Analysis

  • max time kernel
    40s
  • max time network
    47s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    14-07-2022 03:11

General

  • Target

    ORC_632344671694231.vbs

  • Size

    3.6MB

  • MD5

    b99d97ba3b2a9b7870cce7b44c417fe3

  • SHA1

    5f60479c72aac2800ec0f795a3c0df39b25fc8bf

  • SHA256

    d9f78770a3888d3e00bf9bbb38220a9efbf07f340e864f595b59f58467eba764

  • SHA512

    f595cbad293453a093632665e189aab4d022ba3131390e2f8557f80b92c38cddf07fdaac6b584ad0f3b870c80eadcda0459c232763f77b154260a62cb2e2fe4b

Score
10/10

Malware Config

Extracted

Family

dridex

C2

162.213.37.188:443

178.128.20.11:3389

128.199.136.72:691

87.118.70.66:8443

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\System32\WScript.exe
    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\ORC_632344671694231.vbs"
    1⤵
    • Suspicious use of FindShellTrayWindow
    PID:960
  • C:\Windows\system32\regsvr32.exe
    regsvr32.exe -s C:\Users\Admin\AppData\Local\Temp\XyqXoUyD.txt
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:1596
    • C:\Windows\SysWOW64\regsvr32.exe
      -s C:\Users\Admin\AppData\Local\Temp\XyqXoUyD.txt
      2⤵
      • Loads dropped DLL
      PID:956

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\XyqXoUyD.txt
    Filesize

    423KB

    MD5

    b861a8f7f58a22063b772ef249a2dfb9

    SHA1

    1774c75facd27783084de244ca4dd60b925cdc49

    SHA256

    7adb29216a445d2e815f8155c0b14f6e34d657b41acd9f6cfbfa29085cb47487

    SHA512

    c83baa859f811f33418316831cec82a78aaa22d184e6f5618128fe845781a195d4c4233d84e68da84841318312aefd0cedb4f07cb338a624ef44204b39acf47e

  • \Users\Admin\AppData\Local\Temp\XyqXoUyD.txt
    Filesize

    423KB

    MD5

    b861a8f7f58a22063b772ef249a2dfb9

    SHA1

    1774c75facd27783084de244ca4dd60b925cdc49

    SHA256

    7adb29216a445d2e815f8155c0b14f6e34d657b41acd9f6cfbfa29085cb47487

    SHA512

    c83baa859f811f33418316831cec82a78aaa22d184e6f5618128fe845781a195d4c4233d84e68da84841318312aefd0cedb4f07cb338a624ef44204b39acf47e

  • memory/956-56-0x0000000000000000-mapping.dmp
  • memory/956-57-0x0000000074DC1000-0x0000000074DC3000-memory.dmp
    Filesize

    8KB

  • memory/956-59-0x0000000073C70000-0x0000000073C8D000-memory.dmp
    Filesize

    116KB

  • memory/956-60-0x0000000073C70000-0x00000000745E1000-memory.dmp
    Filesize

    9.4MB

  • memory/956-62-0x0000000073C70000-0x00000000745E1000-memory.dmp
    Filesize

    9.4MB

  • memory/1596-54-0x000007FEFBB81000-0x000007FEFBB83000-memory.dmp
    Filesize

    8KB