Resubmissions

27-10-2021 20:46

211027-zks8ksgdh6 10

27-10-2021 10:26

211027-mghw8abfh9 8

Analysis

  • max time kernel
    119s
  • max time network
    145s
  • submitted
    01-01-1970 00:00

General

  • Target

    Purchase_Order 8328.xls

  • Size

    79KB

  • MD5

    18dd59051822628a3ecbbdc902888ca8

  • SHA1

    df1745ee2b92e041128bf83242df6d6d32858231

  • SHA256

    2f12b09b257e88b05b03eba2d3ec27d74ac6ab1144b7373058f1e87b3555b1f8

  • SHA512

    5364687cafff4045f08e4f45eb9c12c2602fd0f9d99e46ce6fd68b2b8798d31047f1a285605872555aecc71a6167e0a8f3b7f51878d145a5b5ace47bacd573ed

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://newerabd.com/ebkc1m.rar

Extracted

Family

dridex

Botnet

10555

C2

192.46.210.220:443

143.244.140.214:808

45.77.0.96:6891

185.56.219.47:8116

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Downloads MZ/PE file
  • Loads dropped DLL 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\Purchase_Order 8328.xls"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" -s C:\Users\Admin\AppData\Local\Temp\hwdyql.
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      PID:1172

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    716375678e9b0787f208685df22b7d4d

    SHA1

    af48c5c63d575412bcefbc8a47c8afe6243798da

    SHA256

    3534e49cd77bfb3788494e5084236f650e39adaec9265ffa96e78929873e30e4

    SHA512

    0bcd092decd0fa06078ea4b74cc2939771cd0f058e6f19438aefc81542fc0f5bb7568dd161354892ecedac9360858635a4e011a02116a2e71109467b14c081ea

  • C:\Users\Admin\AppData\Local\Temp\hwdyql
    MD5

    e6411a1dee18295d015f78bf51ab8178

    SHA1

    2fecc68454561d17e2bcb34507e0bd947282b6a7

    SHA256

    58cbbefd08edf1579b65412cd6cc8717bb6d8aa33128b4ddfbb19a44ecce39f9

    SHA512

    8e636a4031f4b9b4d7db22b8a6a3a1999f6e52375941fdc66b9d69a243a988fb30ec88024f7e0b259837958f0deb1e3e51f83fc96f8346d93a4029b4f738cda1

  • \Users\Admin\AppData\Local\Temp\hwdyql
    MD5

    e6411a1dee18295d015f78bf51ab8178

    SHA1

    2fecc68454561d17e2bcb34507e0bd947282b6a7

    SHA256

    58cbbefd08edf1579b65412cd6cc8717bb6d8aa33128b4ddfbb19a44ecce39f9

    SHA512

    8e636a4031f4b9b4d7db22b8a6a3a1999f6e52375941fdc66b9d69a243a988fb30ec88024f7e0b259837958f0deb1e3e51f83fc96f8346d93a4029b4f738cda1

  • memory/1172-57-0x0000000000000000-mapping.dmp
  • memory/1172-58-0x0000000075FA1000-0x0000000075FA3000-memory.dmp
    Filesize

    8KB

  • memory/1172-62-0x000000006B560000-0x000000006B59D000-memory.dmp
    Filesize

    244KB

  • memory/1172-61-0x000000006B560000-0x000000006B629000-memory.dmp
    Filesize

    804KB

  • memory/1172-63-0x000000006B560000-0x000000006B629000-memory.dmp
    Filesize

    804KB

  • memory/1172-65-0x0000000000170000-0x0000000000171000-memory.dmp
    Filesize

    4KB

  • memory/2032-54-0x000000002FF11000-0x000000002FF14000-memory.dmp
    Filesize

    12KB

  • memory/2032-55-0x0000000070E81000-0x0000000070E83000-memory.dmp
    Filesize

    8KB

  • memory/2032-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB