Analysis
-
max time kernel
80s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
25-04-2023 17:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
HEUR-Backdoor.Win32.Dridex.exe
Resource
win7-20230220-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
HEUR-Backdoor.Win32.Dridex.exe
Resource
win10v2004-20230221-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
HEUR-Backdoor.Win32.Dridex.exe
-
Size
146KB
-
MD5
d93ca01a4515732a6a54df0a391c93e3
-
SHA1
ba31585616c3640a434c4c29193f0f89e8306485
-
SHA256
becacb52a50004d42538cfe82c8f527f1793727c5f679f46df7f96eade272962
-
SHA512
3e9c52c04cf37250e8d4e0e3a17cc27e17a1ff19c4935a788b77dafea28bd6ec0a514bdbe4073845c31559652c039f88f811b24020044c0b0e0c47f1cb9ac2e0
-
SSDEEP
3072:BHIbLRDJ1YGzRXczG9Nw5pwfhcMVd8v86jdbG42UO5LXrMUJKKMEj2Yi:BHcLRDz/czG9Mp2hcGd8vvjFG42PhMal
Score
10/10
Malware Config
Extracted
Family
zloader
Botnet
-pit14
Campaign
web7-pit14
C2
https://45.72.3.132/web7643/gate.php
Attributes
-
build_id
929195383
rc4.plain
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 32 2360 msiexec.exe 34 2360 msiexec.exe 43 2360 msiexec.exe 48 2360 msiexec.exe 49 2360 msiexec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows\CurrentVersion\Run msiexec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Fuycyb = "C:\\Users\\Admin\\AppData\\Roaming\\Hibiu\\dacyhaof.exe" msiexec.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2872 set thread context of 2360 2872 HEUR-Backdoor.Win32.Dridex.exe 85 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSecurityPrivilege 2360 msiexec.exe Token: SeSecurityPrivilege 2360 msiexec.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2360 2872 HEUR-Backdoor.Win32.Dridex.exe 85 PID 2872 wrote to memory of 2360 2872 HEUR-Backdoor.Win32.Dridex.exe 85 PID 2872 wrote to memory of 2360 2872 HEUR-Backdoor.Win32.Dridex.exe 85 PID 2872 wrote to memory of 2360 2872 HEUR-Backdoor.Win32.Dridex.exe 85 PID 2872 wrote to memory of 2360 2872 HEUR-Backdoor.Win32.Dridex.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\HEUR-Backdoor.Win32.Dridex.exe"C:\Users\Admin\AppData\Local\Temp\HEUR-Backdoor.Win32.Dridex.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\msiexec.exemsiexec.exe2⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2360
-