Malware Journey Day 17

Nick Mckenney
3 min readDec 24, 2023

--

All credit goes to

https://exploitreversing.files.wordpress.com/2023/03/mas_7.pdf

This blog is for me, I need to get a solid triage process to unpack other samples.

Lets start with a Dridex loader

From Malware Bazaar report I find it is using WriteProcessMemory and AdjustPrivledgeToken win APIs

1st Command

malwoverview.py -b 1 -B 87e2dad373f75f5c0a200821523aebe45f6f4103b51fb0155ed2bf060ec50b04 -o 0

WriteProcessMemory is usually used for injection

I use PEBear first to inspect the libraries

Interestly enough I dont see WriteProcessMemory anywhere in Kernel32.dll

My second thought is maybe the dll is packed.

But memory section maps and disk section maps are aligned

It appears an easy way to unpack this sample is through malwoverview.py and follow the unpac.me link

It appears here I have the file unpacked. Lets download the largest sample.

I see lots more functions as well. LoadLibraryA tells me this is a process injection possibly.

Unsure what mshtmled.dll is

When running this process, I will keep an eye out for IE or other office documents.

Next it is time for capa.exe

capa.exe .mas7.bin

— — -

malwoverview.py -b 7 -B 87e2dad373f75f5c0a200821523aebe45f6f4103b51fb0155ed2bf060ec50b04 -o 0

Placing my sample in HxD I can confirm I see multiple sections which is a good indication of an unpacked sample

Towards more of the writeup I was following the sub routinue naming became difficult to follow since I was dealing with a different sample. Stopping the blog here for now and going to complete the reading

--

--

No responses yet