top title background image
flash

Dridex-06-bc1b.xlsm

Status: finished
Submission Time: 2021-01-26 16:08:48 +01:00
Malicious
Exploiter
Evader
Hidden Macro 4.0

Comments

Tags

Details

  • Analysis ID:
    344478
  • API (Web) ID:
    590861
  • Analysis Started:
    2021-01-26 16:15:51 +01:00
  • Analysis Finished:
    2021-01-26 16:42:59 +01:00
  • MD5:
    f72f88ebdf048fdfedf0aa3e298d9e71
  • SHA1:
    b8ea58415338bed65d4cd194ead6ac663ad71a6c
  • SHA256:
    78ccf25ecee02f759cefa6b1c29a00fb4ce64c000f7b9c04c1fc08e04d04bc1b
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
Score: 92
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
malicious
Score: 80
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run Condition: Potential for more IOCs and behavior
malicious
Score: 64
System: Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
Run Condition: Without Instrumentation

Third Party Analysis Engines

malicious
Score: 33/65
malicious
Score: 17/29
malicious

IPs

IP Country Detection
199.192.21.36
United States

Domains

Name IP Detection
compagniamaestro.com
199.192.21.36

URLs

Name Detection
https://crbug.com/740629)
https://github.com/google/closure-compiler/issues/544
http://servername/isapibackend.dll

Dropped files

Name File Type Hashes Detection
C:\LO400F\PI909U\960
HTML document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
#
C:\Users\user\Desktop\~$Dridex-06-bc1b.xlsm
data
#
C:\QP101F\TL941X\960
HTML document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
#
Click to see the 13 hidden entries
C:\SD120E\EP146E\960
HTML document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, 58936 bytes, 1 file
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
#
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E0F5C59F9FA661F6F4C50B87FEF3A15A
data
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ZAE7RW1P\MAS3QXWU.htm
HTML document, UTF-8 Unicode text, with very long lines, with CRLF line terminators
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\841CAADE.emf
Windows Enhanced Metafile (EMF) image data version 0x10000
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D1372147.png
PNG image data, 650 x 85, 8-bit colormap, non-interlaced
#
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\D6FDFA9C.png
PNG image data, 415 x 291, 8-bit colormap, non-interlaced
#
C:\Users\user\AppData\Local\Temp\9DFE0000
data
#
C:\Users\user\AppData\Local\Temp\CabF70C.tmp
Microsoft Cabinet archive data, 58936 bytes, 1 file
#
C:\Users\user\AppData\Local\Temp\Excel8.0\MSForms.exd
data
#
C:\Users\user\AppData\Local\Temp\TarF70D.tmp
data
#