Analysis

  • max time kernel
    121s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    18/01/2025, 14:56 UTC

General

  • Target

    The-MALWARE-Repo-master/Banking-Malware/Dridex/DridexLoader.bin.exe

  • Size

    212KB

  • MD5

    c26203af4b3e9c81a9e634178b603601

  • SHA1

    5e41cbc4d7a1afdf05f441086c2caf45a44bac9e

  • SHA256

    7b8fc6e62ef39770587a056af9709cb38f052aad5d815f808346494b7a3d00c5

  • SHA512

    bb5aeb995d7b9b2b532812be0da4644db5f3d22635c37d7154ba39691f3561da574597618e7359b9a45b3bb906ec0b8b0104cbc05689455c952e995759e188b6

  • SSDEEP

    3072:Te8LOIa22GwayjbzJ4xgAW8NeN00w7Aoalm2HdTStgjuPaMe+H9tJA:iUOIa2sZjPJJQiw4igjAL

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Discovers systems in the same network 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Banking-Malware\Dridex\DridexLoader.bin.exe
    "C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Banking-Malware\Dridex\DridexLoader.bin.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1452
    • C:\Windows\SysWOW64\svchost.exe
      C:\Windows\system32\svchost.exe "C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Banking-Malware\Dridex\DridexLoader.bin.exe"
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2804
      • C:\Windows\SysWOW64\whoami.exe
        C:\Windows\system32\whoami.exe /all
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2712
      • C:\Windows\SysWOW64\net.exe
        C:\Windows\system32\net.exe view
        3⤵
        • System Location Discovery: System Language Discovery
        • Discovers systems in the same network
        PID:2700

Network

    No results found
  • 192.48.88.22:443
    svchost.exe
    152 B
    3
  • 192.48.88.22:443
    svchost.exe
    152 B
    3
No results found

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1452-5-0x0000000000190000-0x00000000001C6000-memory.dmp

    Filesize

    216KB

  • memory/1452-0-0x0000000000190000-0x00000000001C6000-memory.dmp

    Filesize

    216KB

  • memory/1452-1-0x0000000000100000-0x0000000000106000-memory.dmp

    Filesize

    24KB

  • memory/2804-11-0x0000000000700000-0x0000000000736000-memory.dmp

    Filesize

    216KB

  • memory/2804-2-0x0000000077539000-0x000000007753A000-memory.dmp

    Filesize

    4KB

  • memory/2804-9-0x0000000000700000-0x0000000000736000-memory.dmp

    Filesize

    216KB

  • memory/2804-3-0x0000000000160000-0x0000000000161000-memory.dmp

    Filesize

    4KB

  • memory/2804-10-0x0000000000700000-0x0000000000736000-memory.dmp

    Filesize

    216KB

  • memory/2804-8-0x0000000000700000-0x0000000000736000-memory.dmp

    Filesize

    216KB

  • memory/2804-7-0x0000000000700000-0x0000000000736000-memory.dmp

    Filesize

    216KB

  • memory/2804-6-0x0000000000700000-0x0000000000736000-memory.dmp

    Filesize

    216KB

  • memory/2804-16-0x00000000774B0000-0x00000000775C0000-memory.dmp

    Filesize

    1.1MB

  • memory/2804-25-0x00000000774B0000-0x00000000775C0000-memory.dmp

    Filesize

    1.1MB

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.