Resubmissions
19-03-2021 09:03
210319-zqkthetyla 1012-05-2020 06:47
200512-23g7l1gtz2 711-05-2020 10:40
200511-v8w3g6hxyj 708-05-2020 08:13
200508-ggjrjfejyj 806-05-2020 16:56
200506-sj25e3d79e 8Analysis
-
max time kernel
66s -
max time network
53s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
19-03-2021 09:03
Static task
static1
Behavioral task
behavioral1
Sample
Document#578743906539.vbs
Resource
win7v20201028
General
-
Target
Document#578743906539.vbs
-
Size
980KB
-
MD5
27588243419b10040ea332eed512e18a
-
SHA1
c26304277f80fdf95db29aa700a01d650c5f2ed3
-
SHA256
76d804d87108c6997469997da29236b271519362fe9f7e518a25a102835a7e06
-
SHA512
3f947d749bc42851cc79e81ca568e5e2ea996c5fc30c24958584f80305fdb72eae5f1f050a347d08758b79f6a9717439bc75c69e64ed198609c713dd1f392412
Malware Config
Extracted
dridex
10555
38.88.126.131:443
145.239.169.32:8443
163.172.7.152:443
45.79.135.98:691
Signatures
-
Processes:
resource yara_rule behavioral1/memory/1408-11-0x0000000074180000-0x00000000741AB000-memory.dmp dridex_ldr behavioral1/memory/1408-10-0x0000000074180000-0x00000000741AB000-memory.dmp dridex_ldr -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 1408 regsvr32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
Processes:
regsvr32.exepid process 1212 regsvr32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
WScript.execmd.exeregsvr32.exedescription pid process target process PID 1064 wrote to memory of 2012 1064 WScript.exe cmd.exe PID 1064 wrote to memory of 2012 1064 WScript.exe cmd.exe PID 1064 wrote to memory of 2012 1064 WScript.exe cmd.exe PID 2012 wrote to memory of 1212 2012 cmd.exe regsvr32.exe PID 2012 wrote to memory of 1212 2012 cmd.exe regsvr32.exe PID 2012 wrote to memory of 1212 2012 cmd.exe regsvr32.exe PID 2012 wrote to memory of 1212 2012 cmd.exe regsvr32.exe PID 2012 wrote to memory of 1212 2012 cmd.exe regsvr32.exe PID 1212 wrote to memory of 1408 1212 regsvr32.exe regsvr32.exe PID 1212 wrote to memory of 1408 1212 regsvr32.exe regsvr32.exe PID 1212 wrote to memory of 1408 1212 regsvr32.exe regsvr32.exe PID 1212 wrote to memory of 1408 1212 regsvr32.exe regsvr32.exe PID 1212 wrote to memory of 1408 1212 regsvr32.exe regsvr32.exe PID 1212 wrote to memory of 1408 1212 regsvr32.exe regsvr32.exe PID 1212 wrote to memory of 1408 1212 regsvr32.exe regsvr32.exe
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Document#578743906539.vbs"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c kokoko%random%kokkook & R^eGsv^r32 -s C:\ProgramData\gugbqW.dll2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\regsvr32.exeReGsvr32 -s C:\ProgramData\gugbqW.dll3⤵
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s C:\ProgramData\gugbqW.dll4⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\gugbqW.dllMD5
034a591440ae6a27f9e4a59a4efa9b17
SHA12b67765db136e1f778d7cc1fb52baf838faf4be4
SHA2568d5e06e113548dbb45298bc43d97b64129f97be3c97b62778bbc34f149ad9fd9
SHA51237747d339fda855991571243b32371c233b0d5b4fba7b6851c56a1307edc993d06d7079b9da8b141f475d9abb917a090c243656b17643f830ec39edc4114be71
-
\ProgramData\gugbqW.dllMD5
034a591440ae6a27f9e4a59a4efa9b17
SHA12b67765db136e1f778d7cc1fb52baf838faf4be4
SHA2568d5e06e113548dbb45298bc43d97b64129f97be3c97b62778bbc34f149ad9fd9
SHA51237747d339fda855991571243b32371c233b0d5b4fba7b6851c56a1307edc993d06d7079b9da8b141f475d9abb917a090c243656b17643f830ec39edc4114be71
-
memory/1064-9-0x00000000028C0000-0x00000000028C4000-memory.dmpFilesize
16KB
-
memory/1212-3-0x0000000000000000-mapping.dmp
-
memory/1212-4-0x000007FEFB7F1000-0x000007FEFB7F3000-memory.dmpFilesize
8KB
-
memory/1408-6-0x0000000000000000-mapping.dmp
-
memory/1408-7-0x0000000076101000-0x0000000076103000-memory.dmpFilesize
8KB
-
memory/1408-11-0x0000000074180000-0x00000000741AB000-memory.dmpFilesize
172KB
-
memory/1408-10-0x0000000074180000-0x00000000741AB000-memory.dmpFilesize
172KB
-
memory/1408-12-0x0000000000180000-0x0000000000181000-memory.dmpFilesize
4KB
-
memory/1520-13-0x000007FEF7140000-0x000007FEF73BA000-memory.dmpFilesize
2.5MB
-
memory/2012-2-0x0000000000000000-mapping.dmp