Overview
overview
10Static
static
10The-MALWAR...ot.exe
windows10-ltsc 2021-x64
10The-MALWAR...ll.exe
windows10-ltsc 2021-x64
10The-MALWAR...BS.exe
windows10-ltsc 2021-x64
10The-MALWAR...in.exe
windows10-ltsc 2021-x64
7The-MALWAR....A.exe
windows10-ltsc 2021-x64
7The-MALWAR....A.exe
windows10-ltsc 2021-x64
10The-MALWAR....A.dll
windows10-ltsc 2021-x64
6The-MALWAR...r.xlsm
windows10-ltsc 2021-x64
10The-MALWAR...36c859
windows10-ltsc 2021-x64
1The-MALWAR...caa742
windows10-ltsc 2021-x64
1The-MALWAR...c1a732
windows10-ltsc 2021-x64
1The-MALWAR...57c046
windows10-ltsc 2021-x64
1The-MALWAR...4cde86
windows10-ltsc 2021-x64
1The-MALWAR...460a01
windows10-ltsc 2021-x64
1The-MALWAR...ece0c5
windows10-ltsc 2021-x64
1The-MALWAR...257619
windows10-ltsc 2021-x64
1The-MALWAR...fbcc59
windows10-ltsc 2021-x64
1The-MALWAR...54f69c
windows10-ltsc 2021-x64
1The-MALWAR...d539a6
windows10-ltsc 2021-x64
1The-MALWAR...4996dd
windows10-ltsc 2021-x64
1The-MALWAR...8232d5
windows10-ltsc 2021-x64
1The-MALWAR...66b948
windows10-ltsc 2021-x64
1The-MALWAR...f9db86
windows10-ltsc 2021-x64
1The-MALWAR...ea2485
windows10-ltsc 2021-x64
1The-MALWAR...us.exe
windows10-ltsc 2021-x64
6The-MALWAR....a.exe
windows10-ltsc 2021-x64
3The-MALWAR....a.exe
windows10-ltsc 2021-x64
7The-MALWAR...ok.exe
windows10-ltsc 2021-x64
1The-MALWAR...y.html
windows10-ltsc 2021-x64
3The-MALWAR...ft.exe
windows10-ltsc 2021-x64
4The-MALWAR...en.exe
windows10-ltsc 2021-x64
6The-MALWAR...min.js
windows10-ltsc 2021-x64
3Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250218-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250218-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
05/03/2025, 21:47
Static task
static1
Behavioral task
behavioral1
Sample
The-MALWARE-Repo-master/Banking-Malware/DanaBot.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral2
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Dridex.JhiSharp.dll.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral3
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/DridexDroppedVBS.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral4
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/DridexLoader.bin.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral5
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral6
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral7
Sample
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.dll
Resource
win10ltsc2021-20250218-en
Behavioral task
behavioral8
Sample
The-MALWARE-Repo-master/Banking-Malware/Zloader.xlsm
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral9
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/001eb377f0452060012124cb214f658754c7488ccb82e23ec56b2f45a636c859
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral10
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/041bc20ca8ac3161098cbc976e67e3c0f1b672ad36ecbe22fd21cbd53bcaa742
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral11
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/0ab8836efcaa62c7daac314e0b7ab1679319b2901578fd9e95ec3476b4c1a732
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral12
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/103b8404dc64c9a44511675981a09fd01395ee837452d114f1350c295357c046
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral13
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/2378e76aba1ad6e0c937fb39989217bf0de616fdad4726c0f4233bf5414cde86
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral14
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/30c150419000d27dafcd5d00702411b2b23b0f5d7e4d0cc729a7d63b2e460a01
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral15
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/3205603282a636979a55aa1e1be518cd3adcbbe491745d996ceb4b5a4dece0c5
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral16
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/453468b86856665f2cc0e0e71668c0b6aac8b14326c623995ba5963f22257619
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral17
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/5fb29fb0136978b9ccf60750af09cec74a257a0ca9c47159ca74dbba21fbcc59
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral18
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/6fe6808b9cfe654f526108ec61cb5211bb6601d28e192cadf06102073b54f69c
Resource
win10ltsc2021-20250218-en
Behavioral task
behavioral19
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/7745b070943e910e8807e3521ac7b7a01401d131bf6c18a63433f8177ed539a6
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral20
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/7f18e5b5b7645a80a0d44adf3fecdafcbf937bfe30a4cfb965a1421e034996dd
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral21
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/90b61cc77bb2d726219fd00ae2d0ecdf6f0fe7078529e87b7ec8e603008232d5
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral22
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/9384b9e39334479194aacb53cb25ace289b6afe2e41bdc8619b2d2cae966b948
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral23
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/985ffee662969825146d1b465d068ea4f5f01990d13827511415fd497cf9db86
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral24
Sample
The-MALWARE-Repo-master/Botnets/FritzFrog/d1e82d4a37959a9e6b661e31b8c8c6d2813c93ac92508a2771b2491b04ea2485
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral25
Sample
The-MALWARE-Repo-master/Email-Worm/Amus.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral26
Sample
The-MALWARE-Repo-master/Email-Worm/Anap.a.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral27
Sample
The-MALWARE-Repo-master/Email-Worm/Axam.a.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral28
Sample
The-MALWARE-Repo-master/Email-Worm/Brontok.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral29
Sample
The-MALWARE-Repo-master/Email-Worm/BubbleBoy.html
Resource
win10ltsc2021-20250218-en
Behavioral task
behavioral30
Sample
The-MALWARE-Repo-master/Email-Worm/Bugsoft.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral31
Sample
The-MALWARE-Repo-master/Email-Worm/Duksten.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral32
Sample
The-MALWARE-Repo-master/Email-Worm/Emin.js
Resource
win10ltsc2021-20250217-en
General
-
Target
The-MALWARE-Repo-master/Banking-Malware/Dridex/Trojan.Dridex.A.dll
-
Size
628KB
-
MD5
97a26d9e3598fea2e1715c6c77b645c2
-
SHA1
c4bf3a00c9223201aa11178d0f0b53c761a551c4
-
SHA256
e5df93c0fedca105218296cbfc083bdc535ca99862f10d21a179213203d6794f
-
SHA512
acfec633714f72bd5c39f16f10e39e88b5c1cf0adab7154891a383912852f92d3415b0b2d874a8f8f3166879e63796a8ed25ee750c6e4be09a4dddd8c849920c
-
SSDEEP
12288:2oXYZawPO7urFw4HLLDOeLSwg4ULeHOuCqA8:2oXYFIuh5HjhSwiJ8
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-556327730-4249790997-552795783-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Lfoniegvg = "\"C:\\Users\\Admin\\AppData\\Roaming\\fo0u\\wlrmdr.exe\"" Process not Found -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\ZKbMr\quickassist.exe cmd.exe File opened for modification C:\Windows\system32\ZKbMr\quickassist.exe cmd.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-556327730-4249790997-552795783-1000_Classes\ms-settings\shell\open\command Process not Found Key created \REGISTRY\USER\S-1-5-21-556327730-4249790997-552795783-1000_Classes\ms-settings Process not Found Key created \REGISTRY\USER\S-1-5-21-556327730-4249790997-552795783-1000_Classes\ms-settings\shell Process not Found Key created \REGISTRY\USER\S-1-5-21-556327730-4249790997-552795783-1000_Classes\ms-settings\shell\open Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-556327730-4249790997-552795783-1000_Classes\ms-settings\shell\open\command\ = "C:\\Windows\\system32\\cmd.exe /c C:\\Users\\Admin\\AppData\\Local\\Temp\\JgNahPc.cmd" Process not Found Key deleted \REGISTRY\USER\S-1-5-21-556327730-4249790997-552795783-1000_Classes\ms-settings\shell Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-556327730-4249790997-552795783-1000_Classes\ms-settings\shell\open\command\DelegateExecute Process not Found Key deleted \REGISTRY\USER\S-1-5-21-556327730-4249790997-552795783-1000_Classes\ms-settings\shell\open\command Process not Found Key deleted \REGISTRY\USER\S-1-5-21-556327730-4249790997-552795783-1000_Classes\ms-settings\shell\open Process not Found Key deleted \REGISTRY\USER\S-1-5-21-556327730-4249790997-552795783-1000_Classes\ms-settings Process not Found -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2336 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4164 rundll32.exe 4164 rundll32.exe 4164 rundll32.exe 4164 rundll32.exe 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found 3568 Process not Found -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found Token: SeShutdownPrivilege 3568 Process not Found Token: SeCreatePagefilePrivilege 3568 Process not Found -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 3568 wrote to memory of 980 3568 Process not Found 88 PID 3568 wrote to memory of 980 3568 Process not Found 88 PID 3568 wrote to memory of 1684 3568 Process not Found 90 PID 3568 wrote to memory of 1684 3568 Process not Found 90 PID 3568 wrote to memory of 884 3568 Process not Found 92 PID 3568 wrote to memory of 884 3568 Process not Found 92 PID 3568 wrote to memory of 948 3568 Process not Found 93 PID 3568 wrote to memory of 948 3568 Process not Found 93 PID 3568 wrote to memory of 2996 3568 Process not Found 95 PID 3568 wrote to memory of 2996 3568 Process not Found 95 PID 2996 wrote to memory of 2300 2996 fodhelper.exe 96 PID 2996 wrote to memory of 2300 2996 fodhelper.exe 96 PID 2300 wrote to memory of 2336 2300 cmd.exe 99 PID 2300 wrote to memory of 2336 2300 cmd.exe 99 PID 3568 wrote to memory of 4288 3568 Process not Found 100 PID 3568 wrote to memory of 4288 3568 Process not Found 100 PID 4288 wrote to memory of 4188 4288 cmd.exe 102 PID 4288 wrote to memory of 4188 4288 cmd.exe 102 PID 3568 wrote to memory of 1108 3568 Process not Found 103 PID 3568 wrote to memory of 1108 3568 Process not Found 103 PID 1108 wrote to memory of 1752 1108 cmd.exe 105 PID 1108 wrote to memory of 1752 1108 cmd.exe 105 PID 3568 wrote to memory of 3992 3568 Process not Found 106 PID 3568 wrote to memory of 3992 3568 Process not Found 106 PID 3992 wrote to memory of 4388 3992 cmd.exe 108 PID 3992 wrote to memory of 4388 3992 cmd.exe 108 PID 3568 wrote to memory of 332 3568 Process not Found 109 PID 3568 wrote to memory of 332 3568 Process not Found 109 PID 332 wrote to memory of 4412 332 cmd.exe 111 PID 332 wrote to memory of 4412 332 cmd.exe 111 PID 3568 wrote to memory of 956 3568 Process not Found 112 PID 3568 wrote to memory of 956 3568 Process not Found 112 PID 956 wrote to memory of 3184 956 cmd.exe 114 PID 956 wrote to memory of 3184 956 cmd.exe 114 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\The-MALWARE-Repo-master\Banking-Malware\Dridex\Trojan.Dridex.A.dll,#11⤵
- Suspicious behavior: EnumeratesProcesses
PID:4164
-
C:\Windows\system32\wlrmdr.exeC:\Windows\system32\wlrmdr.exe1⤵PID:980
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\XB4Xp.cmd1⤵PID:1684
-
C:\Windows\system32\quickassist.exeC:\Windows\system32\quickassist.exe1⤵PID:884
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\ecdHdH.cmd1⤵
- Drops file in System32 directory
PID:948
-
C:\Windows\System32\fodhelper.exe"C:\Windows\System32\fodhelper.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\JgNahPc.cmd2⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\system32\schtasks.exeschtasks.exe /Create /F /TN "Mrlaauv" /TR C:\Windows\system32\ZKbMr\quickassist.exe /SC minute /MO 60 /RL highest3⤵
- Scheduled Task/Job: Scheduled Task
PID:2336
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Mrlaauv"1⤵
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\system32\schtasks.exeschtasks.exe /Query /TN "Mrlaauv"2⤵PID:4188
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Mrlaauv"1⤵
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\system32\schtasks.exeschtasks.exe /Query /TN "Mrlaauv"2⤵PID:1752
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Mrlaauv"1⤵
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\system32\schtasks.exeschtasks.exe /Query /TN "Mrlaauv"2⤵PID:4388
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Mrlaauv"1⤵
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\system32\schtasks.exeschtasks.exe /Query /TN "Mrlaauv"2⤵PID:4412
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /Query /TN "Mrlaauv"1⤵
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\system32\schtasks.exeschtasks.exe /Query /TN "Mrlaauv"2⤵PID:3184
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128B
MD58d37892b468886083feb91bda3aed536
SHA1671d9a3f0643928d940acfc625f759752a2bbd78
SHA256017c1f752d3c00bcf1e73a405797020d54455f4dccd1dd672f67ba4dc3412794
SHA5128038bd9d471d3768a09ddb85990c22a1c3d7dc1beee2d84e388ce9b36b3a1d3a05736de28d0257047b729bdabbcb6a8e1fffa111ddf3401dd802c2e4cdaf82a5
-
Filesize
632KB
MD565795b7f2d043c27520f97ddb211e900
SHA12c76702822f789624fa7d3275e0550be5b8b9883
SHA256362a9458b691042cd6ba3febdb5d2af0b21b101d98fa35371ba8767a15f9960b
SHA512d655b8231895f8fba2a66d31d53f47cd1f5cb305c62d19ecf7646d3162699b775851d4d38e3430db39fd5ef6d1efbae898404e1fcee3d2f53a9ecf7c468ff570
-
Filesize
224B
MD505f24295663398b241058df61cfdbd73
SHA1939c606c1b2859fce1be9c2a4069c593c19acdb7
SHA256677ce7dc658da9adcd7ececa6ceae5d4f5e55624e0254d5d6295ba09568f6736
SHA5124fc6e18be978ad5752e1271fd69c772314c4f7acf1e09f4a75772e09fbf596b74beec69211ca7c2a3341b68c04a03433ce328926a854e4a359219a5649116623
-
Filesize
201B
MD550c9019dfea56bc09d96276e705460a3
SHA15150df374d41ba51a1f67f709699d730b064ab98
SHA256bc914fa18b9c44a276147d7a03d7fab2f9a199b342d4a0595e6e7c99eadbfbdb
SHA5129b321e839d692e9ec2ba0b5cbc78fb5d3330ad4f287d8d509d1a16f94249d0898ab3beff56a29d31ce113749d6d09895d319ebd3ce72a7521f0299f15a1cefbb
-
Filesize
908KB
MD5d70956b318c78f7567501bd5a79635fe
SHA157ab1f1837363b1180ab4356bcad8a493f8201d7
SHA2566f48ec08d6951cf298432431b738c877f345f25579afe378de4bf54fe68ab915
SHA512dec4bde2cc03b797452c549f3239dc0799e211b4aea3e66ee4fe09c73fea82f62847cf102dd878be62f589f33ecece761308c92ab0e4468f188c1470eac11368
-
Filesize
890B
MD564f08117acf8845411cbc15fbdd2c5b1
SHA12848098d42290dbb90ca9f6c4af773859b54df52
SHA256a5844d15113ae6d085c65f5278191e47cac3ddf76438324d5c993a4110ec97f4
SHA51276b0b840bdb4101aa5e303af02bcddaceba1f26a2bc26e6a9216d41e7e84713f6873219cada76e9fd9500bf4d2a8fafe8b0e66ca8b4832c7f0a7b23055aaf790