Analysis

  • max time kernel
    150s
  • max time network
    130s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    18-07-2024 21:48

General

  • Target

    The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.dll

  • Size

    628KB

  • MD5

    97a26d9e3598fea2e1715c6c77b645c2

  • SHA1

    c4bf3a00c9223201aa11178d0f0b53c761a551c4

  • SHA256

    e5df93c0fedca105218296cbfc083bdc535ca99862f10d21a179213203d6794f

  • SHA512

    acfec633714f72bd5c39f16f10e39e88b5c1cf0adab7154891a383912852f92d3415b0b2d874a8f8f3166879e63796a8ed25ee750c6e4be09a4dddd8c849920c

  • SSDEEP

    12288:2oXYZawPO7urFw4HLLDOeLSwg4ULeHOuCqA8:2oXYFIuh5HjhSwiJ8

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Event Triggered Execution: Accessibility Features 1 TTPs

    Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.

  • Modifies registry class 9 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Banking-Malware\Dridex\Trojan.Dridex.A.dll,#1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2552
  • C:\Windows\system32\osk.exe
    C:\Windows\system32\osk.exe
    1⤵
      PID:3044
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\61KC7.cmd
      1⤵
        PID:2756
      • C:\Windows\system32\msra.exe
        C:\Windows\system32\msra.exe
        1⤵
          PID:3036
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\dNjbPlS.cmd
          1⤵
          • Drops file in System32 directory
          PID:1740
        • C:\Windows\System32\eventvwr.exe
          "C:\Windows\System32\eventvwr.exe"
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:1476
          • C:\Windows\system32\cmd.exe
            "C:\Windows\system32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\TUuqz.cmd
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2652
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /Create /F /TN "Kukqwye" /TR C:\Windows\system32\AVe5Ds\msra.exe /SC minute /MO 60 /RL highest
              3⤵
              • Scheduled Task/Job: Scheduled Task
              PID:2680
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Kukqwye"
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:1864
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /Query /TN "Kukqwye"
            2⤵
              PID:1736
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Kukqwye"
            1⤵
            • Suspicious use of WriteProcessMemory
            PID:836
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /Query /TN "Kukqwye"
              2⤵
                PID:2224
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Kukqwye"
              1⤵
              • Suspicious use of WriteProcessMemory
              PID:1464
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /Query /TN "Kukqwye"
                2⤵
                  PID:2476
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Kukqwye"
                1⤵
                • Suspicious use of WriteProcessMemory
                PID:2964
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /Query /TN "Kukqwye"
                  2⤵
                    PID:448
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Kukqwye"
                  1⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1284
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /Query /TN "Kukqwye"
                    2⤵
                      PID:1512
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Kukqwye"
                    1⤵
                    • Suspicious use of WriteProcessMemory
                    PID:924
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /Query /TN "Kukqwye"
                      2⤵
                        PID:760

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\61KC7.cmd

                      Filesize

                      229B

                      MD5

                      70b7347ed986b414621cc7fccfd40bce

                      SHA1

                      d1ea2744c9dcdfcd2b25bdf1daf1121dbbc2cd54

                      SHA256

                      d0bdec6687f7302ce2437e48a00eb55ace0476ab162b208d2bcb8b0da584f747

                      SHA512

                      cf6779e75bbff91234275177a41d71ccbada44c692c3483285c8fbd9a3cfaafab9ce012f3c0caed48fc8e3b33c9171692c43e27f6749dd6d3e1d491ceada4c98

                    • C:\Users\Admin\AppData\Local\Temp\J121B.tmp

                      Filesize

                      632KB

                      MD5

                      74dd5811876994391c354b8d484d6db3

                      SHA1

                      5488765bf03eb06964018bcedcc5d32d4b5f84df

                      SHA256

                      5f737126cdb6a9a6861cceb83037360cb1b8aee98b57f450900843b00a775590

                      SHA512

                      55917c44dbeca4e6b4d90b1c98c1a241bfba9dcf0871a4ff160237f4fd72aaae4647aa3596c284ff6e03dd324c0af80c628d646f545859ccb5b65d666c7edd44

                    • C:\Users\Admin\AppData\Local\Temp\JE9C3.tmp

                      Filesize

                      628KB

                      MD5

                      92a6688491fd998553a90f68e3bef0c4

                      SHA1

                      0cb63f9ad86b624f460ea06ab042183ff0fa002c

                      SHA256

                      195def1a76ba3abc974f48e92b3d1651d4bce01e4dc541d8b886da7154e5fa96

                      SHA512

                      4cec0955f89d1a8452f9923f4ea63fd27b3e9067cfb9f2a1edf8c7b0157f859ab53d81d89cfdf1438bb491739f0b69b2e01fada7ed77ca173471a2cd58420f2a

                    • C:\Users\Admin\AppData\Local\Temp\TUuqz.cmd

                      Filesize

                      122B

                      MD5

                      404a40f10be371b55e9e6f056efd329a

                      SHA1

                      9e02b9cb1e1788a91116d7bcd97b518cb18285e0

                      SHA256

                      6cab469ec894d189d9364e6d35d121159222bd60b846d4e53b2bf6d8886288c5

                      SHA512

                      7da569342074bfda8195a36dddf8ebc0c40526e82ebd57887011041c3a1b2baa594bcb48649f15ea49d28b013f9ab01c192ab044ddf0f2a6ecd35223175a909c

                    • C:\Users\Admin\AppData\Local\Temp\dNjbPlS.cmd

                      Filesize

                      195B

                      MD5

                      a53a5ebd9abb665129b98b708860345b

                      SHA1

                      e9715e2e01cf78379e9bbfea4ce2225e1baba265

                      SHA256

                      93816745adeebdb3887b2ccf1048e7a0b167c0539d4908b8f1274d39fea22a1b

                      SHA512

                      77f75dd2a636e5fb6e363bce79e456506eaa525eaac2e1487ea79d8706ddf5e353129a38409a4beacff1b16750ee93172f269379eb787c3a9867903fc208e505

                    • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Amzwjwluwxhedcg.lnk

                      Filesize

                      868B

                      MD5

                      d4e35d6016ec486121b186f4595f33cd

                      SHA1

                      5eaa91a5cd8bdbbc19fa6a3f364b860dc8c6c4d4

                      SHA256

                      fbc449789279e39f83b77b2491d4ba8dcffc32bddf72dc92272e28cc64f29a88

                      SHA512

                      7eadbb297669718b3415f970b1815e246740bed120aeb9cc0ed8d937e12884c27a3c6c8d591dc4305006e0a6ec2c938e10ed7beea46bd5a0236758a9fee6b99a

                    • \Users\Admin\AppData\Roaming\pyl1TwU\osk.exe

                      Filesize

                      676KB

                      MD5

                      b918311a8e59fb8ccf613a110024deba

                      SHA1

                      a9a64a53d2d1c023d058cfe23db4c9b4fbe59d1b

                      SHA256

                      e1f7612086c2d01f15f2e74f1c22bc6abeb56f18e6bda058edce8d780aebb353

                      SHA512

                      e3a2480e546bf31509d6e0ffb5ce9dc5da3eb93a1a06d8e89b68165f2dd9ad520edac52af4c485c93fe6028dffaf7fcaadaafb04e524954dd117551afff87cf1

                    • memory/1184-8-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1184-33-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1184-14-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1184-21-0x0000000002530000-0x0000000002537000-memory.dmp

                      Filesize

                      28KB

                    • memory/1184-20-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1184-13-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1184-12-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1184-11-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1184-22-0x0000000076E71000-0x0000000076E72000-memory.dmp

                      Filesize

                      4KB

                    • memory/1184-23-0x0000000076FD0000-0x0000000076FD2000-memory.dmp

                      Filesize

                      8KB

                    • memory/1184-32-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1184-7-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1184-37-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1184-3-0x0000000076C66000-0x0000000076C67000-memory.dmp

                      Filesize

                      4KB

                    • memory/1184-9-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1184-10-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/1184-53-0x0000000076C66000-0x0000000076C67000-memory.dmp

                      Filesize

                      4KB

                    • memory/1184-4-0x0000000002550000-0x0000000002551000-memory.dmp

                      Filesize

                      4KB

                    • memory/2552-6-0x000007FEF6580000-0x000007FEF661D000-memory.dmp

                      Filesize

                      628KB

                    • memory/2552-0-0x000007FEF6580000-0x000007FEF661D000-memory.dmp

                      Filesize

                      628KB

                    • memory/2552-2-0x0000000000110000-0x0000000000117000-memory.dmp

                      Filesize

                      28KB