Analysis

  • max time kernel
    62s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27/02/2025, 22:57

General

  • Target

    697c71ffceec34fafacc4a15b6f4a85b137d0eb1cd7411f550d783cbd61a2c53.exe

  • Size

    304KB

  • MD5

    25b19079474809996db957d94cfedca7

  • SHA1

    aa1e7dd98ba2741c493afe70880a2a546c88e701

  • SHA256

    697c71ffceec34fafacc4a15b6f4a85b137d0eb1cd7411f550d783cbd61a2c53

  • SHA512

    266a5b958765bc01feb3e6d2cb15c5299ce2369fbbc70e48a73b0bd43faa84180fed7e91063b27cd3f488181ff6a46b533ac21a1f2729a8395b06b751bcadf3a

  • SSDEEP

    6144:fqWuU/QvBeWgUCFWK9vL5ipw99NaML6EzReGbfUTpYDDmu/+3fbE:CoQRQF7BcyvN87G+pG/YE

Malware Config

Extracted

Family

dridex

Botnet

40400

C2

192.175.111.220:443

192.99.41.136:981

198.27.69.201:4643

198.20.228.10:3389

rc4.plain
rc4.plain

Signatures

  • Dridex

    Dridex(known as Bugat/Cridex) is a form of malware that specializes in stealing bank credentials.

  • Dridex family
  • Ramnit

    Ramnit is a versatile family that holds viruses, worms, and Trojans.

  • Ramnit family
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 50 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\697c71ffceec34fafacc4a15b6f4a85b137d0eb1cd7411f550d783cbd61a2c53.exe
    "C:\Users\Admin\AppData\Local\Temp\697c71ffceec34fafacc4a15b6f4a85b137d0eb1cd7411f550d783cbd61a2c53.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2756
    • C:\Users\Admin\AppData\Local\Temp\697c71ffceec34fafacc4a15b6f4a85b137d0eb1cd7411f550d783cbd61a2c53mgr.exe
      C:\Users\Admin\AppData\Local\Temp\697c71ffceec34fafacc4a15b6f4a85b137d0eb1cd7411f550d783cbd61a2c53mgr.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2824
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2032
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2032 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2616
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2716
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2716 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    71KB

    MD5

    83142242e97b8953c386f988aa694e4a

    SHA1

    833ed12fc15b356136dcdd27c61a50f59c5c7d50

    SHA256

    d72761e1a334a754ce8250e3af7ea4bf25301040929fd88cf9e50b4a9197d755

    SHA512

    bb6da177bd16d163f377d9b4c63f6d535804137887684c113cc2f643ceab4f34338c06b5a29213c23d375e95d22ef417eac928822dfb3688ce9e2de9d5242d10

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d0ad701b997bd4a8136aaa57280fab32

    SHA1

    1bc0a4752762146ec34619a5f4ae5d6fece03968

    SHA256

    c52fd20d1d30d1411e97c6ab48ad158f12b502d60e8351dee7f31e54928c471a

    SHA512

    4ea6151c97365c0d6da64044af5f714d496f1ca3fd4fefa3834df05adf198621f0fc6b8abb62d3ded616498b5628da3526790dbca5c1df694050a90279580edc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    c130a6ca45923586386084a8e59a4ddd

    SHA1

    d4f29d93c3fae400322af6d9b5ccf9df2b196f51

    SHA256

    8d7814d38299a75bfd4cfb42730fa2dc79c428b19abaf8dc858d6a2d1957ecd1

    SHA512

    3d8b71befc32e2e7a02911e1c1c7623e9b5405a5ad262202268f4b67eb19919aa14761c91631acdc8004ceb8569a2e81f944891fc67b80cde1046ddd186fda5e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    5e94e22b0b98e1ec29989c5c92a4430d

    SHA1

    0c30d0b4d820527dc3b85b5b5e2915995750a615

    SHA256

    55570f30cb7e75c5bde5290c218dba8ac518e721a1cf78305cbfc143346afdd0

    SHA512

    f6d8f20fbdf2118e9ddcd37eb4579e33e9de11dea1101ffde9cf2e9cf56201bc04d1f1e4591d3a80236e92e92990d2862812106850773ea3bab8c75d551be7a5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    86962dfee68891ad0a8f54307199ab55

    SHA1

    c9c24e215f85ddef786acb9f9f7ddc42e57c4278

    SHA256

    35e950347dc44aa92adbab8f6206677ee46f16a6dc94ec332a6680a1100ac6c0

    SHA512

    2725c3ed984c85b7de3af0d05d9479e7057ca7d48e6bff74c182dbafe8da4f25372a7fde480b9d24fa0b32f14449da96d2475f58d08ad2413413bcf4b02af704

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    f9737b7814e84d9c39970553fe24911e

    SHA1

    ba0970e2f99b511cb2caca3628be0826591716cd

    SHA256

    3ee97f89887926b75e975d6133ad8c2d9b147d6d08e79e6fbfa53cbe51324fa3

    SHA512

    517367cc76e2d5ab657c4d425de6eadd9d4e7580f9f91b1e465d5736c68e2a242ec6f3a4e34b556f2cb55ed384ac72e16279e8c507250cfc93d8b714c8e23847

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    3c0be115b0a082e9c8074a50d10ba3ca

    SHA1

    a3e0402e3c96843ba4ac81c4bb69a897bf3ab74d

    SHA256

    c8f4ea299b3930e368df0f606e6e356d9b2360b07a426fe10d0cd034b88c9dc1

    SHA512

    5459bb660acb9f9ab682ea5fec90edeb147e5e51f6109a933752f12ec2fecc08e3892a10083cea8c7abc169677142e0e968b97765d2aa1d6a0b46ea4260bf1ae

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    543ff8eb1da227506f600a999b7ade30

    SHA1

    f9e9dc7cf1b1ebadee43a9556cfd0ebe4e27f39c

    SHA256

    4de7a1a9d8f84fe31fbfe149bda2adabd0e969e5dc2f9b04a3b5db73a6cce0b2

    SHA512

    28b9408099b9dcf5a3a5f387fb1ecd814f79fb01be2e5b18079463b9e69e09893a796191c777b610d23da0ef94f3148c93d591a317718a37721f399dcb9d3f9e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    9f7cbfbf7a518fdbd9e1521e30091f52

    SHA1

    4ed7abacf443026a481b925383b7ead830baef77

    SHA256

    2b714c2cc0ceb1263af37cf20e84f0d09007dff9929ee88511c57617c05b5284

    SHA512

    aea68d4be6a34a5f826706178dbaf94ee7e1b91500e41f5f3410475e5ccddff0bb0907193c84ca00f0e430c30bc64f0e28d01999ea7749fdcbc38307f5814e76

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    764affc283a1504158dff9de9c9bbf1a

    SHA1

    c209446cff0d9af89c1a309525ce93d8c28091fa

    SHA256

    7b213164d799894e0ea271b93925d25bf0b696d132982c660b0bb35163c0994d

    SHA512

    f516eea1bc94149550e40040aeafe2ca34c8e68fdac3eec2ee5f8db1eecdbc8bffe83cbeb496d5c68eef219e21aa0aaf342ffbb6657d52b764f9106bfea815d6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a3b7f73f1ad457122e04e22d84fb7a8b

    SHA1

    4eb5867bfd48c8e3958411dce34fd63cd708aecc

    SHA256

    4fd2777910216c1c9d1482716b64bc5ce15163667f19b136abeeb49daa5360b0

    SHA512

    2ff171e503115d8940c54309f0fc49f85c095ed723bf7820cf55622e68db8fcbc67646700e7b2216be5e35b2b3da9ff9c04891cf803885b0e57ed3e98352e858

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    827a3b5d4e04ce371fc6239001a4c757

    SHA1

    c3dc32e1f94efbd36f1e1216d9e5cee6cf568459

    SHA256

    4a9e7a0c98ca69c3b1fd6811f02c6a888a60e667b6fdb0707fbdd747a576e328

    SHA512

    610b4ab34cd4b31a1e4ff30c3c59762fca966223c3f04e647a7689df6b6b560c06e994eb9777b1729bc514fed562323d6152ef3dba8023ffa86f8bf3743171dd

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    a1e95d5bb79bf00989eaecf27ccba772

    SHA1

    863a94e30db29da83d0c713dd40f1b38ced59367

    SHA256

    43542103d6b0ffdad8778d0c3789d11d98072fa25ac5e2bc240b5eb0904ab89e

    SHA512

    305521a1b4c473e1ee9279add498bbff9478c058c5587904b75d12b68712c32defa6c390e8aa47c811071c6af709f45d2b8881ef87ff7faf06682acfdba98b46

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    d4185d803d44bbbbb68f37e3dfb08dbe

    SHA1

    a47f9b17ff09c4eedb474945d96c47ea6ff62354

    SHA256

    fe0dd0785aa74d57752db0d2dca5d91d862ae4a77e0c0cacf5394e8bc470632e

    SHA512

    fc0fa803da28de1e1c2d745bbf7e58e7fd57c1470d78737277ad79452fda0430b22fbddbd0db4ee1f9b7449876939b6957f5dbbbbcf5f39b1a84fa95bda3f38f

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{3CA43C71-F55E-11EF-9D09-F245C6AC432F}.dat

    Filesize

    4KB

    MD5

    c99d5c4ee38aa5b5f27bae8fa3bbe01f

    SHA1

    2158bce7eb35a24e918e8979f68d99adc27ace66

    SHA256

    06f237e5c8a11a101f201173d6de2f9958de98bbf9e2a2e96b1e35aca72c82f3

    SHA512

    2dd41312fd18cfd931b116d08b347d68a7cd5c2cce39c50c05e83a5ec8ba2252fda05f10bba4359d8099316f8ef6b58fffe5acab66cb33c9a96f5a04bc9929ec

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{3CA69DD1-F55E-11EF-9D09-F245C6AC432F}.dat

    Filesize

    5KB

    MD5

    6b8ac10424a2bfa83f55b074cb6b60a6

    SHA1

    939805733dc3d62389a25996944bf83fc66c60b7

    SHA256

    7693825a7434ad7b16fbded30e5d45821aa2e0232f02f24f5c13033f3e6a07b6

    SHA512

    da41dafb620657ed063f2ee32b8a24a60d22f3b5673777cb83e5b0e265ad21c4cdca8b6582d2f7ce71afa1bd6b561ce59cec1a6eeedaf978bbff1c158d009f99

  • C:\Users\Admin\AppData\Local\Temp\Cab85B.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar99C.tmp

    Filesize

    183KB

    MD5

    109cab5505f5e065b63d01361467a83b

    SHA1

    4ed78955b9272a9ed689b51bf2bf4a86a25e53fc

    SHA256

    ea6b7f51e85835c09259d9475a7d246c3e764ad67c449673f9dc97172c351673

    SHA512

    753a6da5d6889dd52f40208e37f2b8c185805ef81148682b269fff5aa84a46d710fe0ebfe05bce625da2e801e1c26745998a41266fa36bf47bc088a224d730cc

  • \Users\Admin\AppData\Local\Temp\697c71ffceec34fafacc4a15b6f4a85b137d0eb1cd7411f550d783cbd61a2c53mgr.exe

    Filesize

    105KB

    MD5

    d5ca6e1f080abc64bbb11e098acbeabb

    SHA1

    1849634bf5a65e1baddddd4452c99dfa003e2647

    SHA256

    30193b5ccf8a1834eac3502ef165350ab74b107451145f3d2937fdf24b9eceae

    SHA512

    aa57ce51de38af6212d7339c4baac543a54b0f527621b0ef9e78eca5e5699e8508a154f54f8ac04135527d8417275eeee72a502a362547575699330cc756b161

  • memory/2756-10-0x0000000000410000-0x000000000046D000-memory.dmp

    Filesize

    372KB

  • memory/2756-9-0x0000000010000000-0x000000001004C000-memory.dmp

    Filesize

    304KB

  • memory/2756-496-0x0000000010000000-0x000000001004C000-memory.dmp

    Filesize

    304KB

  • memory/2756-12-0x0000000000270000-0x0000000000276000-memory.dmp

    Filesize

    24KB

  • memory/2756-0-0x0000000010000000-0x000000001004C000-memory.dmp

    Filesize

    304KB

  • memory/2824-17-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2824-16-0x00000000002B0000-0x00000000002B1000-memory.dmp

    Filesize

    4KB

  • memory/2824-14-0x00000000002A0000-0x00000000002A1000-memory.dmp

    Filesize

    4KB

  • memory/2824-15-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2824-21-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2824-11-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2824-13-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB