Analysis

  • max time kernel
    166s
  • max time network
    184s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 09:20

General

  • Target

    90eb969343dad642d380b088b406a1e8170e75f0a09000d1e06799badb8da1c7.exe

  • Size

    1.3MB

  • MD5

    558bd4c406b41a7e542af52ab17d6648

  • SHA1

    0472dd03713fd11f836001252a4306a1a5cf3eb0

  • SHA256

    90eb969343dad642d380b088b406a1e8170e75f0a09000d1e06799badb8da1c7

  • SHA512

    40e2e621477c999d1a3a439950f618b8e64f4d81a0b371661710921b6e314beb7d6412d2d01e8e5c9669903e9c870db0f3c81935ed1eb40d5eb3e5739e516bfc

  • SSDEEP

    6144:mCiOT+RDQ/0jnNESgfcDLd9a5tLQDB6FgD6b/3nE8FfcMTMazN9QGo:yOT+RbjmedytLJFA6T3nE8Fzpw

Malware Config

Extracted

Family

dridex

Botnet

10111

C2

188.165.17.91:8443

185.216.27.185:8172

182.254.209.230:6516

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\90eb969343dad642d380b088b406a1e8170e75f0a09000d1e06799badb8da1c7.exe
    "C:\Users\Admin\AppData\Local\Temp\90eb969343dad642d380b088b406a1e8170e75f0a09000d1e06799badb8da1c7.exe"
    1⤵
    • Checks whether UAC is enabled
    PID:3724

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3724-132-0x0000000002290000-0x00000000022CC000-memory.dmp
    Filesize

    240KB

  • memory/3724-133-0x0000000000400000-0x0000000000548000-memory.dmp
    Filesize

    1.3MB

  • memory/3724-134-0x0000000000400000-0x0000000000548000-memory.dmp
    Filesize

    1.3MB