Analysis

  • max time kernel
    70s
  • max time network
    116s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    21-01-2021 14:58

General

  • Target

    1_Total New Invoices-Thursday January 21_2021.xlsm

  • Size

    33KB

  • MD5

    a52a88ae97dd408d38d98c9aa7f81142

  • SHA1

    234b65bc42a077c98c61a8eb4870d41e0039013e

  • SHA256

    c7e6848fd63681514d6dad3032e358a257dde3aa1cd3b349306283356bca2608

  • SHA512

    5e613f1db0e10dbdb14bc3b0f8ef7816f27a5de9f8fbb63c698e18695d0f6c7872c1e958aa122342b0cdd8d0dea70f1b23dae85ef9ae6ef893b69d30d903feab

Malware Config

Extracted

Language
xlm4.0
Source

Extracted

Family

dridex

Botnet

10444

C2

194.225.58.214:443

211.110.44.63:5353

69.164.207.140:3388

198.57.200.100:3786

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Dridex Loader 2 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Loads dropped DLL 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 280 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\1_Total New Invoices-Thursday January 21_2021.xlsm"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1108
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" -s C:\Users\Admin\AppData\Local\Temp\vjrxoc.dll
      2⤵
      • Process spawned unexpected child process
      PID:1628
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" -s C:\Users\Admin\AppData\Local\Temp\vjrxoc.dll
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      PID:1036

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    4867b3e9573175f25046daa2b64eeb53

    SHA1

    efd47cffd052e8564d0876caa591b481429ddb1a

    SHA256

    c494317cc139c7cc2354459e4d0ee0efbbc7d16c07d070fe0b9df0eea3afb322

    SHA512

    106f65f11467c3fdfabb53c3789cf023883c4e0238db19d796594a6eb22184415bd8bf74a293c7ac046d95ee59b406b2cd73044c988e6e036181306aafa62c8e

  • C:\Users\Admin\AppData\Local\Temp\vjrxoc.dll
    MD5

    4746fbed409f87ec6ddb6653cb4e201c

    SHA1

    b8ee3f60f74553e44d42b0f47a0a4a55ed644c97

    SHA256

    864e95d36584e9db7bcd7552272e446a4c7cbc6601dcd4f4a2687d96374b439b

    SHA512

    e6def1b637b3aea0d0f4ed27add38e9330e15cda1a38a1dd228799296497ddd0bf13f89022f0491fa98e735b5ccff0f621429a7606d6c3ecb0f57372157b405c

  • \Users\Admin\AppData\Local\Temp\vjrxoc.dll
    MD5

    4746fbed409f87ec6ddb6653cb4e201c

    SHA1

    b8ee3f60f74553e44d42b0f47a0a4a55ed644c97

    SHA256

    864e95d36584e9db7bcd7552272e446a4c7cbc6601dcd4f4a2687d96374b439b

    SHA512

    e6def1b637b3aea0d0f4ed27add38e9330e15cda1a38a1dd228799296497ddd0bf13f89022f0491fa98e735b5ccff0f621429a7606d6c3ecb0f57372157b405c

  • memory/1036-9-0x0000000000000000-mapping.dmp
  • memory/1036-15-0x0000000000180000-0x0000000000181000-memory.dmp
    Filesize

    4KB

  • memory/1036-14-0x000000006BBC0000-0x000000006BBFD000-memory.dmp
    Filesize

    244KB

  • memory/1036-13-0x000000006BBC0000-0x000000006BBFD000-memory.dmp
    Filesize

    244KB

  • memory/1108-5-0x00000000059E0000-0x00000000059E2000-memory.dmp
    Filesize

    8KB

  • memory/1108-2-0x000000002FD31000-0x000000002FD34000-memory.dmp
    Filesize

    12KB

  • memory/1108-4-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1108-3-0x0000000071251000-0x0000000071253000-memory.dmp
    Filesize

    8KB

  • memory/1460-8-0x000007FEF7510000-0x000007FEF778A000-memory.dmp
    Filesize

    2.5MB

  • memory/1628-7-0x00000000760D1000-0x00000000760D3000-memory.dmp
    Filesize

    8KB

  • memory/1628-6-0x0000000000000000-mapping.dmp