Malware Analysis Report

2024-11-30 21:41

Sample ID 240105-jf93jageg8
Target 432059191ae18431121a15254a42b1a9
SHA256 635d93ae335081eea8ec704064a22599cdf670389b42d4c998a86438b0f6edd5
Tags
dridex botnet evasion payload trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

635d93ae335081eea8ec704064a22599cdf670389b42d4c998a86438b0f6edd5

Threat Level: Known bad

The file 432059191ae18431121a15254a42b1a9 was found to be: Known bad.

Malicious Activity Summary

dridex botnet evasion payload trojan

Dridex

Dridex Shellcode

Checks whether UAC is enabled

Unsigned PE

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-01-05 07:37

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-01-05 07:37

Reported

2024-01-05 07:40

Platform

win7-20231215-en

Max time kernel

3s

Max time network

122s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\432059191ae18431121a15254a42b1a9.dll,#1

Signatures

Dridex

botnet dridex

Dridex Shellcode

botnet payload
Description Indicator Process Target
N/A N/A N/A N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Windows\system32\rundll32.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\system32\rundll32.exe N/A
N/A N/A C:\Windows\system32\rundll32.exe N/A
N/A N/A C:\Windows\system32\rundll32.exe N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\432059191ae18431121a15254a42b1a9.dll,#1

C:\Users\Admin\AppData\Local\99bZT\rekeywiz.exe

C:\Users\Admin\AppData\Local\99bZT\rekeywiz.exe

C:\Windows\system32\rekeywiz.exe

C:\Windows\system32\rekeywiz.exe

C:\Users\Admin\AppData\Local\Xy0YAUm\WFS.exe

C:\Users\Admin\AppData\Local\Xy0YAUm\WFS.exe

C:\Windows\system32\WFS.exe

C:\Windows\system32\WFS.exe

C:\Users\Admin\AppData\Local\87EjiBg\sigverif.exe

C:\Users\Admin\AppData\Local\87EjiBg\sigverif.exe

C:\Windows\system32\sigverif.exe

C:\Windows\system32\sigverif.exe

Network

N/A

Files

memory/1956-3-0x00000000002A0000-0x00000000002A7000-memory.dmp

memory/1956-0-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/1204-4-0x00000000776C6000-0x00000000776C7000-memory.dmp

memory/1204-22-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/1204-30-0x0000000002E10000-0x0000000002E17000-memory.dmp

memory/1204-33-0x0000000077960000-0x0000000077962000-memory.dmp

memory/1204-32-0x00000000777D1000-0x00000000777D2000-memory.dmp

memory/1204-43-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/1204-42-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/1204-31-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/1204-23-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/1204-21-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/1204-20-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/1204-19-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/1204-18-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/1204-17-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/1204-16-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/1204-15-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/1204-14-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/1204-13-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/1204-12-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/1204-11-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/1204-10-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/1204-9-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/1204-8-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/1204-7-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/1204-5-0x0000000002E30000-0x0000000002E31000-memory.dmp

memory/1956-47-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/2892-59-0x0000000140000000-0x00000001400B8000-memory.dmp

memory/2892-64-0x0000000140000000-0x00000001400B8000-memory.dmp

memory/2892-61-0x00000000003F0000-0x00000000003F7000-memory.dmp

memory/1204-67-0x00000000776C6000-0x00000000776C7000-memory.dmp

memory/2992-80-0x0000000000120000-0x0000000000127000-memory.dmp

memory/2992-82-0x0000000140000000-0x00000001400B8000-memory.dmp

memory/2340-196-0x0000000140000000-0x00000001400B8000-memory.dmp

memory/2340-194-0x0000000000110000-0x0000000000117000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-01-05 07:37

Reported

2024-01-05 07:40

Platform

win10v2004-20231215-en

Max time kernel

0s

Max time network

124s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\432059191ae18431121a15254a42b1a9.dll,#1

Signatures

Dridex

botnet dridex

Dridex Shellcode

botnet payload
Description Indicator Process Target
N/A N/A N/A N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Windows\system32\rundll32.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\system32\rundll32.exe N/A
N/A N/A C:\Windows\system32\rundll32.exe N/A
N/A N/A C:\Windows\system32\rundll32.exe N/A
N/A N/A C:\Windows\system32\rundll32.exe N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\432059191ae18431121a15254a42b1a9.dll,#1

C:\Users\Admin\AppData\Local\AaoEnf\phoneactivate.exe

C:\Users\Admin\AppData\Local\AaoEnf\phoneactivate.exe

C:\Windows\system32\phoneactivate.exe

C:\Windows\system32\phoneactivate.exe

C:\Users\Admin\AppData\Local\3h9sIzM1f\slui.exe

C:\Users\Admin\AppData\Local\3h9sIzM1f\slui.exe

C:\Windows\system32\slui.exe

C:\Windows\system32\slui.exe

C:\Users\Admin\AppData\Local\pQ1n\InfDefaultInstall.exe

C:\Users\Admin\AppData\Local\pQ1n\InfDefaultInstall.exe

C:\Windows\system32\InfDefaultInstall.exe

C:\Windows\system32\InfDefaultInstall.exe

Network

Country Destination Domain Proto
US 8.8.8.8:53 149.177.190.20.in-addr.arpa udp
US 8.8.8.8:53 180.178.17.96.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 59.128.231.4.in-addr.arpa udp
US 8.8.8.8:53 45.19.74.20.in-addr.arpa udp
IE 20.123.104.105:443 tcp
US 8.8.8.8:53 119.110.54.20.in-addr.arpa udp
US 8.8.8.8:53 50.134.221.88.in-addr.arpa udp
US 8.8.8.8:53 176.178.17.96.in-addr.arpa udp
US 204.79.197.200:443 tcp
US 204.79.197.200:443 tcp
US 204.79.197.200:443 tcp
US 204.79.197.200:443 tcp
US 204.79.197.200:443 tcp

Files

memory/232-0-0x000002B082BB0000-0x000002B082BB7000-memory.dmp

memory/232-1-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/3400-11-0x00007FFE3C60A000-0x00007FFE3C60B000-memory.dmp

memory/3400-22-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/3400-34-0x00007FFE3E170000-0x00007FFE3E180000-memory.dmp

memory/3400-41-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/3400-31-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/3400-24-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/3400-23-0x0000000006DE0000-0x0000000006DE7000-memory.dmp

memory/3400-21-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/3400-20-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/3400-19-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/3400-18-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/3400-17-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/3400-16-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/3400-15-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/3400-14-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/3400-13-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/3400-12-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/3400-10-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/3400-9-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/3400-8-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/3400-7-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/3400-6-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/3400-4-0x0000000006E00000-0x0000000006E01000-memory.dmp

memory/232-44-0x0000000140000000-0x00000001400B7000-memory.dmp

memory/4404-51-0x0000000140000000-0x00000001400B8000-memory.dmp

memory/4404-57-0x0000000140000000-0x00000001400B8000-memory.dmp

memory/4404-54-0x0000022909B50000-0x0000022909B57000-memory.dmp

memory/3224-74-0x0000000140000000-0x00000001400B8000-memory.dmp

memory/3224-71-0x0000017DEE9D0000-0x0000017DEE9D7000-memory.dmp

memory/4340-88-0x000001D4805F0000-0x000001D4805F7000-memory.dmp

memory/4340-91-0x0000000140000000-0x00000001400B8000-memory.dmp