Analysis

  • max time kernel
    300s
  • max time network
    135s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    20-01-2021 20:46

General

  • Target

    Statement of Account as of 01_20_2021.xlsm

  • Size

    37KB

  • MD5

    28e9c78dcffb4a80c7bcfcd818791940

  • SHA1

    0f239865c9e2bdd64d2017c7d26cac19dc7d3cde

  • SHA256

    09cceb619174c99d026734f860f26cda0107af31b9153a9f7d6613c86fd57772

  • SHA512

    082d84c5d6b4442f0c6d10231c0368e74906a62348aaf7bb070a602695f9420abc3aa2cce28dfeaaaae784ba7e96a8008ab9e9d5bd6f2a5dfb591e8c8f5729fc

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

194.225.58.214:443

211.110.44.63:5353

69.164.207.140:3388

198.57.200.100:3786

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Dridex Loader 3 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Loads dropped DLL 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Statement of Account as of 01_20_2021.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4808
    • C:\Windows\System32\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" -s C:\Users\Admin\AppData\Local\Temp\jyuxguis.dll
      2⤵
      • Process spawned unexpected child process
      PID:592
    • C:\Windows\System32\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" -s C:\Users\Admin\AppData\Local\Temp\jyuxguis.dll
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:1184
      • C:\Windows\SysWOW64\regsvr32.exe
        -s C:\Users\Admin\AppData\Local\Temp\jyuxguis.dll
        3⤵
        • Loads dropped DLL
        PID:1344

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\jyuxguis.dll
    MD5

    4b0e1750691b96e97f20da52f7d7032c

    SHA1

    b8a4f7901bbf6f26f1f2e6886ebd85cf08fadd11

    SHA256

    3459d30b5d2e6c58ddb8dcd9f45f5141f8d15c55fff16f9cc76ec621e6d829fb

    SHA512

    b2eb64cb2b49fa53bb4020413f00793f2aa69235c458ef7a903d5a4a4711b9638c1dcb66cfaed145834fc9c1cb08c08eff84f670ef9f2a458b9dc45dde9c71ab

  • \Users\Admin\AppData\Local\Temp\jyuxguis.dll
    MD5

    4b0e1750691b96e97f20da52f7d7032c

    SHA1

    b8a4f7901bbf6f26f1f2e6886ebd85cf08fadd11

    SHA256

    3459d30b5d2e6c58ddb8dcd9f45f5141f8d15c55fff16f9cc76ec621e6d829fb

    SHA512

    b2eb64cb2b49fa53bb4020413f00793f2aa69235c458ef7a903d5a4a4711b9638c1dcb66cfaed145834fc9c1cb08c08eff84f670ef9f2a458b9dc45dde9c71ab

  • memory/592-7-0x0000000000000000-mapping.dmp
  • memory/1184-9-0x0000000000000000-mapping.dmp
  • memory/1344-11-0x0000000000000000-mapping.dmp
  • memory/1344-16-0x0000000073D20000-0x0000000073D5D000-memory.dmp
    Filesize

    244KB

  • memory/1344-15-0x0000000002910000-0x0000000002911000-memory.dmp
    Filesize

    4KB

  • memory/1344-14-0x0000000073D20000-0x0000000073D5D000-memory.dmp
    Filesize

    244KB

  • memory/1344-13-0x0000000073D20000-0x0000000073D5D000-memory.dmp
    Filesize

    244KB

  • memory/4808-5-0x00007FFA613D0000-0x00007FFA61A07000-memory.dmp
    Filesize

    6.2MB

  • memory/4808-8-0x000001BFF8C80000-0x000001BFF8C84000-memory.dmp
    Filesize

    16KB

  • memory/4808-6-0x00007FFA3D590000-0x00007FFA3D5A0000-memory.dmp
    Filesize

    64KB

  • memory/4808-2-0x00007FFA3D590000-0x00007FFA3D5A0000-memory.dmp
    Filesize

    64KB

  • memory/4808-4-0x00007FFA3D590000-0x00007FFA3D5A0000-memory.dmp
    Filesize

    64KB

  • memory/4808-3-0x00007FFA3D590000-0x00007FFA3D5A0000-memory.dmp
    Filesize

    64KB