Malware Analysis Report

2024-11-30 21:35

Sample ID 231231-m2r1maghbp
Target 336076b58cd162912bd76f9f2743aefe
SHA256 eee3da711732010bbd15b76ada57e147075e74f6e3d16d830886fa0efd5c2b46
Tags
dridex botnet evasion payload trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

eee3da711732010bbd15b76ada57e147075e74f6e3d16d830886fa0efd5c2b46

Threat Level: Known bad

The file 336076b58cd162912bd76f9f2743aefe was found to be: Known bad.

Malicious Activity Summary

dridex botnet evasion payload trojan

Dridex

Dridex Shellcode

Checks whether UAC is enabled

Unsigned PE

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-12-31 10:57

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-12-31 10:57

Reported

2024-01-04 07:40

Platform

win7-20231129-en

Max time kernel

4s

Max time network

119s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\336076b58cd162912bd76f9f2743aefe.dll,#1

Signatures

Dridex

botnet dridex

Dridex Shellcode

botnet payload
Description Indicator Process Target
N/A N/A N/A N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Windows\system32\rundll32.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\system32\rundll32.exe N/A
N/A N/A C:\Windows\system32\rundll32.exe N/A
N/A N/A C:\Windows\system32\rundll32.exe N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\336076b58cd162912bd76f9f2743aefe.dll,#1

C:\Windows\system32\perfmon.exe

C:\Windows\system32\perfmon.exe

C:\Users\Admin\AppData\Local\Znhyy\perfmon.exe

C:\Users\Admin\AppData\Local\Znhyy\perfmon.exe

C:\Windows\system32\UI0Detect.exe

C:\Windows\system32\UI0Detect.exe

C:\Users\Admin\AppData\Local\K1h7X\UI0Detect.exe

C:\Users\Admin\AppData\Local\K1h7X\UI0Detect.exe

C:\Windows\system32\tabcal.exe

C:\Windows\system32\tabcal.exe

C:\Users\Admin\AppData\Local\G1u6yxAGH\tabcal.exe

C:\Users\Admin\AppData\Local\G1u6yxAGH\tabcal.exe

Network

N/A

Files

memory/2468-1-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/2468-0-0x0000000000110000-0x0000000000117000-memory.dmp

memory/1304-4-0x0000000076D16000-0x0000000076D17000-memory.dmp

memory/1304-11-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-19-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-27-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-38-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-47-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-51-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-59-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-63-0x0000000076F80000-0x0000000076F82000-memory.dmp

memory/1304-60-0x0000000076E21000-0x0000000076E22000-memory.dmp

memory/1304-70-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-52-0x00000000024D0000-0x00000000024D7000-memory.dmp

memory/1304-76-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3060-88-0x0000000001F20000-0x0000000001F27000-memory.dmp

memory/1304-50-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-49-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-48-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-46-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-45-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-44-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-43-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-42-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-41-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-40-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-39-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-37-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-36-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-35-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-34-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-33-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-32-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-31-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-30-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-29-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-28-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1608-112-0x0000000000100000-0x0000000000107000-memory.dmp

memory/1304-26-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-25-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-24-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-23-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-22-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-21-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-20-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-17-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-18-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-16-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-15-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-14-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-12-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-13-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-10-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-9-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-8-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/2468-7-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/1304-5-0x00000000024F0000-0x00000000024F1000-memory.dmp

memory/2832-130-0x00000000019A0000-0x00000000019A7000-memory.dmp

memory/1304-151-0x0000000076D16000-0x0000000076D17000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2023-12-31 10:57

Reported

2024-01-04 07:40

Platform

win10v2004-20231215-en

Max time kernel

1s

Max time network

142s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\336076b58cd162912bd76f9f2743aefe.dll,#1

Signatures

Dridex

botnet dridex

Dridex Shellcode

botnet payload
Description Indicator Process Target
N/A N/A N/A N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Windows\system32\rundll32.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\system32\rundll32.exe N/A
N/A N/A C:\Windows\system32\rundll32.exe N/A
N/A N/A C:\Windows\system32\rundll32.exe N/A
N/A N/A C:\Windows\system32\rundll32.exe N/A
N/A N/A C:\Windows\system32\rundll32.exe N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\336076b58cd162912bd76f9f2743aefe.dll,#1

C:\Windows\system32\SystemPropertiesAdvanced.exe

C:\Windows\system32\SystemPropertiesAdvanced.exe

C:\Users\Admin\AppData\Local\8xy\SystemPropertiesComputerName.exe

C:\Users\Admin\AppData\Local\8xy\SystemPropertiesComputerName.exe

C:\Windows\system32\SystemPropertiesComputerName.exe

C:\Windows\system32\SystemPropertiesComputerName.exe

C:\Users\Admin\AppData\Local\WlOC\SystemPropertiesAdvanced.exe

C:\Users\Admin\AppData\Local\WlOC\SystemPropertiesAdvanced.exe

C:\Windows\system32\WindowsActionDialog.exe

C:\Windows\system32\WindowsActionDialog.exe

C:\Users\Admin\AppData\Local\fpeleClK\WindowsActionDialog.exe

C:\Users\Admin\AppData\Local\fpeleClK\WindowsActionDialog.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 73.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 2.136.104.51.in-addr.arpa udp
NL 52.142.223.178:80 tcp
US 8.8.8.8:53 0.205.248.87.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 205.47.74.20.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 41.110.16.96.in-addr.arpa udp
US 8.8.8.8:53 158.240.127.40.in-addr.arpa udp
US 8.8.8.8:53 241.154.82.20.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 183.59.114.20.in-addr.arpa udp
US 8.8.8.8:53 104.241.123.92.in-addr.arpa udp
US 8.8.8.8:53 119.110.54.20.in-addr.arpa udp
US 8.8.8.8:53 udp
US 8.8.8.8:53 udp
US 93.184.221.240:80 tcp
GB 88.221.134.32:80 tcp
GB 96.17.178.176:80 tcp
GB 96.17.178.176:80 tcp
US 93.184.221.240:80 tcp
US 93.184.221.240:80 tcp
GB 96.17.178.176:80 tcp
US 93.184.221.240:80 tcp
US 8.8.8.8:53 tse1.mm.bing.net udp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp

Files

memory/4952-0-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/4952-2-0x0000020EA4430000-0x0000020EA4437000-memory.dmp

memory/3428-11-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-15-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-18-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-22-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-25-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-29-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-32-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-36-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-40-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-44-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-48-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-51-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-52-0x0000000006F30000-0x0000000006F37000-memory.dmp

memory/3428-50-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-60-0x00007FFF89F00000-0x00007FFF89F10000-memory.dmp

memory/3428-69-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-71-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-59-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3848-81-0x000002B1284B0000-0x000002B1284B7000-memory.dmp

memory/3848-80-0x0000000140000000-0x00000001402D5000-memory.dmp

memory/2444-97-0x00000299DFBC0000-0x00000299DFBC7000-memory.dmp

memory/3428-49-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-47-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-46-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-45-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-43-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-42-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/380-114-0x0000015DF75A0000-0x0000015DF75A7000-memory.dmp

memory/3428-41-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-39-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-38-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-37-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-35-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-34-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-33-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-31-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-30-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-28-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-27-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-26-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-24-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-23-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-21-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-20-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-19-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-17-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-16-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-14-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-13-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-12-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-10-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-9-0x00007FFF882FA000-0x00007FFF882FB000-memory.dmp

memory/3428-8-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-7-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/4952-6-0x0000000140000000-0x00000001402D4000-memory.dmp

memory/3428-4-0x0000000006F50000-0x0000000006F51000-memory.dmp