Overview
overview
10Static
static
10The-MALWAR...ot.exe
windows10-2004-x64
10The-MALWAR...ll.exe
windows10-2004-x64
10The-MALWAR...BS.exe
windows10-2004-x64
10The-MALWAR...in.exe
windows10-2004-x64
7The-MALWAR....A.exe
windows10-2004-x64
7The-MALWAR....A.exe
windows10-2004-x64
10The-MALWAR....A.dll
windows10-2004-x64
6The-MALWAR...r.xlsm
windows10-2004-x64
10The-MALWAR...36c859
windows10-2004-x64
1The-MALWAR...caa742
windows10-2004-x64
1The-MALWAR...c1a732
windows10-2004-x64
1The-MALWAR...57c046
windows10-2004-x64
1The-MALWAR...4cde86
windows10-2004-x64
1The-MALWAR...460a01
windows10-2004-x64
1The-MALWAR...ece0c5
windows10-2004-x64
1The-MALWAR...257619
windows10-2004-x64
1The-MALWAR...fbcc59
windows10-2004-x64
1The-MALWAR...54f69c
windows10-2004-x64
1The-MALWAR...d539a6
windows10-2004-x64
1The-MALWAR...4996dd
windows10-2004-x64
1The-MALWAR...8232d5
windows10-2004-x64
1The-MALWAR...66b948
windows10-2004-x64
1The-MALWAR...f9db86
windows10-2004-x64
1The-MALWAR...ea2485
windows10-2004-x64
1The-MALWAR...us.exe
windows10-2004-x64
6The-MALWAR....a.exe
windows10-2004-x64
1The-MALWAR....a.exe
windows10-2004-x64
7The-MALWAR...ok.exe
windows10-2004-x64
1The-MALWAR...y.html
windows10-2004-x64
1The-MALWAR...ft.exe
windows10-2004-x64
4The-MALWAR...en.exe
windows10-2004-x64
6The-MALWAR...min.js
windows10-2004-x64
1Resubmissions
29-04-2024 17:56
240429-wjgllsgg29 1017-04-2024 14:59
240417-sc15wsef8y 1016-04-2024 14:20
240416-rnxq6sdg3t 10Analysis
-
max time kernel
181s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
17-04-2024 14:59
Static task
static1
Behavioral task
behavioral1
Sample
The-MALWARE-Repo-master/Banking-Malware/DanaBot.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Dridex.JhiSharp.dll.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/DridexDroppedVBS.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral4
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/DridexLoader.bin.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral6
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral7
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.dll
Resource
win10v2004-20240412-en
Behavioral task
behavioral8
Sample
The-MALWARE-Repo-master/Banking-Malware/Zloader.xlsm
Resource
win10v2004-20240412-en
Behavioral task
behavioral9
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/001eb377f0452060012124cb214f658754c7488ccb82e23ec56b2f45a636c859
Resource
win10v2004-20240412-en
Behavioral task
behavioral10
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/041bc20ca8ac3161098cbc976e67e3c0f1b672ad36ecbe22fd21cbd53bcaa742
Resource
win10v2004-20240412-en
Behavioral task
behavioral11
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/0ab8836efcaa62c7daac314e0b7ab1679319b2901578fd9e95ec3476b4c1a732
Resource
win10v2004-20240412-en
Behavioral task
behavioral12
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/103b8404dc64c9a44511675981a09fd01395ee837452d114f1350c295357c046
Resource
win10v2004-20240412-en
Behavioral task
behavioral13
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/2378e76aba1ad6e0c937fb39989217bf0de616fdad4726c0f4233bf5414cde86
Resource
win10v2004-20240412-en
Behavioral task
behavioral14
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01
Resource
win10v2004-20240412-en
Behavioral task
behavioral15
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/3205603282a636979a55aa1e1be518cd3adcbbe491745d996ceb4b5a4dece0c5
Resource
win10v2004-20240412-en
Behavioral task
behavioral16
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/453468b86856665f2cc0e0e71668c0b6aac8b14326c623995ba5963f22257619
Resource
win10v2004-20240412-en
Behavioral task
behavioral17
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/5fb29fb0136978b9ccf60750af09cec74a257a0ca9c47159ca74dbba21fbcc59
Resource
win10v2004-20240412-en
Behavioral task
behavioral18
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/6fe6808b9cfe654f526108ec61cb5211bb6601d28e192cadf06102073b54f69c
Resource
win10v2004-20240412-en
Behavioral task
behavioral19
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/7745b070943e910e8807e3521ac7b7a01401d131bf6c18a63433f8177ed539a6
Resource
win10v2004-20240412-en
Behavioral task
behavioral20
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/7f18e5b5b7645a80a0d44adf3fecdafcbf937bfe30a4cfb965a1421e034996dd
Resource
win10v2004-20240412-en
Behavioral task
behavioral21
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/90b61cc77bb2d726219fd00ae2d0ecdf6f0fe7078529e87b7ec8e603008232d5
Resource
win10v2004-20240412-en
Behavioral task
behavioral22
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948
Resource
win10v2004-20240412-en
Behavioral task
behavioral23
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/985ffee662969825146d1b465d068ea4f5f01990d13827511415fd497cf9db86
Resource
win10v2004-20240412-en
Behavioral task
behavioral24
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/d1e82d4a37959a9e6b661e31b8c8c6d2813c93ac92508a2771b2491b04ea2485
Resource
win10v2004-20240412-en
Behavioral task
behavioral25
Sample
The-MALWARE-Repo-master/Email-Worm/Amus.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral26
Sample
The-MALWARE-Repo-master/Email-Worm/Anap.a.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral27
Sample
The-MALWARE-Repo-master/Email-Worm/Axam.a.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral28
Sample
The-MALWARE-Repo-master/Email-Worm/Brontok.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral29
Sample
The-MALWARE-Repo-master/Email-Worm/BubbleBoy.html
Resource
win10v2004-20240412-en
Behavioral task
behavioral30
Sample
The-MALWARE-Repo-master/Email-Worm/Bugsoft.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral31
Sample
The-MALWARE-Repo-master/Email-Worm/Duksten.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral32
Sample
The-MALWARE-Repo-master/Email-Worm/Emin.js
Resource
win10v2004-20240226-en
General
-
Target
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.dll
-
Size
628KB
-
MD5
97a26d9e3598fea2e1715c6c77b645c2
-
SHA1
c4bf3a00c9223201aa11178d0f0b53c761a551c4
-
SHA256
e5df93c0fedca105218296cbfc083bdc535ca99862f10d21a179213203d6794f
-
SHA512
acfec633714f72bd5c39f16f10e39e88b5c1cf0adab7154891a383912852f92d3415b0b2d874a8f8f3166879e63796a8ed25ee750c6e4be09a4dddd8c849920c
-
SSDEEP
12288:2oXYZawPO7urFw4HLLDOeLSwg4ULeHOuCqA8:2oXYFIuh5HjhSwiJ8
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Ftmqvfjd = "\"C:\\Users\\Admin\\AppData\\Roaming\\VidIr\\recdisc.exe\"" Process not Found -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\LkJu\tabcal.exe cmd.exe File opened for modification C:\Windows\system32\LkJu\tabcal.exe cmd.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4020 schtasks.exe -
Modifies registry class 10 IoCs
description ioc Process Key deleted \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000_Classes\ms-settings\shell Process not Found Key created \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000_Classes\ms-settings Process not Found Key created \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000_Classes\ms-settings\shell\open Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000_Classes\ms-settings\shell\open\command\ = "C:\\Windows\\system32\\cmd.exe /c C:\\Users\\Admin\\AppData\\Local\\Temp\\2xH6XL.cmd" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000_Classes\ms-settings\shell\open\command\DelegateExecute Process not Found Key deleted \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000_Classes\ms-settings\shell\open\command Process not Found Key created \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000_Classes\ms-settings\shell\open\command Process not Found Key created \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000_Classes\ms-settings\shell Process not Found Key deleted \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000_Classes\ms-settings\shell\open Process not Found Key deleted \REGISTRY\USER\S-1-5-21-776854024-226333264-2052258302-1000_Classes\ms-settings Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1808 rundll32.exe 1808 rundll32.exe 1808 rundll32.exe 1808 rundll32.exe 1808 rundll32.exe 1808 rundll32.exe 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found 3504 Process not Found -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeShutdownPrivilege 3504 Process not Found Token: SeCreatePagefilePrivilege 3504 Process not Found Token: SeShutdownPrivilege 3504 Process not Found Token: SeCreatePagefilePrivilege 3504 Process not Found Token: SeShutdownPrivilege 3504 Process not Found Token: SeCreatePagefilePrivilege 3504 Process not Found Token: SeShutdownPrivilege 3504 Process not Found Token: SeCreatePagefilePrivilege 3504 Process not Found Token: SeShutdownPrivilege 3504 Process not Found Token: SeCreatePagefilePrivilege 3504 Process not Found Token: SeShutdownPrivilege 3504 Process not Found Token: SeCreatePagefilePrivilege 3504 Process not Found Token: SeShutdownPrivilege 3504 Process not Found Token: SeCreatePagefilePrivilege 3504 Process not Found Token: SeShutdownPrivilege 3504 Process not Found Token: SeCreatePagefilePrivilege 3504 Process not Found Token: SeShutdownPrivilege 3504 Process not Found Token: SeCreatePagefilePrivilege 3504 Process not Found Token: SeShutdownPrivilege 3504 Process not Found Token: SeCreatePagefilePrivilege 3504 Process not Found Token: SeShutdownPrivilege 3504 Process not Found Token: SeCreatePagefilePrivilege 3504 Process not Found -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3504 wrote to memory of 4560 3504 Process not Found 87 PID 3504 wrote to memory of 4560 3504 Process not Found 87 PID 3504 wrote to memory of 4992 3504 Process not Found 88 PID 3504 wrote to memory of 4992 3504 Process not Found 88 PID 3504 wrote to memory of 5032 3504 Process not Found 90 PID 3504 wrote to memory of 5032 3504 Process not Found 90 PID 3504 wrote to memory of 4076 3504 Process not Found 91 PID 3504 wrote to memory of 4076 3504 Process not Found 91 PID 3504 wrote to memory of 4608 3504 Process not Found 93 PID 3504 wrote to memory of 4608 3504 Process not Found 93 PID 4608 wrote to memory of 2840 4608 fodhelper.exe 94 PID 4608 wrote to memory of 2840 4608 fodhelper.exe 94 PID 2840 wrote to memory of 4020 2840 cmd.exe 96 PID 2840 wrote to memory of 4020 2840 cmd.exe 96 PID 3504 wrote to memory of 1452 3504 Process not Found 97 PID 3504 wrote to memory of 1452 3504 Process not Found 97 PID 1452 wrote to memory of 4112 1452 cmd.exe 99 PID 1452 wrote to memory of 4112 1452 cmd.exe 99 PID 3504 wrote to memory of 1756 3504 Process not Found 100 PID 3504 wrote to memory of 1756 3504 Process not Found 100 PID 1756 wrote to memory of 3400 1756 cmd.exe 102 PID 1756 wrote to memory of 3400 1756 cmd.exe 102 PID 3504 wrote to memory of 2956 3504 Process not Found 103 PID 3504 wrote to memory of 2956 3504 Process not Found 103 PID 2956 wrote to memory of 3412 2956 cmd.exe 105 PID 2956 wrote to memory of 3412 2956 cmd.exe 105 PID 3504 wrote to memory of 1984 3504 Process not Found 106 PID 3504 wrote to memory of 1984 3504 Process not Found 106 PID 1984 wrote to memory of 2720 1984 cmd.exe 108 PID 1984 wrote to memory of 2720 1984 cmd.exe 108 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Banking-Malware\Dridex\Trojan.Dridex.A.dll,#11⤵
- Suspicious behavior: EnumeratesProcesses
PID:1808
-
C:\Windows\system32\recdisc.exeC:\Windows\system32\recdisc.exe1⤵PID:4560
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\QOb.cmd1⤵PID:4992
-
C:\Windows\system32\tabcal.exeC:\Windows\system32\tabcal.exe1⤵PID:5032
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\GaK.cmd1⤵
- Drops file in System32 directory
PID:4076
-
C:\Windows\System32\fodhelper.exe"C:\Windows\System32\fodhelper.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\2xH6XL.cmd2⤵
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\system32\schtasks.exeschtasks.exe /Create /F /TN "Koogjfpcvfdf" /TR C:\Windows\system32\LkJu\tabcal.exe /SC minute /MO 60 /RL highest3⤵
- Creates scheduled task(s)
PID:4020
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Koogjfpcvfdf"1⤵
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\system32\schtasks.exeschtasks.exe /Query /TN "Koogjfpcvfdf"2⤵PID:4112
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Koogjfpcvfdf"1⤵
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\system32\schtasks.exeschtasks.exe /Query /TN "Koogjfpcvfdf"2⤵PID:3400
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Koogjfpcvfdf"1⤵
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\system32\schtasks.exeschtasks.exe /Query /TN "Koogjfpcvfdf"2⤵PID:3412
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Koogjfpcvfdf"1⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\system32\schtasks.exeschtasks.exe /Query /TN "Koogjfpcvfdf"2⤵PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
127B
MD53b238c573cf6099a5d7b0faa6feeb80b
SHA18228cc81cfee523cf0e9ffa0cee5bb4b499a4385
SHA2564caa66e1c93004858e6b0d74316f14000e0e0aebc5e5a019bb2020e89db00fd0
SHA512b5964a68e40896e72a2677677fe70d55cf85249e8e9ae0efeb4b8f91b1961a34f8640e0dde318dfcec719c40c6f72da7b72312b29843096652e3dcf582d12d21
-
Filesize
188B
MD57bd9fb99e9ba172d419c64a8a7c6779b
SHA144b25b25100b3e66ec11b65cdda9152bbc3ceff0
SHA256dcc7b5aad1d73f623e567e30ce3ab3349aa699a80ee4bd011828d3f7dd53c569
SHA512d4ea13a0108f08c32e5bdc513ab95a0e4c29fcd8aed1a4ebcb523c2ef726e9bea01ba1f883b102e658767586bcce6c94bfe5a2c3c861edda19ff89374e628cc3
-
Filesize
628KB
MD5734a3efd90ca8c1380f52dbbb6abd905
SHA19c3fe3b1eee4d13986f384c4416975d90d793862
SHA2566eb9be8589bd884e8bd50ad43f686a5a498c2d6e435924bd055317f28fcb3427
SHA51243b0710e198945af03516edd8716cd27cacaeb236b5c90ed283e2e66ba624f43601b1d7d079737ca10b65e903a340ccbfdc514a6a789744ec54cf8e2eda32179
-
Filesize
230B
MD5e5971b174d759e614015c2a81436389c
SHA13cbf45c1bf9f8e166390c601ded1c28773195ada
SHA256de25891ba4e5e4306285419bd339a00d1e0e02c216acc42663315e7ead6683e7
SHA5122003f0b4145f7b6bb1a829cabb678fb2ac29c3b1929d61df8b63c4c09ceca43477d89fbc9623cdcb607d14007b81e8a377a448a5e8fb24ece4ce162863b505d7
-
Filesize
628KB
MD5c76276342b8dbc41cfba52361221b02a
SHA13b0e166e2e3f15340f5551da79a7f8a301306db1
SHA2566f69845e12930bb26864ec2e0d236d53e7c5ad63d585d65c49030a924632a68a
SHA512de71669bee8944b480cfa01d74ea4dc1df910b8ba82db943bd5a297a6da5cd1ff124154c1365ba74be579b71eacf5dbc0c6a16e85689e1570a54d4eedae475e1
-
Filesize
898B
MD50721eee2d16ef083612e7884f7bfd21d
SHA18084a127fd1fc30ee3a2bee25bd100945b112354
SHA256c1a86757d8a146459c90fbd21a6ff2cea8f00cadff02d0226eff1b29ae211a4e
SHA5124028a1a3d9d74e38642f4d06413f50ef6f07e104ec606d05947d648a6c797edb216a1d40e1cb88e4f01026eb499b6212dd2415f947a20901d917caf642a09528
-
Filesize
193KB
MD518afee6824c84bf5115bada75ff0a3e7
SHA1d10f287a7176f57b3b2b315a5310d25b449795aa
SHA2560787b37cf197595b8149ffe3784f9c59eacde3616011f185513ff5c075a5ac4e
SHA512517356165b401dbebf15437d3b17746aef5a6a4cc62a0afe45966abc92b4cf377eee4514a36ee28b1e88e55a22a2f8a6c997df45971e7f354b66ac7d9e141845