Malware Analysis Report

2024-11-30 21:28

Sample ID 240106-k7jv4adee6
Target 45dad2872d00b40918d651ca11ce9698
SHA256 8c3419a2c24c2c7169506a5efa26b3f5c2c5832497eefd93ef10bc066237f3ba
Tags
dridex botnet evasion payload trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

8c3419a2c24c2c7169506a5efa26b3f5c2c5832497eefd93ef10bc066237f3ba

Threat Level: Known bad

The file 45dad2872d00b40918d651ca11ce9698 was found to be: Known bad.

Malicious Activity Summary

dridex botnet evasion payload trojan

Dridex

Dridex Shellcode

Checks whether UAC is enabled

Unsigned PE

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-01-06 09:14

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-01-06 09:14

Reported

2024-01-06 09:17

Platform

win7-20231129-en

Max time kernel

3s

Max time network

121s

Command Line

rundll32.exe C:\Users\Admin\AppData\Local\Temp\45dad2872d00b40918d651ca11ce9698.dll,#1

Signatures

Dridex

botnet dridex

Dridex Shellcode

botnet payload
Description Indicator Process Target
N/A N/A N/A N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA C:\Windows\system32\rundll32.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\system32\rundll32.exe N/A
N/A N/A C:\Windows\system32\rundll32.exe N/A
N/A N/A C:\Windows\system32\rundll32.exe N/A

Processes

C:\Windows\system32\rundll32.exe

rundll32.exe C:\Users\Admin\AppData\Local\Temp\45dad2872d00b40918d651ca11ce9698.dll,#1

C:\Windows\system32\xpsrchvw.exe

C:\Windows\system32\xpsrchvw.exe

C:\Users\Admin\AppData\Local\ktYCc\xpsrchvw.exe

C:\Users\Admin\AppData\Local\ktYCc\xpsrchvw.exe

C:\Windows\system32\irftp.exe

C:\Windows\system32\irftp.exe

C:\Users\Admin\AppData\Local\7Ha\irftp.exe

C:\Users\Admin\AppData\Local\7Ha\irftp.exe

C:\Users\Admin\AppData\Local\zaauynqF\sigverif.exe

C:\Users\Admin\AppData\Local\zaauynqF\sigverif.exe

C:\Windows\system32\sigverif.exe

C:\Windows\system32\sigverif.exe

Network

N/A

Files

memory/2932-0-0x0000000140000000-0x000000014016C000-memory.dmp

memory/2932-1-0x0000000000330000-0x0000000000337000-memory.dmp

memory/1192-4-0x0000000077A56000-0x0000000077A57000-memory.dmp

memory/1192-15-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-32-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-37-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-38-0x0000000002920000-0x0000000002927000-memory.dmp

memory/1192-47-0x0000000077DC0000-0x0000000077DC2000-memory.dmp

memory/1192-46-0x0000000077C61000-0x0000000077C62000-memory.dmp

memory/1192-56-0x0000000140000000-0x000000014016C000-memory.dmp

memory/2440-79-0x0000000140000000-0x000000014016E000-memory.dmp

memory/2440-76-0x0000000000100000-0x0000000000107000-memory.dmp

memory/2440-74-0x0000000140000000-0x000000014016E000-memory.dmp

memory/1192-68-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-62-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-61-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-45-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-36-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-35-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-34-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-33-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-31-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-30-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-29-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-28-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-27-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-26-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-25-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-24-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-23-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-22-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-21-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-20-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-19-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-18-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-17-0x0000000140000000-0x000000014016C000-memory.dmp

memory/768-98-0x0000000140000000-0x0000000140173000-memory.dmp

memory/768-103-0x0000000140000000-0x0000000140173000-memory.dmp

memory/768-101-0x00000000000A0000-0x00000000000A7000-memory.dmp

memory/1192-16-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-14-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-13-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-12-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-11-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-10-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-9-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-8-0x0000000140000000-0x000000014016C000-memory.dmp

memory/2932-7-0x0000000140000000-0x000000014016C000-memory.dmp

memory/1192-5-0x0000000002940000-0x0000000002941000-memory.dmp

memory/936-122-0x0000000140000000-0x000000014016D000-memory.dmp

memory/1192-145-0x0000000077A56000-0x0000000077A57000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-01-06 09:14

Reported

2024-01-06 09:17

Platform

win10v2004-20231222-en

Command Line

N/A

Signatures

N/A

Processes

N/A

Network

N/A

Files

N/A