Analysis Report Dridex.exe
Overview
General Information
Detection
Score: | 84 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Classification
Startup |
---|
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
No yara matches |
---|
Sigma Overview |
---|
No Sigma rule has matched |
---|
Signature Overview |
---|
Click to jump to signature section
AV Detection: |
---|
Antivirus / Scanner detection for submitted sample | Show sources |
Source: | Avira: |
Multi AV Scanner detection for submitted file | Show sources |
Source: | Virustotal: | Perma Link | ||
Source: | Metadefender: | Perma Link | ||
Source: | ReversingLabs: |
Machine Learning detection for sample | Show sources |
Source: | Joe Sandbox ML: |
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: | ||
Source: | Avira: |
Source: | Static PE information: |
Source: | Code function: | ||
Source: | Code function: |
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: | ||
Source: | TCP traffic: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | Code function: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: |
Source: | Key opened: |
Source: | Virustotal: | ||
Source: | Metadefender: | ||
Source: | ReversingLabs: |
Source: | File read: | Jump to behavior |
Source: | Process created: | ||
Source: | Process created: | ||
Source: | Process created: |
Source: | Static PE information: |
Data Obfuscation: |
---|
Detected unpacking (changes PE section rights) | Show sources |
Source: | Unpacked PE file: |
Source: | Static PE information: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Code function: |
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: |
Malware Analysis System Evasion: |
---|
Contain functionality to detect virtual machines | Show sources |
Source: | Code function: |
Tries to detect sandboxes / dynamic malware analysis system (file name check) | Show sources |
Source: | File opened: |
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: |
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: | ||
Source: | Thread sleep time: |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
Source: | Last function: |
Source: | Code function: | ||
Source: | Code function: |
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: | ||
Source: | Thread delayed: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Process information queried: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Thread injection, dropped files, key value created, disk infection and DNS query: |
HIPS / PFW / Operating System Protection Evasion: |
---|
Contains functionality to inject code into remote processes | Show sources |
Source: | Code function: |
Injects a PE file into a foreign processes | Show sources |
Source: | Memory written: |
Source: | Code function: | ||
Source: | Code function: |
Source: | Process created: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: | ||
Source: | Code function: |
Source: | Key value queried: |
Source: | Code function: |
Source: | Key value queried: |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Windows Management Instrumentation | Path Interception | Process Injection222 | Virtualization/Sandbox Evasion221 | OS Credential Dumping | System Time Discovery1 | Remote Services | Archive Collected Data1 | Exfiltration Over Other Network Medium | Encrypted Channel1 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Scheduled Task/Job | Boot or Logon Initialization Scripts | Boot or Logon Initialization Scripts | Process Injection222 | LSASS Memory | Security Software Discovery21 | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Non-Standard Port1 | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Logon Script (Windows) | Obfuscated Files or Information1 | Security Account Manager | Virtualization/Sandbox Evasion221 | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Software Packing11 | NTDS | Process Discovery3 | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | Software Packing | LSA Secrets | Application Window Discovery1 | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings | |
Replication Through Removable Media | Launchd | Rc.common | Rc.common | Steganography | Cached Domain Credentials | File and Directory Discovery1 | VNC | GUI Input Capture | Exfiltration Over C2 Channel | Multiband Communication | Jamming or Denial of Service | Abuse Accessibility Features | |
External Remote Services | Scheduled Task | Startup Items | Startup Items | Compile After Delivery | DCSync | System Information Discovery23 | Windows Remote Management | Web Portal Capture | Exfiltration Over Alternative Protocol | Commonly Used Port | Rogue Wi-Fi Access Points | Data Encrypted for Impact |
Behavior Graph |
---|
Screenshots |
---|
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Antivirus, Machine Learning and Genetic Malware Detection |
---|
Initial Sample |
---|
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
89% | Virustotal | Browse | ||
86% | Metadefender | Browse | ||
100% | ReversingLabs | Win32.Backdoor.Drixed | ||
100% | Avira | TR/Taranis.403 | ||
100% | Joe Sandbox ML |
Dropped Files |
---|
No Antivirus matches |
---|
Unpacked PE Files |
---|
Source | Detection | Scanner | Label | Link | Download |
---|---|---|---|---|---|
100% | Avira | TR/Taranis.403 | Download File | ||
100% | Avira | TR/Taranis.403 | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Taranis.403 | Download File | ||
100% | Avira | TR/Taranis.403 | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Taranis.403 | Download File | ||
100% | Avira | TR/Crypt.XPACK.Gen | Download File | ||
100% | Avira | TR/Taranis.403 | Download File |
Domains |
---|
No Antivirus matches |
---|
URLs |
---|
No Antivirus matches |
---|
Domains and IPs |
---|
Contacted Domains |
---|
No contacted domains info |
---|
Contacted IPs |
---|
- No. of IPs < 25%
- 25% < No. of IPs < 50%
- 50% < No. of IPs < 75%
- 75% < No. of IPs
Public |
---|
IP | Domain | Country | Flag | ASN | ASN Name | Malicious |
---|---|---|---|---|---|---|
103.252.100.44 | unknown | Indonesia | 59147 | IDNIC-DRUPADI-AS-IDPTDrupadiPrimaID | false | |
89.108.71.148 | unknown | Russian Federation | 43146 | AGAVA3RU | false | |
221.132.35.56 | unknown | Viet Nam | 45899 | VNPT-AS-VNVNPTCorpVN | false | |
94.73.155.12 | unknown | Turkey | 34619 | CIZGITR | false |
General Information |
---|
Joe Sandbox Version: | 31.0.0 Emerald |
Analysis ID: | 393200 |
Start date: | 20.04.2021 |
Start time: | 10:00:37 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 7m 13s |
Hypervisor based Inspection enabled: | false |
Report type: | light |
Sample file name: | Dridex.exe |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Run name: | Run with higher sleep bypass |
Number of analysed new started processes analysed: | 38 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | MAL |
Classification: | mal84.evad.winEXE@3/0@0/4 |
EGA Information: | Failed |
HDC Information: |
|
HCA Information: |
|
Cookbook Comments: |
|
Warnings: | Show All
|
Simulations |
---|
Behavior and APIs |
---|
Time | Type | Description |
---|---|---|
10:04:16 | API Interceptor |
Joe Sandbox View / Context |
---|
IPs |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
89.108.71.148 | Get hash | malicious | Browse | ||
221.132.35.56 | Get hash | malicious | Browse | ||
94.73.155.12 | Get hash | malicious | Browse |
Domains |
---|
No context |
---|
ASN |
---|
Match | Associated Sample Name / URL | SHA 256 | Detection | Link | Context |
---|---|---|---|---|---|
IDNIC-DRUPADI-AS-IDPTDrupadiPrimaID | Get hash | malicious | Browse |
| |
VNPT-AS-VNVNPTCorpVN | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
AGAVA3RU | Get hash | malicious | Browse |
| |
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
| ||
Get hash | malicious | Browse |
|
JA3 Fingerprints |
---|
No context |
---|
Dropped Files |
---|
No context |
---|
Created / dropped Files |
---|
No created / dropped files found |
---|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 7.640683635227719 |
TrID: |
|
File name: | Dridex.exe |
File size: | 176128 |
MD5: | 6e5654da58c03df6808466f0197207ed |
SHA1: | 594f33ad9d7f85625a88c24903243ba9788fba86 |
SHA256: | e30b76f9454a5fd3d11b5792ff93e56c52bf5dfba6ab375c3b96e17af562f5fc |
SHA512: | 6542a42528f11085376ba893615cd7b68b37e1c78427c678db658e6174ca8d0ac893b071aa55e8d3924a6a2235657322eadf025f10e26c4a0c9858e3c12eb264 |
SSDEEP: | 3072:qZkKstjomW1XBJqhhPQa77l79KQXF6yvf4FkbmB7VU2fMa+:zvUmgqkm9KQXF6yvwCbu7gT |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............B...B...B#..B...B)..Bj..B...B...Bj..B...B...B...BW..B9..B...B...B:..B...BW..Bi..BRich...B................PE..L...b.QV... |
File Icon |
---|
Icon Hash: | c08c6665996135a7 |
Static PE Info |
---|
General | |
---|---|
Entrypoint: | 0x402410 |
Entrypoint Section: | .text |
Digitally signed: | false |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED |
DLL Characteristics: | |
Time Stamp: | 0x5651A962 [Sun Nov 22 11:39:14 2015 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 4 |
OS Version Minor: | 0 |
File Version Major: | 4 |
File Version Minor: | 0 |
Subsystem Version Major: | 4 |
Subsystem Version Minor: | 0 |
Import Hash: | 3c0df6d8c78f9ce11bee326616d075a2 |
Entrypoint Preview |
---|
Instruction |
---|
push ebp |
mov ebp, esp |
push FFFFFFFFh |
push 00403770h |
push 00402612h |
mov eax, dword ptr fs:[00000000h] |
push eax |
mov dword ptr fs:[00000000h], esp |
sub esp, 68h |
push ebx |
push esi |
push edi |
mov dword ptr [ebp-18h], esp |
xor ebx, ebx |
mov dword ptr [ebp-04h], ebx |
push 00000002h |
call dword ptr [00403260h] |
pop ecx |
or dword ptr [00407128h], FFFFFFFFh |
or dword ptr [0040712Ch], FFFFFFFFh |
call dword ptr [00403264h] |
mov ecx, dword ptr [0040711Ch] |
mov dword ptr [eax], ecx |
call dword ptr [00403268h] |
mov ecx, dword ptr [00407118h] |
mov dword ptr [eax], ecx |
mov eax, dword ptr [0040326Ch] |
mov eax, dword ptr [eax] |
mov dword ptr [00407124h], eax |
call 00007FBD588A11F7h |
cmp dword ptr [00406FD0h], ebx |
jne 00007FBD588A106Eh |
push 0040260Eh |
call dword ptr [00403270h] |
pop ecx |
call 00007FBD588A11C9h |
push 00405028h |
push 00405024h |
call 00007FBD588A11B4h |
mov eax, dword ptr [00407114h] |
mov dword ptr [ebp-6Ch], eax |
lea eax, dword ptr [ebp-6Ch] |
push eax |
push dword ptr [00407110h] |
lea eax, dword ptr [ebp-64h] |
push eax |
lea eax, dword ptr [ebp-70h] |
push eax |
lea eax, dword ptr [ebp-60h] |
push eax |
call dword ptr [00403278h] |
push 00405020h |
push 00405000h |
call 00007FBD588A1181h |
Rich Headers |
---|
Programming Language: |
|
Data Directories |
---|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x1000 | 0x10 | .text |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x3980 | 0xa0 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x8000 | 0x23e9c | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0xa000 | 0x22 | .rsrc |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0x3000 | 0x2f0 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Sections |
---|
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0x1850 | 0x2000 | False | 0.381591796875 | data | 4.8857712628 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
.rdata | 0x3000 | 0x1148 | 0x2000 | False | 0.22705078125 | data | 3.18379463097 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
.data | 0x5000 | 0x2130 | 0x2000 | False | 0.441162109375 | data | 4.29630200062 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
.rsrc | 0x8000 | 0x23e9c | 0x24000 | False | 0.962103949653 | data | 7.93888068706 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
Imports |
---|
DLL | Import |
---|---|
MFC42.DLL | |
MSVCRT.dll | _controlfp, _onexit, __dllonexit, _except_handler3, __set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, _acmdln, _setmbcp, __CxxFrameHandler, strtol, _exit, _XcptFilter, exit |
KERNEL32.dll | FindNextFileW, GetTimeZoneInformation, ExitProcess, GetModuleFileNameA, FlushFileBuffers, SetStdHandle, HeapDestroy, FindFirstFileA, HeapReAlloc, GetDateFormatA, GetEnvironmentStrings, GetACP, GetCommandLineA, GetModuleHandleA, GetStartupInfoA, GetLocaleInfoW, CreateFileW, MapViewOfFile, GetOEMCP, CreateFileA, GetModuleFileNameW |
USER32.dll | IsIconic, GetCaretBlinkTime, ShowWindow, UpdateWindow, GetCursorPos, PeekMessageW, RegisterClipboardFormatW, GetSystemMetrics, HideCaret, GetSystemMenu, AppendMenuA, SendMessageA, LoadIconA, MessageBoxIndirectA, GetDesktopWindow, DrawIcon, EnableWindow, GetClientRect |
GDI32.dll | GetCharABCWidthsFloatA, CreateCompatibleDC |
ADVAPI32.dll | RegDeleteKeyW |
OLEAUT32.dll | VariantClear |
Network Behavior |
---|
Snort IDS Alerts |
---|
Timestamp | Protocol | SID | Message | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|---|---|---|
04/20/21-09:53:56.512323 | ICMP | 384 | ICMP PING | 192.168.2.6 | 205.185.216.42 | ||
04/20/21-09:53:56.548392 | ICMP | 449 | ICMP Time-To-Live Exceeded in Transit | 84.17.52.126 | 192.168.2.6 | ||
04/20/21-09:53:56.548789 | ICMP | 384 | ICMP PING | 192.168.2.6 | 205.185.216.42 | ||
04/20/21-09:53:56.585493 | ICMP | 449 | ICMP Time-To-Live Exceeded in Transit | 5.56.20.161 | 192.168.2.6 | ||
04/20/21-09:53:56.585894 | ICMP | 384 | ICMP PING | 192.168.2.6 | 205.185.216.42 | ||
04/20/21-09:53:56.632458 | ICMP | 449 | ICMP Time-To-Live Exceeded in Transit | 81.95.2.138 | 192.168.2.6 | ||
04/20/21-09:53:56.634351 | ICMP | 384 | ICMP PING | 192.168.2.6 | 205.185.216.42 | ||
04/20/21-09:53:56.684778 | ICMP | 449 | ICMP Time-To-Live Exceeded in Transit | 151.139.80.6 | 192.168.2.6 | ||
04/20/21-09:53:56.686368 | ICMP | 384 | ICMP PING | 192.168.2.6 | 205.185.216.42 | ||
04/20/21-09:53:56.736294 | ICMP | 449 | ICMP Time-To-Live Exceeded in Transit | 151.139.80.13 | 192.168.2.6 | ||
04/20/21-09:53:56.736727 | ICMP | 384 | ICMP PING | 192.168.2.6 | 205.185.216.42 | ||
04/20/21-09:53:56.786580 | ICMP | 408 | ICMP Echo Reply | 205.185.216.42 | 192.168.2.6 |
Network Port Distribution |
---|
TCP Packets |
---|
Timestamp | Source Port | Dest Port | Source IP | Dest IP |
---|---|---|---|---|
Apr 20, 2021 10:03:56.292613029 CEST | 49713 | 2448 | 192.168.2.3 | 94.73.155.12 |
Apr 20, 2021 10:03:59.285557985 CEST | 49713 | 2448 | 192.168.2.3 | 94.73.155.12 |
Apr 20, 2021 10:04:05.301655054 CEST | 49713 | 2448 | 192.168.2.3 | 94.73.155.12 |
Apr 20, 2021 10:04:18.342212915 CEST | 49723 | 4493 | 192.168.2.3 | 103.252.100.44 |
Apr 20, 2021 10:04:18.568540096 CEST | 4493 | 49723 | 103.252.100.44 | 192.168.2.3 |
Apr 20, 2021 10:04:19.084112883 CEST | 49723 | 4493 | 192.168.2.3 | 103.252.100.44 |
Apr 20, 2021 10:04:19.307770014 CEST | 4493 | 49723 | 103.252.100.44 | 192.168.2.3 |
Apr 20, 2021 10:04:19.818506002 CEST | 49723 | 4493 | 192.168.2.3 | 103.252.100.44 |
Apr 20, 2021 10:04:20.042088032 CEST | 4493 | 49723 | 103.252.100.44 | 192.168.2.3 |
Apr 20, 2021 10:04:21.064090014 CEST | 49726 | 8843 | 192.168.2.3 | 89.108.71.148 |
Apr 20, 2021 10:04:21.147289038 CEST | 8843 | 49726 | 89.108.71.148 | 192.168.2.3 |
Apr 20, 2021 10:04:21.662472963 CEST | 49726 | 8843 | 192.168.2.3 | 89.108.71.148 |
Apr 20, 2021 10:04:21.751689911 CEST | 8843 | 49726 | 89.108.71.148 | 192.168.2.3 |
Apr 20, 2021 10:04:22.256321907 CEST | 49726 | 8843 | 192.168.2.3 | 89.108.71.148 |
Apr 20, 2021 10:04:22.338612080 CEST | 8843 | 49726 | 89.108.71.148 | 192.168.2.3 |
Apr 20, 2021 10:04:23.359273911 CEST | 49729 | 8843 | 192.168.2.3 | 221.132.35.56 |
Apr 20, 2021 10:04:26.380806923 CEST | 49729 | 8843 | 192.168.2.3 | 221.132.35.56 |
Apr 20, 2021 10:04:32.382071972 CEST | 49729 | 8843 | 192.168.2.3 | 221.132.35.56 |
Apr 20, 2021 10:04:46.302922010 CEST | 49732 | 2448 | 192.168.2.3 | 94.73.155.12 |
Apr 20, 2021 10:04:49.414755106 CEST | 49732 | 2448 | 192.168.2.3 | 94.73.155.12 |
Apr 20, 2021 10:04:55.415363073 CEST | 49732 | 2448 | 192.168.2.3 | 94.73.155.12 |
Apr 20, 2021 10:05:08.458399057 CEST | 49742 | 4493 | 192.168.2.3 | 103.252.100.44 |
Apr 20, 2021 10:05:08.683224916 CEST | 4493 | 49742 | 103.252.100.44 | 192.168.2.3 |
Apr 20, 2021 10:05:09.197618008 CEST | 49742 | 4493 | 192.168.2.3 | 103.252.100.44 |
Apr 20, 2021 10:05:09.421516895 CEST | 4493 | 49742 | 103.252.100.44 | 192.168.2.3 |
Apr 20, 2021 10:05:09.932132959 CEST | 49742 | 4493 | 192.168.2.3 | 103.252.100.44 |
Apr 20, 2021 10:05:10.157634974 CEST | 4493 | 49742 | 103.252.100.44 | 192.168.2.3 |
Apr 20, 2021 10:05:11.182188034 CEST | 49743 | 8843 | 192.168.2.3 | 89.108.71.148 |
Apr 20, 2021 10:05:11.262833118 CEST | 8843 | 49743 | 89.108.71.148 | 192.168.2.3 |
Apr 20, 2021 10:05:11.775959969 CEST | 49743 | 8843 | 192.168.2.3 | 89.108.71.148 |
Apr 20, 2021 10:05:11.858793974 CEST | 8843 | 49743 | 89.108.71.148 | 192.168.2.3 |
Apr 20, 2021 10:05:12.370151043 CEST | 49743 | 8843 | 192.168.2.3 | 89.108.71.148 |
Apr 20, 2021 10:05:12.450613022 CEST | 8843 | 49743 | 89.108.71.148 | 192.168.2.3 |
Apr 20, 2021 10:05:13.468441010 CEST | 49744 | 8843 | 192.168.2.3 | 221.132.35.56 |
Apr 20, 2021 10:05:16.479630947 CEST | 49744 | 8843 | 192.168.2.3 | 221.132.35.56 |
Apr 20, 2021 10:05:22.496309042 CEST | 49744 | 8843 | 192.168.2.3 | 221.132.35.56 |
Apr 20, 2021 10:05:35.533082008 CEST | 49745 | 2448 | 192.168.2.3 | 94.73.155.12 |
Apr 20, 2021 10:05:38.543840885 CEST | 49745 | 2448 | 192.168.2.3 | 94.73.155.12 |
Apr 20, 2021 10:05:44.544382095 CEST | 49745 | 2448 | 192.168.2.3 | 94.73.155.12 |
Apr 20, 2021 10:05:57.566203117 CEST | 49749 | 4493 | 192.168.2.3 | 103.252.100.44 |
Apr 20, 2021 10:05:57.784306049 CEST | 4493 | 49749 | 103.252.100.44 | 192.168.2.3 |
Apr 20, 2021 10:05:58.295567036 CEST | 49749 | 4493 | 192.168.2.3 | 103.252.100.44 |
Apr 20, 2021 10:05:58.515402079 CEST | 4493 | 49749 | 103.252.100.44 | 192.168.2.3 |
Apr 20, 2021 10:05:59.029887915 CEST | 49749 | 4493 | 192.168.2.3 | 103.252.100.44 |
Apr 20, 2021 10:05:59.247181892 CEST | 4493 | 49749 | 103.252.100.44 | 192.168.2.3 |
Apr 20, 2021 10:06:00.269778013 CEST | 49750 | 8843 | 192.168.2.3 | 89.108.71.148 |
Apr 20, 2021 10:06:00.351015091 CEST | 8843 | 49750 | 89.108.71.148 | 192.168.2.3 |
Apr 20, 2021 10:06:00.858256102 CEST | 49750 | 8843 | 192.168.2.3 | 89.108.71.148 |
Apr 20, 2021 10:06:00.939048052 CEST | 8843 | 49750 | 89.108.71.148 | 192.168.2.3 |
Apr 20, 2021 10:06:01.452007055 CEST | 49750 | 8843 | 192.168.2.3 | 89.108.71.148 |
Apr 20, 2021 10:06:01.534965038 CEST | 8843 | 49750 | 89.108.71.148 | 192.168.2.3 |
Apr 20, 2021 10:06:02.551201105 CEST | 49751 | 8843 | 192.168.2.3 | 221.132.35.56 |
Apr 20, 2021 10:06:05.561764956 CEST | 49751 | 8843 | 192.168.2.3 | 221.132.35.56 |
Apr 20, 2021 10:06:11.577871084 CEST | 49751 | 8843 | 192.168.2.3 | 221.132.35.56 |
Apr 20, 2021 10:06:24.615189075 CEST | 49752 | 2448 | 192.168.2.3 | 94.73.155.12 |
Apr 20, 2021 10:06:27.626169920 CEST | 49752 | 2448 | 192.168.2.3 | 94.73.155.12 |
Apr 20, 2021 10:06:33.626544952 CEST | 49752 | 2448 | 192.168.2.3 | 94.73.155.12 |
Apr 20, 2021 10:06:46.657027960 CEST | 49763 | 4493 | 192.168.2.3 | 103.252.100.44 |
Apr 20, 2021 10:06:46.883133888 CEST | 4493 | 49763 | 103.252.100.44 | 192.168.2.3 |
Apr 20, 2021 10:06:47.386786938 CEST | 49763 | 4493 | 192.168.2.3 | 103.252.100.44 |
Apr 20, 2021 10:06:47.612837076 CEST | 4493 | 49763 | 103.252.100.44 | 192.168.2.3 |
Apr 20, 2021 10:06:48.128803968 CEST | 49763 | 4493 | 192.168.2.3 | 103.252.100.44 |
Apr 20, 2021 10:06:48.354705095 CEST | 4493 | 49763 | 103.252.100.44 | 192.168.2.3 |
Apr 20, 2021 10:06:50.473021030 CEST | 49764 | 8843 | 192.168.2.3 | 89.108.71.148 |
Apr 20, 2021 10:06:50.553571939 CEST | 8843 | 49764 | 89.108.71.148 | 192.168.2.3 |
Apr 20, 2021 10:06:51.136691093 CEST | 49764 | 8843 | 192.168.2.3 | 89.108.71.148 |
Apr 20, 2021 10:06:51.217472076 CEST | 8843 | 49764 | 89.108.71.148 | 192.168.2.3 |
Apr 20, 2021 10:06:51.887130976 CEST | 49764 | 8843 | 192.168.2.3 | 89.108.71.148 |
Apr 20, 2021 10:06:51.967732906 CEST | 8843 | 49764 | 89.108.71.148 | 192.168.2.3 |
Apr 20, 2021 10:06:52.986123085 CEST | 49765 | 8843 | 192.168.2.3 | 221.132.35.56 |
Apr 20, 2021 10:06:55.996977091 CEST | 49765 | 8843 | 192.168.2.3 | 221.132.35.56 |
Code Manipulations |
---|
Statistics |
---|
Behavior |
---|
Click to jump to process
System Behavior |
---|
General |
---|
Start time: | 10:03:51 |
Start date: | 20/04/2021 |
Path: | C:\Users\user\Desktop\Dridex.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 176128 bytes |
MD5 hash: | 6E5654DA58C03DF6808466F0197207ED |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
General |
---|
Start time: | 10:03:52 |
Start date: | 20/04/2021 |
Path: | C:\Users\user\Desktop\Dridex.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x400000 |
File size: | 176128 bytes |
MD5 hash: | 6E5654DA58C03DF6808466F0197207ED |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
Disassembly |
---|
Code Analysis |
---|