Malware Analysis Report

2024-11-30 21:44

Sample ID 231231-crbksagbf9
Target 243e8c89b703daa0a4d5f230a2827283
SHA256 9263485491f4e8318a1dc80c789a10aa58d462b09b4e7f8bb5384b8c5d3c49be
Tags
dridex botnet evasion payload trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

9263485491f4e8318a1dc80c789a10aa58d462b09b4e7f8bb5384b8c5d3c49be

Threat Level: Known bad

The file 243e8c89b703daa0a4d5f230a2827283 was found to be: Known bad.

Malicious Activity Summary

dridex botnet evasion payload trojan

Dridex

Dridex Shellcode

Checks whether UAC is enabled

Unsigned PE

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-12-31 02:18

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-12-31 02:18

Reported

2024-01-05 04:33

Platform

win7-20231215-en

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2023-12-31 02:18

Reported

2024-01-05 04:32

Platform

win10v2004-20231222-en

Max time kernel

3s

Max time network

63s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\243e8c89b703daa0a4d5f230a2827283.dll,#1

Signatures

Dridex

botnet dridex

Dridex Shellcode

botnet payload
Description Indicator Process Target
N/A N/A N/A N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Windows\system32\rundll32.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\system32\rundll32.exe N/A
N/A N/A C:\Windows\system32\rundll32.exe N/A
N/A N/A C:\Windows\system32\rundll32.exe N/A
N/A N/A C:\Windows\system32\rundll32.exe N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\243e8c89b703daa0a4d5f230a2827283.dll,#1

C:\Windows\system32\mmc.exe

C:\Windows\system32\mmc.exe

C:\Users\Admin\AppData\Local\f1dX79R\mmc.exe

C:\Users\Admin\AppData\Local\f1dX79R\mmc.exe

C:\Windows\system32\InfDefaultInstall.exe

C:\Windows\system32\InfDefaultInstall.exe

C:\Windows\system32\shrpubw.exe

C:\Windows\system32\shrpubw.exe

C:\Users\Admin\AppData\Local\YaYNSCd7\shrpubw.exe

C:\Users\Admin\AppData\Local\YaYNSCd7\shrpubw.exe

C:\Users\Admin\AppData\Local\L61Nv1i\InfDefaultInstall.exe

C:\Users\Admin\AppData\Local\L61Nv1i\InfDefaultInstall.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 59.128.231.4.in-addr.arpa udp
US 8.8.8.8:53 148.177.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 180.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 43.58.199.20.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 146.78.124.51.in-addr.arpa udp
GB 88.221.135.211:80 tcp

Files

memory/2916-0-0x0000023A4D4C0000-0x0000023A4D4C7000-memory.dmp

memory/2916-1-0x0000000140000000-0x00000001401F4000-memory.dmp

memory/2916-7-0x0000000140000000-0x00000001401F4000-memory.dmp

memory/3512-11-0x0000000140000000-0x00000001401F4000-memory.dmp

memory/3512-15-0x0000000140000000-0x00000001401F4000-memory.dmp

memory/3512-19-0x0000000140000000-0x00000001401F4000-memory.dmp

memory/3512-22-0x0000000140000000-0x00000001401F4000-memory.dmp

memory/3512-25-0x0000000140000000-0x00000001401F4000-memory.dmp

memory/3512-30-0x0000000140000000-0x00000001401F4000-memory.dmp

memory/3512-33-0x0000000140000000-0x00000001401F4000-memory.dmp

memory/3512-34-0x0000000140000000-0x00000001401F4000-memory.dmp

memory/3512-37-0x00000000012B0000-0x00000000012B7000-memory.dmp

memory/3512-35-0x0000000140000000-0x00000001401F4000-memory.dmp

memory/3512-43-0x0000000140000000-0x00000001401F4000-memory.dmp

memory/3512-44-0x00007FFFFD200000-0x00007FFFFD210000-memory.dmp

memory/3512-53-0x0000000140000000-0x00000001401F4000-memory.dmp

memory/3512-55-0x0000000140000000-0x00000001401F4000-memory.dmp

memory/3512-32-0x0000000140000000-0x00000001401F4000-memory.dmp

memory/3512-31-0x0000000140000000-0x00000001401F4000-memory.dmp

memory/3512-29-0x0000000140000000-0x00000001401F4000-memory.dmp

memory/3512-28-0x0000000140000000-0x00000001401F4000-memory.dmp

memory/3512-27-0x0000000140000000-0x00000001401F4000-memory.dmp

memory/3512-26-0x0000000140000000-0x00000001401F4000-memory.dmp

memory/3512-24-0x0000000140000000-0x00000001401F4000-memory.dmp

memory/3512-23-0x0000000140000000-0x00000001401F4000-memory.dmp

memory/3512-21-0x0000000140000000-0x00000001401F4000-memory.dmp

memory/3512-20-0x0000000140000000-0x00000001401F4000-memory.dmp

memory/3512-18-0x0000000140000000-0x00000001401F4000-memory.dmp

memory/3512-17-0x0000000140000000-0x00000001401F4000-memory.dmp

memory/3512-16-0x0000000140000000-0x00000001401F4000-memory.dmp

C:\Users\Admin\AppData\Local\f1dX79R\MFC42u.dll

MD5 0c1df56754b42bd4afc72785147312a3
SHA1 f771cc44da7f9bdc35e20e4f4b16e7d8a7305e5e
SHA256 bd24316dc020431d75507ffb07dbacafa14f0e4e6329aa978284f2104b3279ec
SHA512 f0bf3a3e7ca2439349f9d05401c27ddb4e217b7cfd96d58d5abac39bf5ad5e129527dd778f25c8105451298b63bddc47ffda1582f82203ce0d410e98f1647529

memory/3008-66-0x0000000140000000-0x00000001401FB000-memory.dmp

memory/3008-68-0x0000000000830000-0x0000000000837000-memory.dmp

C:\Users\Admin\AppData\Local\f1dX79R\mmc.exe

MD5 8c86b80518406f14a4952d67185032d6
SHA1 9269f1fbcf65fefbc88a2e239519c21efe0f6ba5
SHA256 895eef1eda5700a425934ae3782d4741dfefb7deafa53891bde490150187b98a
SHA512 1bbdaa3ae8b5716ad2bd517055533e286ddb8a6c23cbc7aa602143dbb1ae132b513088ab61527c49737c554269c51416cceb80206ac8128ac6b003f1864eb099

memory/3008-70-0x0000000140000000-0x00000001401FB000-memory.dmp

memory/3512-14-0x0000000140000000-0x00000001401F4000-memory.dmp

C:\Users\Admin\AppData\Local\L61Nv1i\newdev.dll

MD5 bd11d839bc882f19f027924feab8d6fe
SHA1 a8a462319c986626c94e946519d5312fe3b119c5
SHA256 cc93b9e1a3440fb86c338c1ba03f27ce66995f4fa749b904a9cdd62c19901f17
SHA512 f67aba4b1e98d58abfad745ee2defb35b3d7eeab80bc57a76f540c5dbdc5042b2bdc7942824bdce91ce52b0d5d77f0e366aed5f5bab0ed27f8a58891fdc0a3db

memory/4776-81-0x0000023C011E0000-0x0000023C011E7000-memory.dmp

memory/4776-85-0x0000000140000000-0x00000001401F5000-memory.dmp

memory/4776-79-0x0000000140000000-0x00000001401F5000-memory.dmp

C:\Users\Admin\AppData\Local\L61Nv1i\InfDefaultInstall.exe

MD5 ee18876c1e5de583de7547075975120e
SHA1 f7fcb3d77da74deee25de9296a7c7335916504e3
SHA256 e59127b5fe82714956c7a1f10392a8673086a8e1f609e059935c7da1fa015a5d
SHA512 08bc4d28b8f528582c58175a74871dd33ac97955c3709c991779fc34b5ba4b2ba6ff40476d9f59345b61b0153fd932b0ea539431a67ff5012cb2ac8ab392f73c

C:\Users\Admin\AppData\Local\YaYNSCd7\srvcli.dll

MD5 70f3dd2653ec088cd87213d11f712cdc
SHA1 336c023b3281bdbe812ba0a70b5cac49a9335f59
SHA256 b91941256236c2538ac73ecfa96f56be0215ae2c877e2e81173229d857da34ba
SHA512 ce8f31053cd88d6d55ae4ab599c4e6a15cb86ca201f3db751a5fe0248004119b01df97e6141e02073ce34648a3bcc3435643238d3f2b22460046f2559f1aefd2

memory/5036-98-0x000001F7F40B0000-0x000001F7F40B7000-memory.dmp

memory/5036-102-0x0000000140000000-0x00000001401F5000-memory.dmp

C:\Users\Admin\AppData\Local\YaYNSCd7\shrpubw.exe

MD5 7c74ddd0b7c0b7c95f5844ca05a0230d
SHA1 3517dcefffb1e6109894d9d3c928c7592ef043ab
SHA256 42fca2adcbbe28b7c23002d475499d0d6ce33a0ec6e7bc4da5b7a325bea595b0
SHA512 58a86390f03315112c220b9e604f170ef230be652fd888b4a350e1c9570f2ed4865c2849fe3eafdcaf288358b64ad539bce57f24ea9db3c091d733fb32e92545

C:\Users\Admin\AppData\Local\YaYNSCd7\shrpubw.exe

MD5 9910d5c62428ec5f92b04abf9428eec9
SHA1 05f27d7515e8ae1fa3bc974ec65b864ec4c9ac8b
SHA256 6b84e6e55d8572d7edf0b6243d00abb651fcb0cddddac8461de5f9bb80035a2e
SHA512 01be043f7ff879a683e53962eec58456ba200d6787ea66581bb62669ae65d5e58a5577cdf23441165f7a535fce1dec933e3ad2465c72172b4a1488b24ce722cb

memory/3512-13-0x0000000140000000-0x00000001401F4000-memory.dmp

memory/3512-12-0x0000000140000000-0x00000001401F4000-memory.dmp

memory/3512-10-0x0000000140000000-0x00000001401F4000-memory.dmp

memory/3512-9-0x00007FFFFBC9A000-0x00007FFFFBC9B000-memory.dmp

memory/3512-8-0x0000000140000000-0x00000001401F4000-memory.dmp

memory/3512-6-0x0000000140000000-0x00000001401F4000-memory.dmp

memory/3512-4-0x0000000002C70000-0x0000000002C71000-memory.dmp

C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Wdush.lnk

MD5 f90502f590031340e76201f9306fcb01
SHA1 80ec96522adc17ac70f464e71a72eec27eb089b2
SHA256 1830bbe2be0cf9d381fee80f28a63e4a28a50774db67f5a76806999ed356f6a3
SHA512 799c44f0198091a6ce216c9918c384b3852ff9a7346bb32056072a3e1e132cbb64aed0ec078960d20393bc5524b2e5b695abaab067a73ed9f2798a65668f582a