Resubmissions

Analysis

  • max time kernel
    149s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250217-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/02/2025, 22:37

General

  • Target

    The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.dll

  • Size

    628KB

  • MD5

    97a26d9e3598fea2e1715c6c77b645c2

  • SHA1

    c4bf3a00c9223201aa11178d0f0b53c761a551c4

  • SHA256

    e5df93c0fedca105218296cbfc083bdc535ca99862f10d21a179213203d6794f

  • SHA512

    acfec633714f72bd5c39f16f10e39e88b5c1cf0adab7154891a383912852f92d3415b0b2d874a8f8f3166879e63796a8ed25ee750c6e4be09a4dddd8c849920c

  • SSDEEP

    12288:2oXYZawPO7urFw4HLLDOeLSwg4ULeHOuCqA8:2oXYFIuh5HjhSwiJ8

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Modifies registry class 10 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Banking-Malware\Dridex\Trojan.Dridex.A.dll,#1
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:4512
  • C:\Windows\system32\SystemSettingsRemoveDevice.exe
    C:\Windows\system32\SystemSettingsRemoveDevice.exe
    1⤵
      PID:1600
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\Qhq2.cmd
      1⤵
        PID:5036
      • C:\Windows\system32\printfilterpipelinesvc.exe
        C:\Windows\system32\printfilterpipelinesvc.exe
        1⤵
          PID:3284
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\gbr.cmd
          1⤵
          • Drops file in System32 directory
          PID:1052
        • C:\Windows\System32\fodhelper.exe
          "C:\Windows\System32\fodhelper.exe"
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:2096
          • C:\Windows\system32\cmd.exe
            "C:\Windows\system32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\bEJFiSb.cmd
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4312
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /Create /F /TN "Yxsjo" /TR C:\Windows\system32\lOapy\printfilterpipelinesvc.exe /SC minute /MO 60 /RL highest
              3⤵
              • Scheduled Task/Job: Scheduled Task
              PID:2324
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Yxsjo"
          1⤵
          • Suspicious use of WriteProcessMemory
          PID:1944
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /Query /TN "Yxsjo"
            2⤵
              PID:2504
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Yxsjo"
            1⤵
            • Suspicious use of WriteProcessMemory
            PID:2480
            • C:\Windows\system32\schtasks.exe
              schtasks.exe /Query /TN "Yxsjo"
              2⤵
                PID:4224
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Yxsjo"
              1⤵
              • Suspicious use of WriteProcessMemory
              PID:3608
              • C:\Windows\system32\schtasks.exe
                schtasks.exe /Query /TN "Yxsjo"
                2⤵
                  PID:4612
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Yxsjo"
                1⤵
                • Suspicious use of WriteProcessMemory
                PID:2948
                • C:\Windows\system32\schtasks.exe
                  schtasks.exe /Query /TN "Yxsjo"
                  2⤵
                    PID:1932
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Yxsjo"
                  1⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3728
                  • C:\Windows\system32\schtasks.exe
                    schtasks.exe /Query /TN "Yxsjo"
                    2⤵
                      PID:1872
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Yxsjo"
                    1⤵
                    • Suspicious use of WriteProcessMemory
                    PID:4464
                    • C:\Windows\system32\schtasks.exe
                      schtasks.exe /Query /TN "Yxsjo"
                      2⤵
                        PID:1100

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\M4EE.tmp

                      Filesize

                      628KB

                      MD5

                      a4cf0afe5eb12d1fbd2d84b5b7f04d14

                      SHA1

                      f2b39d5a31ca2567ac5837b6840fa47f76d7d04f

                      SHA256

                      08cd4c85abe6862f57ade1039bb44e546110c72a396510854aa084f964435533

                      SHA512

                      8d6cf390fb451c77ac85600167c97daa8af67d195646b64c24b8198b25c12fa634163bab2240d23ef9d93ef7892929907445331a6fe7d96826c2e4aadb194b4b

                    • C:\Users\Admin\AppData\Local\Temp\Qhq2.cmd

                      Filesize

                      246B

                      MD5

                      db32205553c26d0b25591f5688e9d9ef

                      SHA1

                      321170950adf2bf65cc8c45883f40adda6cc28a4

                      SHA256

                      9f38e467a426aeb12a96ac4a152b4d2ac42d01cda5a6c14e72cb19e1deb10053

                      SHA512

                      357eb22cae83af0e8bd421cc351ca40543291c77a45b2f843b8840e5619d64af84ca92c36298a866326ddc5545793a944fab5d17a349cdff7566de1f3002969f

                    • C:\Users\Admin\AppData\Local\Temp\bEJFiSb.cmd

                      Filesize

                      137B

                      MD5

                      ac15da188f064300b08e31944095c080

                      SHA1

                      98d4fddefe22e69d15a7c40aa7618a58de0b999c

                      SHA256

                      1cc5268580dfca855eff2ce6d626a64322b38a0f047545b2dc65b49a00859feb

                      SHA512

                      5ae3dac4b6d4c19c2734e1c9c0f3543b2b4ae587054efcc43682085fcfd5b8d751aa3b4ce82de8cf54cfe5aa907579adace5707a603ed722d8b935bd4408bb4b

                    • C:\Users\Admin\AppData\Local\Temp\gbr.cmd

                      Filesize

                      209B

                      MD5

                      d88487550e5b1f8390903b739a0d4bfc

                      SHA1

                      a71bb3b4966b5471a2ad5669bff063d52ad4b098

                      SHA256

                      59f8dc37ec154886c0b7a8b113b0820a9f63b98a341ef82f05b07e0eecbf4501

                      SHA512

                      1e8023b02e6ac5fe8981ef7d54ad78f9a62748b843ef934bb6071d64f4b7d168e9093f0c98d058e0dd1312fde54386797988e02a616c40ac035b1deabaad8671

                    • C:\Users\Admin\AppData\Local\Temp\h8DCF2.tmp

                      Filesize

                      908KB

                      MD5

                      d9c9039069209ce112d3e0c8007a59c5

                      SHA1

                      42bf56a89dc4a1aafe4b34da0dd7bf33af785d37

                      SHA256

                      6830fd58c3a1cc0e3d0869c7c93b8726f47f51ded7143bce78b21adebe35d879

                      SHA512

                      6c2bc13d17e31bc21cb8809e825d958c2d96ed5aeea4012dcec5fe9b5d26907ae5db12c0eba08ecad8e608d6691dffef96b1caf01160687290d7c3816625e3ea

                    • C:\Users\Admin\AppData\Roaming\MICROS~1\Windows\STARTM~1\Programs\Startup\Jyxkstijatad.lnk

                      Filesize

                      994B

                      MD5

                      ba5aacc3c6775eb385e743f8097ff2a6

                      SHA1

                      7710b3b03ebc3b668638149fca867ea2b9f2452c

                      SHA256

                      b8b7b5a3b9c967993ea7790484259ca14a93943b81e4ef2a8aad2182f5aded43

                      SHA512

                      f668947ceb78589ad31f2e1e5dd01fa32b0aa5483af7a70b22926e3dcb049a404ff817c19dcf94704ba53f0c4a5c36212f931101b0e18f3d2610783e7e99cb6c

                    • C:\Users\Admin\AppData\Roaming\defz4\SystemSettingsRemoveDevice.exe

                      Filesize

                      39KB

                      MD5

                      7853f1c933690bb7c53c67151cbddeb0

                      SHA1

                      d47a1ad0ccba4c988c8ffc5cbf9636fd4f4fa6e6

                      SHA256

                      9500731b2a3442f11dfd08a8adfe027e7f32ef5834c628eed4b78be74168470d

                      SHA512

                      831993d610539d44422d769de6561a4622e1b9cb3d73253774b6cecabf57654a74cd88b4ebe20921585ea96d977225b9501f02a0f6a1fc7d2cad6824fd539304

                    • memory/3468-12-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3468-31-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3468-20-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3468-14-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3468-13-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3468-11-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3468-10-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3468-9-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3468-8-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3468-22-0x00007FFDC9800000-0x00007FFDC9810000-memory.dmp

                      Filesize

                      64KB

                    • memory/3468-33-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3468-21-0x0000000002330000-0x0000000002337000-memory.dmp

                      Filesize

                      28KB

                    • memory/3468-4-0x0000000002480000-0x0000000002481000-memory.dmp

                      Filesize

                      4KB

                    • memory/3468-7-0x0000000140000000-0x000000014009D000-memory.dmp

                      Filesize

                      628KB

                    • memory/3468-3-0x00007FFDC966A000-0x00007FFDC966B000-memory.dmp

                      Filesize

                      4KB

                    • memory/4512-6-0x00007FFDBB3D0000-0x00007FFDBB46D000-memory.dmp

                      Filesize

                      628KB

                    • memory/4512-0-0x00007FFDBB3D0000-0x00007FFDBB46D000-memory.dmp

                      Filesize

                      628KB

                    • memory/4512-2-0x00000229A4740000-0x00000229A4747000-memory.dmp

                      Filesize

                      28KB