Analysis

  • max time kernel
    47s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27/02/2025, 23:02

General

  • Target

    697c71ffceec34fafacc4a15b6f4a85b137d0eb1cd7411f550d783cbd61a2c53.exe

  • Size

    304KB

  • MD5

    25b19079474809996db957d94cfedca7

  • SHA1

    aa1e7dd98ba2741c493afe70880a2a546c88e701

  • SHA256

    697c71ffceec34fafacc4a15b6f4a85b137d0eb1cd7411f550d783cbd61a2c53

  • SHA512

    266a5b958765bc01feb3e6d2cb15c5299ce2369fbbc70e48a73b0bd43faa84180fed7e91063b27cd3f488181ff6a46b533ac21a1f2729a8395b06b751bcadf3a

  • SSDEEP

    6144:fqWuU/QvBeWgUCFWK9vL5ipw99NaML6EzReGbfUTpYDDmu/+3fbE:CoQRQF7BcyvN87G+pG/YE

Malware Config

Extracted

Family

dridex

Botnet

40400

C2

192.175.111.220:443

192.99.41.136:981

198.27.69.201:4643

198.20.228.10:3389

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex family
  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 50 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\697c71ffceec34fafacc4a15b6f4a85b137d0eb1cd7411f550d783cbd61a2c53.exe
    "C:\Users\Admin\AppData\Local\Temp\697c71ffceec34fafacc4a15b6f4a85b137d0eb1cd7411f550d783cbd61a2c53.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:764
    • C:\Users\Admin\AppData\Local\Temp\697c71ffceec34fafacc4a15b6f4a85b137d0eb1cd7411f550d783cbd61a2c53mgr.exe
      C:\Users\Admin\AppData\Local\Temp\697c71ffceec34fafacc4a15b6f4a85b137d0eb1cd7411f550d783cbd61a2c53mgr.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2120
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2656 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2600
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2152
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2152 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    71KB

    MD5

    83142242e97b8953c386f988aa694e4a

    SHA1

    833ed12fc15b356136dcdd27c61a50f59c5c7d50

    SHA256

    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

    SHA512

    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    22a728dbab4a527ffbff923f3820ef5b

    SHA1

    092ee74db6dbdb166491ba2bbd01f12c72e1061f

    SHA256

    a3b6098dcd41dec86706c6bea164b400e51d66b08304a0702645fa50d4118e6d

    SHA512

    3a75ba7d633a125441a2c8deaa76e2ccc6266372ee36d59148eb3fee42216302b437f2b3bf54d2cf1eb304a19e6a2f42630f876beea4c8060b0f8c9846a5b85f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    78930c0169c6985f85e4c0ad6b90def9

    SHA1

    e3f42e0f674bb4c565839273097d70251f9d0d11

    SHA256

    bc1cf4a204f56f406a3078d9173f236169527f84475bdee367afa48df7dc707b

    SHA512

    809e6bc55067c2d13818b98544b71800094a0a24aa64c78395374ef85869cfebb3aabb6a09c1ac3bb64788853d892b07ea993cdb5d15a7745afe87c4cc20bb50

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c35da9b46055672aff75a446a70e27a4

    SHA1

    dff6fe0ca275fe0618deb8d59469e64351bd4326

    SHA256

    b0b7346486bf7b3a7fb5729ddd5f69a59e6873595a2bab6390f86dba77132725

    SHA512

    9be277bbf7bb47df46568950643193c80ba64d3039b92a66231b434191b15c7dc5fbecc3f0ba84ea60f6b0bf5ee4dccb2742d72e42d02cebcfa6037c81dafe55

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    677c10f8b192ead2a6544d6c6b4e4107

    SHA1

    f7dae355922c005089d0d8be8fb05b9550dc540d

    SHA256

    12124239112937b6ef7cb27dfbbb15a3fe9c27663d63bf10210f7ebc41c9b248

    SHA512

    408f9d9131be32d071abab57a467ad680bc2ae1d2f82f40287dc7c877b6c2b1ccfb0cf1e2be0cfac0da216200f9d17be4b01e6883ee84e033d260cf998d071c7

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    e6c023a8bdecc108a64c23601a0070c8

    SHA1

    ebbff1b518d6a59f2d5497fd0ebbf0c8663517d8

    SHA256

    6259618835f219c037f914cf4f0e873afaf9671ea52fd19395ed7c1d11ca0471

    SHA512

    cee23884b6f0dde43ade1883dbba6e5f7797eec7caa269479bce89596b641ba2f696f0662b9dc3476836d23433925c4f0e6b2e8ff456b9325f852172ac0f0378

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c69224efeacdff0b42d19b0dd16bfeb6

    SHA1

    ff95d693d2862bb51a2bbc3f86db5faa54c30f76

    SHA256

    4c909c170fa027c5541b4fc94e8ebdc558e8b531b26f5e0b26b5b869c33f60dd

    SHA512

    34d593bab6c596c97d8ff99e9dddb7e964a8a4d7ef64b95c700c44e8e5cdec480c09556ec91cb5296f03ca7dc4a624d1f318758e0c3cb3a8fcbb6d6964227457

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    51d9a6e789c5c117448ae786c0cd9668

    SHA1

    064eb113b5c817a32636da68644048e4c98f9184

    SHA256

    f68cf7fec256c2ffb95b50bbbe434cf841b9c99ba99b4970dba19b6979060d3d

    SHA512

    167f7b6b339e2ecf7939e55e1292f00ada74fcd8f384cf35e9de03e2bc1046b181a2bdb676c2d3681a2e8ee8f403ef36bacbe2433fcd875220a4b2c234ee36df

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    da72b48ac157e3379f9f0b1271078093

    SHA1

    57c42d14cf7f6c64c167ac32a6d47d7ed6ffff74

    SHA256

    510941df11456217f8a67be2a206e0b199dbfd32e5733abfb504ef7640d9d884

    SHA512

    4edfd39910e0edb9e2f5e9b00e281dda760499a61a94c509701c95576b24cc47d99bce3feae767e3eb40a1b2d994db227d852329149709cbd1f4f2be3d2dfdbc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    0b1464463c6f6576ccdd898a881acb93

    SHA1

    11b3c294e99ec5979948a372a9562242507a569a

    SHA256

    6392f5d3644533efe647ae6b0d43df8dcd250fb39d1f38bc9cebb0139fbf03d3

    SHA512

    7bcee7bdd84ad5e9119cef80f18a050f4d9e4e2105c07c5d777bc16448a86ee71c515935bd92ffa4dff37576fb2207da7484ebcc2e49a7fa158fe48dd465076e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7c31af44a4f30bf220e1389e9b2b4c5c

    SHA1

    e253b71913b65dc38ee0d6b3e827cff1f1df1a24

    SHA256

    d90233e29c02476ef3e5c176a80498b7548cb2896aba7aa0ed0a2921a60c22ec

    SHA512

    22d093f931d94bdb4c2fa1185f09b51540ee2b05c7dfbc613365d9218a6efd21b611884adf296defaa63d0e28f2b416636a700ca711698b863c0d6a862753ce0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    ae9e91c72af55922ffe0523ca7adbdf6

    SHA1

    3b4795f0faebc43b05a75b3c9c4488f8cb65d8df

    SHA256

    769cb805347003b756f2de0c0078f819b16fbf4be5ccf4c388505f20e2e69183

    SHA512

    5a184d0a6a17dbaa7090cd9c12088b3b3d4ffd6b2f06d77d58e00a411c94d6658468e3cd8edf0bb7c9c17f16eb566fe8e2865e485cf583065f1a1dd53579d64c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    af24ac7a9b9e0fb886bb74c0fd359428

    SHA1

    e42602378e12fd9eb27aa08b207f0e3f1ddc52d1

    SHA256

    0b24643d4448683fb23ade6d96390c39d04371952930533e077f06b93b064d9f

    SHA512

    e67e9b2f8a5c9a5634f07c353b091e43491fa713df66bb4d48c76f13fce5ed145bbb3349213670a975a3c3c792fca1db4f40aaf43a0d5bb8565fd4212e8c553f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    7c7a3e0e0772ac3108609a617e6bf0d3

    SHA1

    a280f42f1aa1b9d42a38ed7dc14e87c3933eb9a6

    SHA256

    5b3095bb4a081ae13dc46da536058a0704c658b8fdce5d6472cccd93e39fc62a

    SHA512

    84edf966457c39d0edd2bb9289cefae29750a13e66dee8e3d3d784836c129fffd4073a62a78ed8e0d9cd2e34109066fccb48b965a683a8cb4cdfa79de450f7bc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9ed7c1c4eda65f6c6b1ed08383f5eb39

    SHA1

    d91eae9797f5d0f059089adba784c5be977a5504

    SHA256

    7eb72bafc2c69abc4a739fd7ea316aba19f9e79a628d941bef886303f936a337

    SHA512

    10329ab169c41e2ab4bb9a1810974886ea589732729d3a0c6af6892bd71c7b6c932ee605ea141fec39e31f564fdaaab30e29a254c1a57acbed66c9cca824abba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c506690f33fcdfce1e8984d675c5e1b8

    SHA1

    6c1f62430ae781a07b91903fc6a020c3229c9066

    SHA256

    d5d4b1371a773c583268594e45a4e91f0118a0f6906d2ff8d03d5553bf3062c4

    SHA512

    f64e38fb8865acd1496bbad8c45167a819c1ee289619dad9245a38c752d248cc2e65bd95de78dc2258a2992352f404b685cd1acec3ab940e1e24a8f0e36869fd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    2959b9123673d58374c76687339af060

    SHA1

    a1e06f6e023b96eb1f62941a0bd84062de4bf034

    SHA256

    dd74969f2d4aba88109191f60d460bdb5255391988a0fdaf63912666a24fa5ed

    SHA512

    fd4ff5372b6d98e1f250816c624c413a8fa12bcd36f9f3c3e447fe2f9b3464adfbde39ebbaf2789c68c3ad94709ff8c98ee890dabb1d798086a2f84bb989dce6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    209a1a66ed0de2c4e063ff4d3311e101

    SHA1

    bf334535e03ac2ad865db6a456e988ab283df1fb

    SHA256

    ec093d231c58782256581190f0d48294bf203f8dbd2064b1ee03aa70f9a79aae

    SHA512

    5dfa4ce0f00b8c61655c3a6effe59400e2c52ab749a473c9a6cab95c1e0b99dfa3432d7af87d8903f5715ba1fe6f6e3ebbc75f11404a1ef0746ab36058dce3ba

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d62d74b0008e625fb08cf9c45dc7eb9e

    SHA1

    8754894452412f8e78db0854528fce1ad7c32008

    SHA256

    a3b82b26ff24499bd1b6931a6b97226974d039fde01b66f9dab205f763c909b2

    SHA512

    f193383008e883f5fff6bf6639c061a24dd535d22164bcfbf99a830580f570b1aba51ab826f7f2a92c507a2d4b9056b059d2e8f6a77e614337a931a61372f253

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    be404cbf8318df687bd1db31f2b62a84

    SHA1

    14341eb0230352a8f2649af56b1f085ce10a14bc

    SHA256

    8448cd8b7128cb4a1735c60a0ff7c5036bab7b40b6947c710098b3dce70ab1bd

    SHA512

    e3982c7b7fa97c8b1ba24f7678dff82f58636a671152c70c68bc3a22392256a9f12c1f3586c2d57405c809a32f53e6d8c40a9f7d25c7e05e33f11b69498112f3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    377be16997deafcc247520d3d4ac80b4

    SHA1

    a690301c21abc56ea6a6b89d0f998c54a5571666

    SHA256

    06f2b71d3782ed82e59984ec1eef341946711d950705263f852a3d2a20786a06

    SHA512

    e4b18707d409f0600d7e150acc106abdb4749091b84db7454aa7d450a47a2eefd39eac3553ae7d76d0d2bf4bd6f1e3e9255cd034609a1e0b1520578c11415354

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{FABF4241-F55E-11EF-A2A3-4E0B11BE40FD}.dat

    Filesize

    5KB

    MD5

    57616305f409e00e42822474bf8897e3

    SHA1

    619838d565ca773bca442f3b927f0b98c027fe58

    SHA256

    ac8564a7d3e00fb46bb40ceae8e70dfa1f34555717e0ff66a00ac5458ba5ce40

    SHA512

    3080dbd71784dd9012564c2a79600c9dd7d60f55a33ba8060e06fb05a41db987192e8006f90ebd66e40959227fae5a271ac680d19edd0578e4e933f55e83dbca

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{FAC40501-F55E-11EF-A2A3-4E0B11BE40FD}.dat

    Filesize

    4KB

    MD5

    b1853b249539bcb2d2bc4f24304f0fe6

    SHA1

    316a5e1a426329aef51fcc777300d1a3dc4ca5e7

    SHA256

    c030cc19358ae95d0faf1896bff6c32b4cc4c761262174f3eee4eea0fcfd4565

    SHA512

    e350659d30bc43c875df5e162956e80c84144203f5248986f0aa6ae7fa1b01ac584bda76e47eb242c5a73f6638ed584e908b8c7503b6ff95adbffb6a4c1d1d61

  • C:\Users\Admin\AppData\Local\Temp\697c71ffceec34fafacc4a15b6f4a85b137d0eb1cd7411f550d783cbd61a2c53mgr.exe

    Filesize

    105KB

    MD5

    d5ca6e1f080abc64bbb11e098acbeabb

    SHA1

    1849634bf5a65e1baddddd4452c99dfa003e2647

    SHA256

    30193b5ccf8a1834eac3502ef165350ab74b107451145f3d2937fdf24b9eceae

    SHA512

    aa57ce51de38af6212d7339c4baac543a54b0f527621b0ef9e78eca5e5699e8508a154f54f8ac04135527d8417275eeee72a502a362547575699330cc756b161

  • C:\Users\Admin\AppData\Local\Temp\CabFE0F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarFEF2.tmp

    Filesize

    183KB

    MD5

    109cab5505f5e065b63d01361467a83b

    SHA1

    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

    SHA256

    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

    SHA512

    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

  • memory/764-13-0x00000000004B0000-0x00000000004B6000-memory.dmp

    Filesize

    24KB

  • memory/764-9-0x0000000010000000-0x000000001004C000-memory.dmp

    Filesize

    304KB

  • memory/764-11-0x0000000000480000-0x00000000004DD000-memory.dmp

    Filesize

    372KB

  • memory/764-498-0x0000000010000000-0x000000001004C000-memory.dmp

    Filesize

    304KB

  • memory/764-0-0x0000000010000000-0x000000001004C000-memory.dmp

    Filesize

    304KB

  • memory/764-10-0x0000000000480000-0x00000000004DD000-memory.dmp

    Filesize

    372KB

  • memory/2120-19-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2120-18-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2120-16-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2120-12-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/2120-14-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2120-15-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB

  • memory/2120-23-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2120-17-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB