Analysis

  • max time kernel
    138s
  • max time network
    134s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    21-01-2021 14:58

General

  • Target

    1_Total New Invoices-Thursday January 21_2021.xlsm

  • Size

    33KB

  • MD5

    a52a88ae97dd408d38d98c9aa7f81142

  • SHA1

    234b65bc42a077c98c61a8eb4870d41e0039013e

  • SHA256

    c7e6848fd63681514d6dad3032e358a257dde3aa1cd3b349306283356bca2608

  • SHA512

    5e613f1db0e10dbdb14bc3b0f8ef7816f27a5de9f8fbb63c698e18695d0f6c7872c1e958aa122342b0cdd8d0dea70f1b23dae85ef9ae6ef893b69d30d903feab

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

194.225.58.214:443

211.110.44.63:5353

69.164.207.140:3388

198.57.200.100:3786

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Dridex Loader 3 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Loads dropped DLL 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\1_Total New Invoices-Thursday January 21_2021.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:636
    • C:\Windows\System32\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" -s C:\Users\Admin\AppData\Local\Temp\iijrlw.dll
      2⤵
      • Process spawned unexpected child process
      PID:2316
    • C:\Windows\System32\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" -s C:\Users\Admin\AppData\Local\Temp\iijrlw.dll
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:3708
      • C:\Windows\SysWOW64\regsvr32.exe
        -s C:\Users\Admin\AppData\Local\Temp\iijrlw.dll
        3⤵
        • Loads dropped DLL
        PID:3172

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\iijrlw.dll
    MD5

    4746fbed409f87ec6ddb6653cb4e201c

    SHA1

    b8ee3f60f74553e44d42b0f47a0a4a55ed644c97

    SHA256

    864e95d36584e9db7bcd7552272e446a4c7cbc6601dcd4f4a2687d96374b439b

    SHA512

    e6def1b637b3aea0d0f4ed27add38e9330e15cda1a38a1dd228799296497ddd0bf13f89022f0491fa98e735b5ccff0f621429a7606d6c3ecb0f57372157b405c

  • \Users\Admin\AppData\Local\Temp\iijrlw.dll
    MD5

    4746fbed409f87ec6ddb6653cb4e201c

    SHA1

    b8ee3f60f74553e44d42b0f47a0a4a55ed644c97

    SHA256

    864e95d36584e9db7bcd7552272e446a4c7cbc6601dcd4f4a2687d96374b439b

    SHA512

    e6def1b637b3aea0d0f4ed27add38e9330e15cda1a38a1dd228799296497ddd0bf13f89022f0491fa98e735b5ccff0f621429a7606d6c3ecb0f57372157b405c

  • memory/636-3-0x00007FF9C3DC0000-0x00007FF9C3DD0000-memory.dmp
    Filesize

    64KB

  • memory/636-4-0x00007FF9C3DC0000-0x00007FF9C3DD0000-memory.dmp
    Filesize

    64KB

  • memory/636-5-0x00007FF9C3DC0000-0x00007FF9C3DD0000-memory.dmp
    Filesize

    64KB

  • memory/636-6-0x00007FF9E73C0000-0x00007FF9E79F7000-memory.dmp
    Filesize

    6.2MB

  • memory/636-7-0x000001F986CB0000-0x000001F986CB4000-memory.dmp
    Filesize

    16KB

  • memory/636-2-0x00007FF9C3DC0000-0x00007FF9C3DD0000-memory.dmp
    Filesize

    64KB

  • memory/2316-8-0x0000000000000000-mapping.dmp
  • memory/3172-11-0x0000000000000000-mapping.dmp
  • memory/3172-13-0x0000000074130000-0x000000007416D000-memory.dmp
    Filesize

    244KB

  • memory/3172-14-0x0000000074130000-0x000000007416D000-memory.dmp
    Filesize

    244KB

  • memory/3172-15-0x0000000000FC0000-0x0000000000FC1000-memory.dmp
    Filesize

    4KB

  • memory/3172-16-0x0000000074130000-0x000000007416D000-memory.dmp
    Filesize

    244KB

  • memory/3708-9-0x0000000000000000-mapping.dmp