Analysis

  • max time kernel
    150s
  • max time network
    134s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    27-07-2021 09:27

General

  • Target

    https://cdn.discordapp.com/attachments/869191622208925709/869213951068614656/Invoice_3326809.xlsm

  • Sample

    210727-kmz1n1vl36

Malware Config

Extracted

Family

dridex

Botnet

22202

C2

45.79.33.48:443

139.162.202.74:5007

68.183.216.174:7443

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Dridex Loader 1 IoCs

    Detects Dridex both x86 and x64 loader in memory.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Suspicious Office macro 1 IoCs

    Office document equipped with macros.

  • Loads dropped DLL 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 44 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 24 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://cdn.discordapp.com/attachments/869191622208925709/869213951068614656/Invoice_3326809.xlsm
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3944
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3944 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1328
    • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\OVHLE5P6\Invoice_3326809.xlsm"
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2732
      • C:\Windows\SYSTEM32\mshta.exe
        mshta C:\ProgramData//theParamTypeSmallInt.sct
        3⤵
        • Process spawned unexpected child process
        • Blocklisted process makes network request
        • Suspicious use of WriteProcessMemory
        PID:4452
        • C:\Windows\SYSTEM32\rundll32.exe
          rundll32.exe C:\ProgramData\qPaperEnvelopePersonal.dll,AddLookaside
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:4552
          • C:\Windows\SysWOW64\rundll32.exe
            rundll32.exe C:\ProgramData\qPaperEnvelopePersonal.dll,AddLookaside
            5⤵
            • Loads dropped DLL
            • Checks whether UAC is enabled
            PID:4576

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\qPaperEnvelopePersonal.dll
    MD5

    98cba5d4e3bc55750e6716b3d952e375

    SHA1

    2b8ae91d2d044eeae4456fb000cd92583abcdfe3

    SHA256

    00072be4185289677e5babb9fda5279b5c2886683ebd7ea22d36f4bc9683b3e5

    SHA512

    52a392878a8fd99ea1100f36c42c29886cd49a2c03c3aec862731f97517950010c0af44a04a304861c9402d3aa8405e6e04408d52e3ee42d311dbdd1960ff953

  • C:\ProgramData\theParamTypeSmallInt.sct
    MD5

    92a9626c7da7b2e83ffc085503d472dd

    SHA1

    9eb0f57b72a6ebb0be7d6c2008cda52e4dbd70fc

    SHA256

    04a3042944f0aeab3f11c71769513509a2c697bdb0a19b8d0cd42a9f77d5b987

    SHA512

    89a9f0485f348f991bc63559ae34d3cc739f6e60639c162415b59b48aef24815f86628a60415bf81c9d58e4064ebae7102181e2de69c06022766127c6cdec6a8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\OVHLE5P6\Invoice_3326809.xlsm.9unrd1b.partial
    MD5

    86c63e5a375f54c79cfa007828400a5d

    SHA1

    858168c7285d60d905470d70c32962a1367ea947

    SHA256

    297fa628e174f62edfc8ecf1e4ec79d8f177fe89308a0c04a0b55693af0a776f

    SHA512

    39c357bef2f317080dc115803d211a1d8294360a7002e38a8e7d7a5cd86d2b3c0d6faaa9535e2c5787dfc00b7e450ee03e3b3f259e0dd95e196a850a16d45f79

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\DQN394Q4.cookie
    MD5

    81fce24bf7ee966b37a21910dd50bd3e

    SHA1

    64ce52e9c4cf38d088dcaf4ccfe40bb7171ec20f

    SHA256

    293e1410b11bcb08f89a8a9f26195856caffb697296cfe0cf10d81a321526477

    SHA512

    9ac5c31a88664259154a8d20d89cf46495556f7d5f9f2971ceed7f4c4b2029f56c327eb8b0ff89bf67a146104145824ccf47d28757438f948f7cf21b47b5dd44

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\ITSAV4WV.cookie
    MD5

    6f6b3684523e5fe4554b6464bbfe9565

    SHA1

    151349d9c58c5c6e7f26415b929d569786c6dcee

    SHA256

    0bf327af597893982b72f8f7e349df4835073762a9231c06f6ce4a6c1a53ad05

    SHA512

    496934cbdfebd800ee7b33ec814a2e905d9910eea49938b035f976a631df260b60a2d74af25903e0e81139b067cedd73b67f5f1a291aaa3a72b8df643e67249a

  • \ProgramData\qPaperEnvelopePersonal.dll
    MD5

    98cba5d4e3bc55750e6716b3d952e375

    SHA1

    2b8ae91d2d044eeae4456fb000cd92583abcdfe3

    SHA256

    00072be4185289677e5babb9fda5279b5c2886683ebd7ea22d36f4bc9683b3e5

    SHA512

    52a392878a8fd99ea1100f36c42c29886cd49a2c03c3aec862731f97517950010c0af44a04a304861c9402d3aa8405e6e04408d52e3ee42d311dbdd1960ff953

  • memory/1328-115-0x0000000000000000-mapping.dmp
  • memory/2732-119-0x00007FFDA2790000-0x00007FFDA27A0000-memory.dmp
    Filesize

    64KB

  • memory/2732-91933-0x00007FFDA2790000-0x00007FFDA27A0000-memory.dmp
    Filesize

    64KB

  • memory/2732-123-0x00007FFDA2790000-0x00007FFDA27A0000-memory.dmp
    Filesize

    64KB

  • memory/2732-126-0x00007FFDC2530000-0x00007FFDC361E000-memory.dmp
    Filesize

    16.9MB

  • memory/2732-127-0x00007FFDC0630000-0x00007FFDC2525000-memory.dmp
    Filesize

    31.0MB

  • memory/2732-117-0x0000000000000000-mapping.dmp
  • memory/2732-121-0x00007FFDA2790000-0x00007FFDA27A0000-memory.dmp
    Filesize

    64KB

  • memory/2732-122-0x00007FFDA2790000-0x00007FFDA27A0000-memory.dmp
    Filesize

    64KB

  • memory/2732-120-0x00007FFDA2790000-0x00007FFDA27A0000-memory.dmp
    Filesize

    64KB

  • memory/2732-91929-0x00007FFDA2790000-0x00007FFDA27A0000-memory.dmp
    Filesize

    64KB

  • memory/2732-64717-0x00007FFDBA0B0000-0x00007FFDBAF7D000-memory.dmp
    Filesize

    14.8MB

  • memory/2732-91932-0x00007FFDA2790000-0x00007FFDA27A0000-memory.dmp
    Filesize

    64KB

  • memory/2732-91928-0x00007FFDA2790000-0x00007FFDA27A0000-memory.dmp
    Filesize

    64KB

  • memory/2732-118-0x00007FF7E0A10000-0x00007FF7E3FC6000-memory.dmp
    Filesize

    53.7MB

  • memory/3944-114-0x00007FFDD9A80000-0x00007FFDD9AEB000-memory.dmp
    Filesize

    428KB

  • memory/4452-269-0x0000000000000000-mapping.dmp
  • memory/4552-280-0x0000000000000000-mapping.dmp
  • memory/4576-289-0x0000000000940000-0x0000000000A8A000-memory.dmp
    Filesize

    1.3MB

  • memory/4576-287-0x000000006F350000-0x000000006F380000-memory.dmp
    Filesize

    192KB

  • memory/4576-282-0x0000000000000000-mapping.dmp