Overview
overview
10Static
static
URLScan
urlscan
https://ankltraffice...
windows7_x64
6https://ankltraffice...
windows7_x64
1https://ankltraffice...
windows7_x64
1https://ankltraffice...
windows7_x64
1https://ankltraffice...
windows10_x64
10https://ankltraffice...
windows10_x64
10https://ankltraffice...
windows10_x64
10https://ankltraffice...
windows10_x64
10https://ankltraffice...
windows10_x64
General
Static task
static1
URLScan task
urlscan1
Sample
https://ankltrafficexit.xyz/trafficexit
Behavioral task
behavioral1
Sample
https://ankltrafficexit.xyz/trafficexit
Resource
win7-jp
Behavioral task
behavioral2
Sample
https://ankltrafficexit.xyz/trafficexit
Resource
win7-fr
Behavioral task
behavioral3
Sample
https://ankltrafficexit.xyz/trafficexit
Resource
win7v20210408
Behavioral task
behavioral4
Sample
https://ankltrafficexit.xyz/trafficexit
Resource
win7-de
Behavioral task
behavioral5
Sample
https://ankltrafficexit.xyz/trafficexit
Resource
win10v20210408
Behavioral task
behavioral6
Sample
https://ankltrafficexit.xyz/trafficexit
Resource
win10-jp
Behavioral task
behavioral7
Sample
https://ankltrafficexit.xyz/trafficexit
Resource
win10-fr
Behavioral task
behavioral8
Sample
https://ankltrafficexit.xyz/trafficexit
Resource
win10-en
Behavioral task
behavioral9
Sample
https://ankltrafficexit.xyz/trafficexit
Resource
win10-de
Malware Config
Extracted
dridex
10111
104.152.111.198:9676
92.247.29.75:10172
133.242.136.130:8194
Targets
-
-
Target
https://ankltrafficexit.xyz/trafficexit
-
Modifies system executable filetype association
-
Registers COM server for autorun
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Program crash
-
Drops file in System32 directory
-