef26ec7839c639f1b606b80909392b630da7b22629ce1dadfb95cfb8d2dc3fa1bf9

  • memory/828-4-0x0000000000000000-mapping.dmp
  • memory/1680-6-0x0000000000000000-mapping.dmp
  • memory/1680-11-0x000000006BB60000-0x000000006BB7F000-memory.dmp
    Filesize

    124KB

  • memory/2008-3-0x000007FEF7900000-0x000007FEF7B7A000-memory.dmp
    Filesize

    2.5MB