Analysis
-
max time kernel
3s -
max time network
8s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
04-03-2021 08:03
Static task
static1
Behavioral task
behavioral1
Sample
7b6e0668659b20f30bdf81025247a199.exe
Resource
win7v20201028
General
-
Target
7b6e0668659b20f30bdf81025247a199.exe
-
Size
218KB
-
MD5
7b6e0668659b20f30bdf81025247a199
-
SHA1
27f1e8665c5423b43a5ad11a7d3762c539fbef9c
-
SHA256
34066150ffa7efa505b8d2246925cd8a32f83b9609438ae76aa27cef7388054d
-
SHA512
62b1bb025e1ba2969dbed85c6c96ef4f0c78fc9c58db4442c441f70a6587e9e3421717c67c12ffd95f0e7347b941fd389cadc97be4cac612e02f71388e2e05b4
Malware Config
Extracted
xloader
http://www.856380692.xyz/nsag/
usopencoverage.com
5bo5j.com
deliveryourvote.com
bestbuycarpethd.com
worldsourcecloud.com
glowtheblog.com
translations.tools
ithacapella.com
machinerysubway.com
aashlokhospitals.com
athara-kiano.com
anabittencourt.com
hakimkhawatmi.com
fashionwatchesstore.com
krishnagiri.info
tencenttexts.com
kodairo.com
ouitum.club
robertbeauford.net
polling.asia
evoslancete.com
4676sabalkey.com
chechadskeitaro.com
babyhopeful.com
11376.xyz
oryanomer.com
jyxxfy.com
scanourworld.com
thevistadrinksco.com
meow-cafe.com
xfixpros.com
botaniquecouture.com
bkhlep.xyz
mauriciozarate.com
icepolo.com
siyezim.com
myfeezinc.com
nooshone.com
wholesalerbargains.com
winabeel.com
frankfrango.com
patientsbooking.info
ineedahealer.com
thefamilyorchard.net
clericallyco.com
overseaexpert.com
bukaino.net
womens-secrets.love
skinjunkie.site
dccheavydutydiv.net
explorerthecity.com
droneserviceshouston.com
creationsbyjamie.com
profirma-nachfolge.com
oasisbracelet.com
maurobenetti.com
mecs.club
mistressofherdivinity.com
vooronsland.com
navia.world
commagx4.info
caresring.com
yourstrivingforexcellence.com
alpinevalleytimeshares.com
Signatures
-
Xloader Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1992-5-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Loads dropped DLL 1 IoCs
Processes:
7b6e0668659b20f30bdf81025247a199.exepid process 1932 7b6e0668659b20f30bdf81025247a199.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
7b6e0668659b20f30bdf81025247a199.exedescription pid process target process PID 1932 set thread context of 1992 1932 7b6e0668659b20f30bdf81025247a199.exe 7b6e0668659b20f30bdf81025247a199.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
7b6e0668659b20f30bdf81025247a199.exe7b6e0668659b20f30bdf81025247a199.exepid process 1932 7b6e0668659b20f30bdf81025247a199.exe 1932 7b6e0668659b20f30bdf81025247a199.exe 1932 7b6e0668659b20f30bdf81025247a199.exe 1932 7b6e0668659b20f30bdf81025247a199.exe 1992 7b6e0668659b20f30bdf81025247a199.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
7b6e0668659b20f30bdf81025247a199.exepid process 1932 7b6e0668659b20f30bdf81025247a199.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
7b6e0668659b20f30bdf81025247a199.exedescription pid process target process PID 1932 wrote to memory of 1992 1932 7b6e0668659b20f30bdf81025247a199.exe 7b6e0668659b20f30bdf81025247a199.exe PID 1932 wrote to memory of 1992 1932 7b6e0668659b20f30bdf81025247a199.exe 7b6e0668659b20f30bdf81025247a199.exe PID 1932 wrote to memory of 1992 1932 7b6e0668659b20f30bdf81025247a199.exe 7b6e0668659b20f30bdf81025247a199.exe PID 1932 wrote to memory of 1992 1932 7b6e0668659b20f30bdf81025247a199.exe 7b6e0668659b20f30bdf81025247a199.exe PID 1932 wrote to memory of 1992 1932 7b6e0668659b20f30bdf81025247a199.exe 7b6e0668659b20f30bdf81025247a199.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b6e0668659b20f30bdf81025247a199.exe"C:\Users\Admin\AppData\Local\Temp\7b6e0668659b20f30bdf81025247a199.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\7b6e0668659b20f30bdf81025247a199.exe"C:\Users\Admin\AppData\Local\Temp\7b6e0668659b20f30bdf81025247a199.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1992
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
4ad8a4a30a1cc665078b16cebcc04ae3
SHA1fa62f869142deb3ab2c83e2d80be9030363aa443
SHA256d080eadcd3766d785ab5cdebc15e67f4b18027241aa724b5581b68d26229cb06
SHA5124b0bd177f13eae8f2762ca291ecfc9a4b95bc22795920259e8646d9912d547a3994525762bcfb66036e4a1cab155b32d694ef43ec6c4a3999b40f05a82711da0