Analysis

  • max time kernel
    127s
  • max time network
    39s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    10-06-2021 22:41

General

  • Target

    bc5cd68f73dd7dfdd8baea4391ea27b2.dll

  • Size

    177KB

  • MD5

    bc5cd68f73dd7dfdd8baea4391ea27b2

  • SHA1

    d288714dbe2c0029dc9fa6d74062e87f2768965d

  • SHA256

    76f52b3501f21a386da2fed4f96ef61cc0f2abd297ba4e68e677a12799a793cb

  • SHA512

    be07e9d6ff7bdf455f2ebcb69dd6cfd39ff2f913c9e774845e7c8e31d957911fe2df1117a20254fc25cb3581bf5c4304d46845fd28f4aa7331017e63dd5b04cc

Malware Config

Extracted

Family

dridex

Botnet

22201

C2

45.79.91.89:9987

157.245.231.228:6051

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Loader 1 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\bc5cd68f73dd7dfdd8baea4391ea27b2.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1080
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\bc5cd68f73dd7dfdd8baea4391ea27b2.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2036
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 236
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        PID:1380

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1380-63-0x0000000000000000-mapping.dmp
  • memory/1380-65-0x00000000004C0000-0x00000000004C1000-memory.dmp
    Filesize

    4KB

  • memory/2036-59-0x0000000000000000-mapping.dmp
  • memory/2036-60-0x0000000075561000-0x0000000075563000-memory.dmp
    Filesize

    8KB

  • memory/2036-61-0x0000000074920000-0x0000000074950000-memory.dmp
    Filesize

    192KB

  • memory/2036-64-0x00000000001C0000-0x00000000001C6000-memory.dmp
    Filesize

    24KB