Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    01/03/2024, 21:28

General

  • Target

    The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.dll

  • Size

    628KB

  • MD5

    97a26d9e3598fea2e1715c6c77b645c2

  • SHA1

    c4bf3a00c9223201aa11178d0f0b53c761a551c4

  • SHA256

    e5df93c0fedca105218296cbfc083bdc535ca99862f10d21a179213203d6794f

  • SHA512

    acfec633714f72bd5c39f16f10e39e88b5c1cf0adab7154891a383912852f92d3415b0b2d874a8f8f3166879e63796a8ed25ee750c6e4be09a4dddd8c849920c

  • SSDEEP

    12288:2oXYZawPO7urFw4HLLDOeLSwg4ULeHOuCqA8:2oXYFIuh5HjhSwiJ8

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Banking-Malware\Dridex\Trojan.Dridex.A.dll,#1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2604
  • C:\Windows\system32\ddodiag.exe
    C:\Windows\system32\ddodiag.exe
    1⤵
      PID:2444
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\6Bumfn.cmd
      1⤵
        PID:2532
      • C:\Windows\system32\TpmInit.exe
        C:\Windows\system32\TpmInit.exe
        1⤵
          PID:2300
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\HeD6Rd.cmd
          1⤵
          • Drops file in System32 directory
          PID:1564
        • C:\Windows\System32\eventvwr.exe
          "C:\Windows\System32\eventvwr.exe"
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:2196
          • C:\Windows\system32\cmd.exe
            "C:\Windows\system32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\pFPKOn3.cmd
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:304
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /Create /F /TN "Kbysivkqsduf" /TR C:\Windows\system32\czmG\TpmInit.exe /SC minute /MO 60 /RL highest
              3⤵
              • Creates scheduled task(s)
              PID:1672
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Kbysivkqsduf"
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:592
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /Query /TN "Kbysivkqsduf"
            2⤵
              PID:984
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Kbysivkqsduf"
            1⤵
            • Suspicious use of WriteProcessMemory
            PID:1280
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /Query /TN "Kbysivkqsduf"
              2⤵
                PID:3052
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Kbysivkqsduf"
              1⤵
              • Suspicious use of WriteProcessMemory
              PID:2772
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /Query /TN "Kbysivkqsduf"
                2⤵
                  PID:2144
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Kbysivkqsduf"
                1⤵
                • Suspicious use of WriteProcessMemory
                PID:2368
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /Query /TN "Kbysivkqsduf"
                  2⤵
                    PID:2692
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Kbysivkqsduf"
                  1⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2880
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /Query /TN "Kbysivkqsduf"
                    2⤵
                      PID:1716
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Kbysivkqsduf"
                    1⤵
                    • Suspicious use of WriteProcessMemory
                    PID:2224
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /Query /TN "Kbysivkqsduf"
                      2⤵
                        PID:1260

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\6Bumfn.cmd

                      Filesize

                      227B

                      MD5

                      b9fbe1a21e51efc7357d544475f8f1aa

                      SHA1

                      29304b6a48e652403394847cce408b5da9d2ed5e

                      SHA256

                      43c256222050a353a8171328c9568cfab52e9281b5cece7bcee22e377ebde8dc

                      SHA512

                      b43d3e89176beb139660df5d66531bbcc464a49c220ca1094606739b493a7ef7009e140b8580f599a0ac363406c9115851dde3b0302f8c4805e4454de3c41406

                    • C:\Users\Admin\AppData\Local\Temp\Gw59ED0.tmp

                      Filesize

                      628KB

                      MD5

                      250a8587e787ab4dbf1a453d454737fe

                      SHA1

                      ec150c650a4117d26907782623d011c54a59489a

                      SHA256

                      91ce9d97e065418190e68f34b80746bd01d9f09eb522c410224fbb04f2b7ba01

                      SHA512

                      fd572c861df476665843612943e7cf8527e0589828a4c00bc15074367909e242660cfd7a36108cfb47e18840e42aeed871bad916fecc8b881ac5655c5d04a0ed

                    • C:\Users\Admin\AppData\Local\Temp\HeD6Rd.cmd

                      Filesize

                      195B

                      MD5

                      448a3586e2920d3c0a0a27aad4bd0ca5

                      SHA1

                      591833b78accbe835e2ae01dca54353e0e056369

                      SHA256

                      5cb2b71684578f0832150715aa822271be707d7620194255debb7a0ac97284a0

                      SHA512

                      8413f6cd30c00d85b0afde089fe4bea3d8cc8ebe30754c17e703c7faa0a473d393f16480494d825893a11da7bbe6504763786277d11ad08862225ed295c98704

                    • C:\Users\Admin\AppData\Local\Temp\pFPKOn3.cmd

                      Filesize

                      128B

                      MD5

                      37525b7bfc328391c225bf1931e26833

                      SHA1

                      0b3b8e38a18f138b2c2b9b744d15c0f7d58cf62e

                      SHA256

                      6242f44908e1d7cefb13723ab789aa2fd9b9112fd5fba227c9ffcbbe9c6a558e

                      SHA512

                      48f1d152812f2bf35421cac1976567ee0f877bde497403b0bee3bc1b898cfa08de97789bd7d006f55a5f00148652f3b33ae5141ee1431eae0ce0516935e4b038

                    • C:\Users\Admin\AppData\Local\Temp\sQY7733.tmp

                      Filesize

                      628KB

                      MD5

                      19dc7c3f06b45389aa30adb00e549d2c

                      SHA1

                      3b0c8cdadc74bffdb1ecd28e49f280b88cf87e2e

                      SHA256

                      b928af65575873b50a2f9338d1446764399284364cdd1e938b7bb1f91ed7e134

                      SHA512

                      75be9db0aca55edd9929574625a88d6751fea075b55c32608bb6a9720e8ba21990a376c977fdb8a6cfcdfc3052f9502701214cd71ae7725a74094c133106ab00

                    • C:\Users\Admin\AppData\Roaming\GFXS\ddodiag.exe

                      Filesize

                      42KB

                      MD5

                      509f9513ca16ba2f2047f5227a05d1a8

                      SHA1

                      fe8d63259cb9afa17da7b7b8ede4e75081071b1a

                      SHA256

                      ddf48c333e45c56c9e3f16e492c023bf138629f4c093b8aaab8ea60310c8c96e

                      SHA512

                      ad3168767e5eba575ae766e1e2923b1db4571bbeb302d7c58e8023612e33913dcd9e5f4a4c1bc7b1556442a0807117066f17c62b38fe2ae0dfaa3817b7318862

                    • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Ydmmtcuy.lnk

                      Filesize

                      870B

                      MD5

                      3c680f6a60d93078d62f079bbb331d2b

                      SHA1

                      fda164a2386875f6e635d14b9bf043751c60b52a

                      SHA256

                      7706f7d677938b1dc96203e6547132992b1303e780080713c597f2f4650f4725

                      SHA512

                      216fe86162fd099c1b5680bcc6eef11640586bf04d03266d0c0d2592511d74000bf0a36ecd65aaccf4c9262e3e85694ba32049be34d7b032819af1ce6d0f5321

                    • memory/1132-9-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1132-33-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1132-7-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1132-12-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1132-13-0x00000000024D0000-0x00000000024D7000-memory.dmp

                      Filesize

                      28KB

                    • memory/1132-14-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1132-15-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1132-21-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1132-22-0x0000000077751000-0x0000000077752000-memory.dmp

                      Filesize

                      4KB

                    • memory/1132-23-0x00000000778B0000-0x00000000778B2000-memory.dmp

                      Filesize

                      8KB

                    • memory/1132-32-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1132-8-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1132-37-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1132-36-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1132-3-0x0000000077646000-0x0000000077647000-memory.dmp

                      Filesize

                      4KB

                    • memory/1132-11-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1132-10-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1132-53-0x0000000077646000-0x0000000077647000-memory.dmp

                      Filesize

                      4KB

                    • memory/1132-4-0x00000000024F0000-0x00000000024F1000-memory.dmp

                      Filesize

                      4KB

                    • memory/2604-6-0x000007FEF75F0000-0x000007FEF768D000-memory.dmp

                      Filesize

                      628KB

                    • memory/2604-2-0x0000000000190000-0x0000000000197000-memory.dmp

                      Filesize

                      28KB

                    • memory/2604-0-0x000007FEF75F0000-0x000007FEF768D000-memory.dmp

                      Filesize

                      628KB