Analysis
-
max time kernel
3s -
max time network
8s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
04-03-2021 10:21
Static task
static1
Behavioral task
behavioral1
Sample
c8cb664fed47b0347a3e70df2d119327.exe
Resource
win7v20201028
General
-
Target
c8cb664fed47b0347a3e70df2d119327.exe
-
Size
218KB
-
MD5
c8cb664fed47b0347a3e70df2d119327
-
SHA1
26ebf61a4bd3cbef9e294dab68ee8459cfc456e4
-
SHA256
86071c5800d553ea0cac697f9188a7b592aa9336bf59302545b14aed8b13ce11
-
SHA512
8aeda509d035a7fe585c9c132d7dbdeb26a2fb64aae5769f275af5d7c79b1ff112a13f0e4f3d7c065ba1e3081f1048cdbb4608625e6552de3c6433aa7ed623e3
Malware Config
Extracted
xloader
http://www.856380692.xyz/nsag/
usopencoverage.com
5bo5j.com
deliveryourvote.com
bestbuycarpethd.com
worldsourcecloud.com
glowtheblog.com
translations.tools
ithacapella.com
machinerysubway.com
aashlokhospitals.com
athara-kiano.com
anabittencourt.com
hakimkhawatmi.com
fashionwatchesstore.com
krishnagiri.info
tencenttexts.com
kodairo.com
ouitum.club
robertbeauford.net
polling.asia
evoslancete.com
4676sabalkey.com
chechadskeitaro.com
babyhopeful.com
11376.xyz
oryanomer.com
jyxxfy.com
scanourworld.com
thevistadrinksco.com
meow-cafe.com
xfixpros.com
botaniquecouture.com
bkhlep.xyz
mauriciozarate.com
icepolo.com
siyezim.com
myfeezinc.com
nooshone.com
wholesalerbargains.com
winabeel.com
frankfrango.com
patientsbooking.info
ineedahealer.com
thefamilyorchard.net
clericallyco.com
overseaexpert.com
bukaino.net
womens-secrets.love
skinjunkie.site
dccheavydutydiv.net
explorerthecity.com
droneserviceshouston.com
creationsbyjamie.com
profirma-nachfolge.com
oasisbracelet.com
maurobenetti.com
mecs.club
mistressofherdivinity.com
vooronsland.com
navia.world
commagx4.info
caresring.com
yourstrivingforexcellence.com
alpinevalleytimeshares.com
Signatures
-
Xloader Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1984-5-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Loads dropped DLL 1 IoCs
Processes:
c8cb664fed47b0347a3e70df2d119327.exepid process 1932 c8cb664fed47b0347a3e70df2d119327.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
c8cb664fed47b0347a3e70df2d119327.exedescription pid process target process PID 1932 set thread context of 1984 1932 c8cb664fed47b0347a3e70df2d119327.exe c8cb664fed47b0347a3e70df2d119327.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
c8cb664fed47b0347a3e70df2d119327.exec8cb664fed47b0347a3e70df2d119327.exepid process 1932 c8cb664fed47b0347a3e70df2d119327.exe 1932 c8cb664fed47b0347a3e70df2d119327.exe 1932 c8cb664fed47b0347a3e70df2d119327.exe 1932 c8cb664fed47b0347a3e70df2d119327.exe 1984 c8cb664fed47b0347a3e70df2d119327.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
c8cb664fed47b0347a3e70df2d119327.exepid process 1932 c8cb664fed47b0347a3e70df2d119327.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
c8cb664fed47b0347a3e70df2d119327.exedescription pid process target process PID 1932 wrote to memory of 1984 1932 c8cb664fed47b0347a3e70df2d119327.exe c8cb664fed47b0347a3e70df2d119327.exe PID 1932 wrote to memory of 1984 1932 c8cb664fed47b0347a3e70df2d119327.exe c8cb664fed47b0347a3e70df2d119327.exe PID 1932 wrote to memory of 1984 1932 c8cb664fed47b0347a3e70df2d119327.exe c8cb664fed47b0347a3e70df2d119327.exe PID 1932 wrote to memory of 1984 1932 c8cb664fed47b0347a3e70df2d119327.exe c8cb664fed47b0347a3e70df2d119327.exe PID 1932 wrote to memory of 1984 1932 c8cb664fed47b0347a3e70df2d119327.exe c8cb664fed47b0347a3e70df2d119327.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8cb664fed47b0347a3e70df2d119327.exe"C:\Users\Admin\AppData\Local\Temp\c8cb664fed47b0347a3e70df2d119327.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\c8cb664fed47b0347a3e70df2d119327.exe"C:\Users\Admin\AppData\Local\Temp\c8cb664fed47b0347a3e70df2d119327.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nsc2CF.tmp\juydm.dllMD5
d47373172c47da498eb7e24441e1b062
SHA141471188d2131a39c53fd75723ae6fc5dd9d78c3
SHA2563756b2e35c8585028c7d7806507c60f6c58ff031235c2bf90e7078f5c22fbe15
SHA512ec5ba1cd1602f7dd47c76f393acbfa82932ce81bdc459ad8640b2a9dc59325810b2b5ade27a55fdafae12ca9618fd0b1260d8a90bc8a91237a04999393c9bd66
-
memory/1932-2-0x00000000750C1000-0x00000000750C3000-memory.dmpFilesize
8KB
-
memory/1984-4-0x000000000041D000-mapping.dmp
-
memory/1984-5-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1984-6-0x0000000000840000-0x0000000000B43000-memory.dmpFilesize
3.0MB