Analysis

  • max time kernel
    135s
  • max time network
    12s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    21-07-2021 20:05

General

  • Target

    3c2244956646acde36ff20732eb63071.dll

  • Size

    176KB

  • MD5

    3c2244956646acde36ff20732eb63071

  • SHA1

    f218a9c08cb26388223600bf3691a90be4cdfb7b

  • SHA256

    ff277a5e33ec98ad5f0945834f731e39fa2113ac0369ade14fc690a9d1a7cc31

  • SHA512

    ae79358315583a248575d4471144c9c0441758502c5c4cba1dc92d68403912c3c6e6c3b109a607f0d9539892f5d4fa845c13a382c3c71d0b2d3335ecc1fd13e6

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

178.238.236.59:443

104.245.52.73:5007

81.0.236.93:13786

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex Loader 1 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\3c2244956646acde36ff20732eb63071.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1080
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\3c2244956646acde36ff20732eb63071.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1852
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1852 -s 224
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        PID:1680

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1680-64-0x0000000000000000-mapping.dmp
  • memory/1680-66-0x0000000000310000-0x0000000000311000-memory.dmp
    Filesize

    4KB

  • memory/1852-60-0x0000000000000000-mapping.dmp
  • memory/1852-61-0x0000000075D11000-0x0000000075D13000-memory.dmp
    Filesize

    8KB

  • memory/1852-62-0x00000000751E0000-0x0000000075211000-memory.dmp
    Filesize

    196KB

  • memory/1852-65-0x0000000000140000-0x0000000000146000-memory.dmp
    Filesize

    24KB