Analysis

  • max time kernel
    4294179s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20220311-en
  • submitted
    20-03-2022 05:09

General

  • Target

    dffddd9a48265faf0bef7876cf73f930e70af36317239757c0466d4772a52ffa.exe

  • Size

    747KB

  • MD5

    6c491a39d2aaa238c43fb4a7058ce158

  • SHA1

    83e57fdd6014f6b8ee1915aa61d58b17ce542f52

  • SHA256

    dffddd9a48265faf0bef7876cf73f930e70af36317239757c0466d4772a52ffa

  • SHA512

    a7bddbd2b87bb7df00b02a79344c469632e8603dab12235b63c61397d6e0807c560b9176b3f5b9c79ed7d7d993fe46a828cc6ec6605f50551e376d5f78823c61

Malware Config

Extracted

Family

dridex

Botnet

10111

C2

51.254.163.104:1688

142.4.6.57:14043

195.159.28.230:4443

64.225.35.35:3098

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dffddd9a48265faf0bef7876cf73f930e70af36317239757c0466d4772a52ffa.exe
    "C:\Users\Admin\AppData\Local\Temp\dffddd9a48265faf0bef7876cf73f930e70af36317239757c0466d4772a52ffa.exe"
    1⤵
    • Checks whether UAC is enabled
    • Suspicious behavior: GetForegroundWindowSpam
    PID:1776

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1776-54-0x0000000075C41000-0x0000000075C43000-memory.dmp
    Filesize

    8KB

  • memory/1776-55-0x0000000000220000-0x000000000025C000-memory.dmp
    Filesize

    240KB

  • memory/1776-56-0x0000000000400000-0x00000000004BE000-memory.dmp
    Filesize

    760KB