Analysis

  • max time kernel
    85s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    26-06-2022 05:36

General

  • Target

    hbjbf7q.dll

  • Size

    1.0MB

  • MD5

    69ab5b2ac08ffbd57885683ace162f84

  • SHA1

    b96549d53a6ba8eb89509ff4f870d7f18717b80a

  • SHA256

    8cd2f472d14988a503023626ca9a90b82b9d0889d95f3db6473e9a9e7e0fd85a

  • SHA512

    e102354ca12595d5bdf6d7c76d6e9e863ada6de1801215d54e4cae6f475408a4a35193f84bf254e3349df4d113b172f3cd930fdc305eef2b0e02d801129dd80e

Malware Config

Extracted

Family

dridex

Botnet

10444

C2

192.46.210.220:443

143.244.140.214:808

45.77.0.96:6891

185.56.219.47:8116

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Blocklisted process makes network request 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\hbjbf7q.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1044
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\hbjbf7q.dll,#1
      2⤵
      • Blocklisted process makes network request
      • Checks whether UAC is enabled
      PID:2036

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2036-54-0x0000000000000000-mapping.dmp
  • memory/2036-55-0x0000000075C51000-0x0000000075C53000-memory.dmp
    Filesize

    8KB

  • memory/2036-56-0x00000000751B0000-0x00000000752CB000-memory.dmp
    Filesize

    1.1MB

  • memory/2036-57-0x00000000751B0000-0x00000000751ED000-memory.dmp
    Filesize

    244KB

  • memory/2036-58-0x00000000751B0000-0x00000000752CB000-memory.dmp
    Filesize

    1.1MB

  • memory/2036-60-0x00000000751B0000-0x00000000752CB000-memory.dmp
    Filesize

    1.1MB

  • memory/2036-61-0x00000000751B0000-0x00000000752CB000-memory.dmp
    Filesize

    1.1MB