Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    21-07-2021 18:03

General

  • Target

    f70346d437f79aed8085934da8051603.xls

  • Size

    660KB

  • MD5

    f70346d437f79aed8085934da8051603

  • SHA1

    6293138e17910fe92b1a5094cd3c5489fd328360

  • SHA256

    c7ee52bed09b62343a0a239526ff58285cd2d67ff2b598455b32c7e8721e559d

  • SHA512

    caff8eabe4d2848781b6ec04b8661b76d9d9c25a055d816aa2bbac7bac91e76ae3fab084d867502019a6d59e58181908a3eacb71bbeb75d9ff369ca09e3df4d6

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

178.238.236.59:443

104.245.52.73:5007

81.0.236.93:13786

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Dridex Loader 1 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Loads dropped DLL 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f70346d437f79aed8085934da8051603.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3980
    • C:\Windows\SYSTEM32\mshta.exe
      mshta C:\ProgramData//klYDMFormat.sct
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Suspicious use of WriteProcessMemory
      PID:2868
      • C:\Windows\SYSTEM32\rundll32.exe
        rundll32.exe C:\ProgramData\qDBF2.dll,SetRealTimeUsage
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2152
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe C:\ProgramData\qDBF2.dll,SetRealTimeUsage
          4⤵
          • Loads dropped DLL
          • Checks whether UAC is enabled
          PID:2076

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\klYDMFormat.sct

    MD5

    e60e6dfdc2a5bfe24acaf4c07acdbcb0

    SHA1

    8942230962358eb4cc0955223cde6b4d144dbe74

    SHA256

    6473b70a661c5b094ac388bc337f68645075ff18270d688e80d581493913394d

    SHA512

    3f09d1738ef1daa62c6fd3ac892516e7d186a894ae40f38192069a79eaead41a0ad72430741c686c9407b651d94d14b74db03a8b07e50f208c98ed16f96a082a

  • C:\ProgramData\qDBF2.dll

    MD5

    397b799c357562c5a8061a39514d7785

    SHA1

    80d3d5366f47d3462ea9e688f444066d7fce2a24

    SHA256

    2c54438f5d99d15e5df3965397e25a0fa17ca7f08d317eb4bf31d1268e10f020

    SHA512

    bbec10e5d321ee33184cb2b450296103333196e0d9b71c7066bdf6ef5ea011210f6c28ada19532cff1ad22df577e7b40a39b2fa1adabb525b91a1b19e097f70b

  • \ProgramData\qDBF2.dll

    MD5

    397b799c357562c5a8061a39514d7785

    SHA1

    80d3d5366f47d3462ea9e688f444066d7fce2a24

    SHA256

    2c54438f5d99d15e5df3965397e25a0fa17ca7f08d317eb4bf31d1268e10f020

    SHA512

    bbec10e5d321ee33184cb2b450296103333196e0d9b71c7066bdf6ef5ea011210f6c28ada19532cff1ad22df577e7b40a39b2fa1adabb525b91a1b19e097f70b

  • memory/2076-296-0x00000000006B0000-0x00000000006B6000-memory.dmp

    Filesize

    24KB

  • memory/2076-294-0x00000000735D0000-0x0000000073601000-memory.dmp

    Filesize

    196KB

  • memory/2076-292-0x0000000000000000-mapping.dmp

  • memory/2152-290-0x0000000000000000-mapping.dmp

  • memory/2868-281-0x0000000000000000-mapping.dmp

  • memory/3980-117-0x00007FFF0E020000-0x00007FFF0E030000-memory.dmp

    Filesize

    64KB

  • memory/3980-122-0x00007FFF2E160000-0x00007FFF2F24E000-memory.dmp

    Filesize

    16.9MB

  • memory/3980-114-0x00007FF6DE9C0000-0x00007FF6E1F76000-memory.dmp

    Filesize

    53.7MB

  • memory/3980-121-0x00007FFF0E020000-0x00007FFF0E030000-memory.dmp

    Filesize

    64KB

  • memory/3980-118-0x00007FFF0E020000-0x00007FFF0E030000-memory.dmp

    Filesize

    64KB

  • memory/3980-123-0x000001C85BAF0000-0x000001C85D9E5000-memory.dmp

    Filesize

    31.0MB

  • memory/3980-116-0x00007FFF0E020000-0x00007FFF0E030000-memory.dmp

    Filesize

    64KB

  • memory/3980-115-0x00007FFF0E020000-0x00007FFF0E030000-memory.dmp

    Filesize

    64KB

  • memory/3980-89576-0x00007FFF0E020000-0x00007FFF0E030000-memory.dmp

    Filesize

    64KB

  • memory/3980-89578-0x00007FFF0E020000-0x00007FFF0E030000-memory.dmp

    Filesize

    64KB

  • memory/3980-89579-0x00007FFF0E020000-0x00007FFF0E030000-memory.dmp

    Filesize

    64KB

  • memory/3980-89582-0x00007FFF0E020000-0x00007FFF0E030000-memory.dmp

    Filesize

    64KB