Malware Analysis Report

2024-11-30 21:28

Sample ID 231231-hweqwsede4
Target 2caa8539cdd9c874a4b2afbc5dc1c2b2
SHA256 950265d5ef5ccf208e14e549ab03590c0dd702c53c1fed6b1fdf5b63b03fe170
Tags
dridex botnet evasion payload trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

950265d5ef5ccf208e14e549ab03590c0dd702c53c1fed6b1fdf5b63b03fe170

Threat Level: Known bad

The file 2caa8539cdd9c874a4b2afbc5dc1c2b2 was found to be: Known bad.

Malicious Activity Summary

dridex botnet evasion payload trojan

Dridex

Dridex Shellcode

Checks whether UAC is enabled

Unsigned PE

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-12-31 07:04

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-12-31 07:04

Reported

2024-01-05 21:07

Platform

win7-20231215-en

Max time kernel

3s

Max time network

119s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\2caa8539cdd9c874a4b2afbc5dc1c2b2.dll,#1

Signatures

Dridex

botnet dridex

Dridex Shellcode

botnet payload
Description Indicator Process Target
N/A N/A N/A N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Windows\system32\rundll32.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\system32\rundll32.exe N/A
N/A N/A C:\Windows\system32\rundll32.exe N/A
N/A N/A C:\Windows\system32\rundll32.exe N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\2caa8539cdd9c874a4b2afbc5dc1c2b2.dll,#1

C:\Windows\system32\SystemPropertiesProtection.exe

C:\Windows\system32\SystemPropertiesProtection.exe

C:\Users\Admin\AppData\Local\emS\SystemPropertiesProtection.exe

C:\Users\Admin\AppData\Local\emS\SystemPropertiesProtection.exe

C:\Users\Admin\AppData\Local\RwVWd\msra.exe

C:\Users\Admin\AppData\Local\RwVWd\msra.exe

C:\Windows\system32\msra.exe

C:\Windows\system32\msra.exe

C:\Users\Admin\AppData\Local\4ttNK\dvdupgrd.exe

C:\Users\Admin\AppData\Local\4ttNK\dvdupgrd.exe

C:\Windows\system32\dvdupgrd.exe

C:\Windows\system32\dvdupgrd.exe

Network

N/A

Files

memory/2896-2-0x0000000001D90000-0x0000000001D97000-memory.dmp

memory/2896-0-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-4-0x0000000076FC6000-0x0000000076FC7000-memory.dmp

memory/1232-12-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-23-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-34-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-43-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-46-0x0000000002D10000-0x0000000002D17000-memory.dmp

memory/1232-54-0x00000000771D1000-0x00000000771D2000-memory.dmp

memory/1232-55-0x0000000077330000-0x0000000077332000-memory.dmp

memory/1232-53-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-64-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-45-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-44-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-42-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-70-0x0000000140000000-0x0000000140243000-memory.dmp

memory/2628-82-0x0000000000100000-0x0000000000107000-memory.dmp

memory/2628-83-0x0000000140000000-0x0000000140244000-memory.dmp

memory/1232-41-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-40-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-39-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-38-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-37-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-36-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-35-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-33-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-32-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-31-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-30-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-29-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-28-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-27-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-26-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-25-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-24-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-22-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-21-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-20-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-19-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1948-100-0x0000000000290000-0x0000000000297000-memory.dmp

memory/1232-18-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-17-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-16-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-15-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-14-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-13-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-11-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-10-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-9-0x0000000140000000-0x0000000140243000-memory.dmp

memory/2896-8-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-7-0x0000000140000000-0x0000000140243000-memory.dmp

memory/1232-5-0x0000000002DF0000-0x0000000002DF1000-memory.dmp

memory/1232-145-0x0000000076FC6000-0x0000000076FC7000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-12-31 07:04

Reported

2024-01-05 21:07

Platform

win10v2004-20231222-en

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

N/A

Files

N/A