Analysis

  • max time kernel
    150s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-07-2024 21:48

General

  • Target

    The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.dll

  • Size

    628KB

  • MD5

    97a26d9e3598fea2e1715c6c77b645c2

  • SHA1

    c4bf3a00c9223201aa11178d0f0b53c761a551c4

  • SHA256

    e5df93c0fedca105218296cbfc083bdc535ca99862f10d21a179213203d6794f

  • SHA512

    acfec633714f72bd5c39f16f10e39e88b5c1cf0adab7154891a383912852f92d3415b0b2d874a8f8f3166879e63796a8ed25ee750c6e4be09a4dddd8c849920c

  • SSDEEP

    12288:2oXYZawPO7urFw4HLLDOeLSwg4ULeHOuCqA8:2oXYFIuh5HjhSwiJ8

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Modifies registry class 10 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Banking-Malware\Dridex\Trojan.Dridex.A.dll,#1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4064
  • C:\Windows\system32\mblctr.exe
    C:\Windows\system32\mblctr.exe
    1⤵
      PID:1348
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\p8Yq.cmd
      1⤵
        PID:2120
      • C:\Windows\system32\rdpshell.exe
        C:\Windows\system32\rdpshell.exe
        1⤵
          PID:3936
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\6QyI.cmd
          1⤵
          • Drops file in System32 directory
          PID:1476
        • C:\Windows\System32\fodhelper.exe
          "C:\Windows\System32\fodhelper.exe"
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:1876
          • C:\Windows\system32\cmd.exe
            "C:\Windows\system32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\9vb1jH.cmd
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1532
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /Create /F /TN "Essufqssgel" /TR C:\Windows\system32\O3KrzU\rdpshell.exe /SC minute /MO 60 /RL highest
              3⤵
              • Scheduled Task/Job: Scheduled Task
              PID:1552
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Essufqssgel"
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:3476
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /Query /TN "Essufqssgel"
            2⤵
              PID:3684
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Essufqssgel"
            1⤵
            • Suspicious use of WriteProcessMemory
            PID:3900
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /Query /TN "Essufqssgel"
              2⤵
                PID:4868
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Essufqssgel"
              1⤵
              • Suspicious use of WriteProcessMemory
              PID:3240
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /Query /TN "Essufqssgel"
                2⤵
                  PID:4312
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Essufqssgel"
                1⤵
                • Suspicious use of WriteProcessMemory
                PID:4412
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /Query /TN "Essufqssgel"
                  2⤵
                    PID:4276
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Essufqssgel"
                  1⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4352
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /Query /TN "Essufqssgel"
                    2⤵
                      PID:4400
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Essufqssgel"
                    1⤵
                    • Suspicious use of WriteProcessMemory
                    PID:364
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /Query /TN "Essufqssgel"
                      2⤵
                        PID:820

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\2Kx34F7.tmp

                      Filesize

                      628KB

                      MD5

                      764698c8a3287e580d6db38ae53bf2d7

                      SHA1

                      f8cabfb0739c119ccfe921be0b45c1824429c00d

                      SHA256

                      1845920cb014f63cfd1cf0f00698bf1dc1c8c1a99414c5b238032af5bf3001ae

                      SHA512

                      1f274463d72049b98cc86d63ea85dda78108dbc0dc4c41c1a32ca92ca6ca97089ad3b241043388903eb0b50c53fd00a279cf44b54041be79734d908cce953122

                    • C:\Users\Admin\AppData\Local\Temp\6QyI.cmd

                      Filesize

                      200B

                      MD5

                      075c393e405e6f7acab94e1834c3a878

                      SHA1

                      a61c88e2fdae2b7fd1c325111502c4b876089771

                      SHA256

                      8abb0f55e2c1acdb47dc2b78a06e35bb81bac5714d228bd209111f8a223d4dcf

                      SHA512

                      0d55a6faac5dbf3d58fdde433e5c6e81997e7373747c47c62b4d86dc32793882de1f541d8b96bfa33ae29494c74efa6955cc554588917d38a1a411ba67d6dfc6

                    • C:\Users\Admin\AppData\Local\Temp\9vb1jH.cmd

                      Filesize

                      130B

                      MD5

                      1dd88eecf641dfb88cb37a34e3269fcc

                      SHA1

                      d3c8fe447d051f05711588b86b1a4dd9a4c606e7

                      SHA256

                      4cca8a25c80ec434b75546cd3e6f03f0cb996e59842f23b065208b18cce28bed

                      SHA512

                      43478867561405b0a824d0e5c5c0224aff5e45442f17f93574b22e7d3420c6d90ec60f5848e93b44ffaaef04cd39bd364e0bf5b5f5988a1b9eee4cd14aa7f1e1

                    • C:\Users\Admin\AppData\Local\Temp\NgC30.tmp

                      Filesize

                      632KB

                      MD5

                      859bae1dd9141753a733b407673d96be

                      SHA1

                      cab10be4573841c86d72af4935ec5b7241428932

                      SHA256

                      12033e3a2e4172480020b21c82a4144b11a8b8efcc89ee5dffc5fe90b18e5695

                      SHA512

                      7f9c3c5a99ca22476a75fe53ceeb50f0dbc97bac9a378747f63d7f0fd3303aba71d975a67f958bed49fa64e0e164fbfeadbf55cd5e3c98289ab7d84e5222eaa9

                    • C:\Users\Admin\AppData\Local\Temp\p8Yq.cmd

                      Filesize

                      227B

                      MD5

                      d09b2d185a2c67c99231bb46fa8dd18a

                      SHA1

                      2457996c6422b3d2a7ee0ff0d2d54fd49c70005c

                      SHA256

                      058fe1e1b3c696f51734cf0b38cc2273f06c286627958a0858a636ae096c9a68

                      SHA512

                      bef6ae5c2bc3c364d56b83072e796cf7638cdfb8cfd17c1691b35cadd0e717e735762419eccabf1d2ff855532015fa962252b30d42c473d72111d0a3255be703

                    • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Ycquegmnm.lnk

                      Filesize

                      898B

                      MD5

                      875f5df032472e90508c3f264ac124a8

                      SHA1

                      8fa957bf1dbeaaa8bb99b2bc410e2f7e1ef8d7c8

                      SHA256

                      50f01d30881d65b58ef65286846000d5f39c6ccd7c1bc0e9507d82464ba8f12d

                      SHA512

                      311e2f68d3dd993f7498074fb40dd95743efcbe6246415a0cbb1dba40cd33db88600fd2fbb85d24f6f1d22b14cf12f9514094618467edd3ea48a2f5d151e622b

                    • C:\Users\Admin\AppData\Roaming\utZ7U\mblctr.exe

                      Filesize

                      790KB

                      MD5

                      d3db14eabb2679e08020bcd0c96fa9f6

                      SHA1

                      578dca7aad29409634064579d269e61e1f07d9dd

                      SHA256

                      3baa1dc0756ebb0c2c70a31be7147863d8d8ba056c1aa7f979307f8790d1ff69

                      SHA512

                      14dc895ae458ff0ca13d9c27aa5b4cfc906d338603d43389bb5f4429be593a587818855d1fe938f9ebebf46467fb0c1ab28247e8f9f5357098e8b822ecd8fffe

                    • memory/3376-12-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3376-33-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3376-21-0x00000000014D0000-0x00000000014D7000-memory.dmp

                      Filesize

                      28KB

                    • memory/3376-14-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3376-13-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3376-11-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3376-10-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3376-9-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3376-8-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3376-22-0x00007FFCD2E80000-0x00007FFCD2E90000-memory.dmp

                      Filesize

                      64KB

                    • memory/3376-31-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3376-20-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3376-3-0x00000000031F0000-0x00000000031F1000-memory.dmp

                      Filesize

                      4KB

                    • memory/3376-7-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3376-6-0x00007FFCD2CEA000-0x00007FFCD2CEB000-memory.dmp

                      Filesize

                      4KB

                    • memory/4064-5-0x00007FFCC39D0000-0x00007FFCC3A6D000-memory.dmp

                      Filesize

                      628KB

                    • memory/4064-2-0x0000018659640000-0x0000018659647000-memory.dmp

                      Filesize

                      28KB

                    • memory/4064-0-0x00007FFCC39D0000-0x00007FFCC3A6D000-memory.dmp

                      Filesize

                      628KB