Analysis

  • max time kernel
    151s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    03-03-2024 03:21

General

  • Target

    The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.dll

  • Size

    628KB

  • MD5

    97a26d9e3598fea2e1715c6c77b645c2

  • SHA1

    c4bf3a00c9223201aa11178d0f0b53c761a551c4

  • SHA256

    e5df93c0fedca105218296cbfc083bdc535ca99862f10d21a179213203d6794f

  • SHA512

    acfec633714f72bd5c39f16f10e39e88b5c1cf0adab7154891a383912852f92d3415b0b2d874a8f8f3166879e63796a8ed25ee750c6e4be09a4dddd8c849920c

  • SSDEEP

    12288:2oXYZawPO7urFw4HLLDOeLSwg4ULeHOuCqA8:2oXYFIuh5HjhSwiJ8

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Banking-Malware\Dridex\Trojan.Dridex.A.dll,#1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2164
  • C:\Windows\system32\cmstp.exe
    C:\Windows\system32\cmstp.exe
    1⤵
      PID:2520
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\sNLFb.cmd
      1⤵
        PID:2488
      • C:\Windows\system32\tabcal.exe
        C:\Windows\system32\tabcal.exe
        1⤵
          PID:2532
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\xPEBc.cmd
          1⤵
          • Drops file in System32 directory
          PID:1552
        • C:\Windows\System32\eventvwr.exe
          "C:\Windows\System32\eventvwr.exe"
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:2436
          • C:\Windows\system32\cmd.exe
            "C:\Windows\system32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\4sao8f.cmd
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2880
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /Create /F /TN "Kzcfjezwvyzrv" /TR C:\Windows\system32\OKVndd\tabcal.exe /SC minute /MO 60 /RL highest
              3⤵
              • Creates scheduled task(s)
              PID:1492
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Kzcfjezwvyzrv"
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:2588
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /Query /TN "Kzcfjezwvyzrv"
            2⤵
              PID:2624
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Kzcfjezwvyzrv"
            1⤵
            • Suspicious use of WriteProcessMemory
            PID:1888
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /Query /TN "Kzcfjezwvyzrv"
              2⤵
                PID:1780
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Kzcfjezwvyzrv"
              1⤵
              • Suspicious use of WriteProcessMemory
              PID:2200
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /Query /TN "Kzcfjezwvyzrv"
                2⤵
                  PID:320
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Kzcfjezwvyzrv"
                1⤵
                • Suspicious use of WriteProcessMemory
                PID:532
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /Query /TN "Kzcfjezwvyzrv"
                  2⤵
                    PID:636
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Kzcfjezwvyzrv"
                  1⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1692
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /Query /TN "Kzcfjezwvyzrv"
                    2⤵
                      PID:792
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Kzcfjezwvyzrv"
                    1⤵
                    • Suspicious use of WriteProcessMemory
                    PID:652
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /Query /TN "Kzcfjezwvyzrv"
                      2⤵
                        PID:1744

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\4sao8f.cmd

                      Filesize

                      130B

                      MD5

                      7eb32d019cd6f38c53cd7bf47c0af28a

                      SHA1

                      d297168cb5b823c562eee74e893041ee285fa08e

                      SHA256

                      1fa20edfae8de38d199752c24c3791ea8f1e26b031b18d84f97bee7d8d4e167c

                      SHA512

                      bcdd4f33283dfdbe9c79e901d1904b9ebe9b7bf1f68f9c3d7d15ce51483fd95d214b77458276c7d9cc2b0e4f1ca8b02f29ac1c8b72822a22c5110bb5470a13dd

                    • C:\Users\Admin\AppData\Local\Temp\lAB2E.tmp

                      Filesize

                      628KB

                      MD5

                      9039708e61bec3074882bad626aa6b81

                      SHA1

                      6c936139209d3f1b6894ea2a6990bdc0fe7c2357

                      SHA256

                      e216cc8468e908eaa2b6488220dc033063f66afb44bac90c309941485ad4eec5

                      SHA512

                      673cb9047d412455e9561e67cc64f9a3f1e452db8a623e03f92cd24b23fd58d20453421b694dd5285fd0ed502d06bb5d27943debf298e96c836de66a6446742f

                    • C:\Users\Admin\AppData\Local\Temp\sNLFb.cmd

                      Filesize

                      234B

                      MD5

                      9fe83f1e74ffb2a07a693aa9e0b31faf

                      SHA1

                      c19c2b033960aebce8341a833c7347abca0b235d

                      SHA256

                      88a65f58b7149dd119e04e9e677b0c224bde9f86f31d69f452915a7adab86c65

                      SHA512

                      8389ff83f8ca6cc2dbcd3fed44046a937c5c5b8fde13087d51f248bbd18bff85dfdebdd3dab8beb19a1135784b28de75143b0f450bf20bb0cc7da815fad61be4

                    • C:\Users\Admin\AppData\Local\Temp\vWm8324.tmp

                      Filesize

                      628KB

                      MD5

                      cba75e5c75a33b45c03f01bba034db9b

                      SHA1

                      2380fd4c3f7b8a29f64db0ad9d1c9a9e42473d1f

                      SHA256

                      88596ae69da2120419ab276b9b4d4376e0b02f85332e4f79ab9154bb3e049c45

                      SHA512

                      68f5dc79f374a64c61ca8382fff96ee14f3c7f6d242c39e429b28860a3605c948993fa47bd3acf9724fc3a93d887a1cf4429262cd156b3ff3af423323591db08

                    • C:\Users\Admin\AppData\Local\Temp\xPEBc.cmd

                      Filesize

                      193B

                      MD5

                      9a8235f4ee98c494dcd87a7ec8934ff3

                      SHA1

                      f3ac3c3c33e731dc45ec7c94f57c60267e3b1bf5

                      SHA256

                      d52b17ecd99629fed01ac2820a76128e5114efc601f9727566f24a96ce44f2ec

                      SHA512

                      b6393a71c1979d1587adb30e0aa68e894bed10c586a90f5dced8b033b117b32c718be4f53cc6c78f1ea8684d8e55048f7ae1230ea02cb72f46515130f7172651

                    • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Yyeybzteybdsbj.lnk

                      Filesize

                      878B

                      MD5

                      e681e32afaf7554f63cc50168ee69fa5

                      SHA1

                      8c92841f587c798c0d9e77933b60c9e7c36a91d9

                      SHA256

                      df25221a05aff12c8d86ca3dffee78cc98beda00e605dad29dd337f5e5d79c99

                      SHA512

                      bd2e2da9e8189927f256dc8387e11bf66db7f733b4642a118ef2275e6b71b4041796a81b51c8a3576751ca7d711bae997bddc2faf024397733d9e804bcc076cb

                    • \Users\Admin\AppData\Roaming\PIJXL3a\cmstp.exe

                      Filesize

                      90KB

                      MD5

                      74c6da5522f420c394ae34b2d3d677e3

                      SHA1

                      ba135738ef1fb2f4c2c6c610be2c4e855a526668

                      SHA256

                      51d298b1a8a2d00d5c608c52dba0655565d021e9798ee171d7fa92cc0de729a6

                      SHA512

                      bfd76b1c3e677292748f88bf595bfef0b536eb22f2583b028cbf08f6ae4eda1aa3787c4e892aad12b7681fc2363f99250430a0e7019a7498e24db391868e787a

                    • memory/1192-9-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1192-33-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1192-12-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1192-11-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1192-15-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1192-14-0x0000000002510000-0x0000000002517000-memory.dmp

                      Filesize

                      28KB

                    • memory/1192-13-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1192-21-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1192-22-0x0000000077CF1000-0x0000000077CF2000-memory.dmp

                      Filesize

                      4KB

                    • memory/1192-23-0x0000000077E50000-0x0000000077E52000-memory.dmp

                      Filesize

                      8KB

                    • memory/1192-32-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1192-10-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1192-37-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1192-3-0x0000000077BE6000-0x0000000077BE7000-memory.dmp

                      Filesize

                      4KB

                    • memory/1192-8-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1192-7-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1192-53-0x0000000077BE6000-0x0000000077BE7000-memory.dmp

                      Filesize

                      4KB

                    • memory/1192-4-0x0000000002530000-0x0000000002531000-memory.dmp

                      Filesize

                      4KB

                    • memory/2164-6-0x000007FEF74A0000-0x000007FEF753D000-memory.dmp

                      Filesize

                      628KB

                    • memory/2164-0-0x000007FEF74A0000-0x000007FEF753D000-memory.dmp

                      Filesize

                      628KB

                    • memory/2164-1-0x0000000000400000-0x0000000000407000-memory.dmp

                      Filesize

                      28KB