Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
21-04-2021 18:24
Static task
static1
Behavioral task
behavioral1
Sample
BANKINV280308VBSINO.exe
Resource
win7v20210408
General
-
Target
BANKINV280308VBSINO.exe
-
Size
845KB
-
MD5
6fe314b5b083a64d830a528ba0568d70
-
SHA1
6875a0afb8f02b27ac0b1aca81571bdb8e427f65
-
SHA256
a09c8246d5ddd3d7b444c2b89ae0b486b767e30d7340efb2d92e07ab7a806109
-
SHA512
ff7d760d603890f3382cda0ab9becfceff2783011a4fcec28b4655892126e5c14619729238cfbda63110d14a3f5cf346258bc12ddc97bb9267ce864fa1584aa9
Malware Config
Extracted
xloader
2.3
http://www.trendyheld.com/edbs/
ehealthak.com
kingdavidtiferetshop.com
allincursive.com
quickshop.xyz
hallfaxgroupuk.online
barebeautybrand.com
verificationpays.com
2k20-aide.com
cameralogs.com
blackdotdesignco.com
thepredictable360.com
huangguanlin600270.com
hounslowkebab.com
kuppers.info
ohjoephoto.com
bhavyaarora.com
thecoolprojector.com
abelprocess.com
856379765.xyz
growth.run
skin-win.net
dovepethospital.com
mchglobe.com
roleta.site
kolmonitor.com
clientcentre.net
vietngapcapp.info
cakeunderwear.com
hilleye24.com
gekijyou.com
bohemianquill.com
subjectfield.store
highclassmassage.club
buttergolfco.com
mangaarabic.com
sagemenerji.com
mastermind-kc.com
affiliate-revenue.site
ienvoices.com
lojewski4assembly.com
mitchellbarnesphoto.com
daghidelivery.com
daturanatura.com
royaltylashesnola.com
meemtee.com
stevenemily.com
hessbbqsweeps.com
worldofannabel.com
best-tuning.com
ichaugames.com
doctors4change.net
haoshi68.com
yourrealestaterealtor.com
schekerland.com
siguelacorriente.com
rockthomasonline.com
amewolf.com
bawakamus.online
puntopymeschile.com
empiricalmystic.com
hxc28.com
nzessential.com
jennamariehoward.com
pranatarot.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1564-68-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/1564-69-0x000000000041D030-mapping.dmp xloader behavioral1/memory/536-78-0x00000000000C0000-0x00000000000E8000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
Processes:
BANKINV280308VBSINO.exeRegSvcs.exewlanext.exedescription pid process target process PID 1684 set thread context of 1564 1684 BANKINV280308VBSINO.exe RegSvcs.exe PID 1564 set thread context of 1228 1564 RegSvcs.exe Explorer.EXE PID 1564 set thread context of 1228 1564 RegSvcs.exe Explorer.EXE PID 536 set thread context of 1228 536 wlanext.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 24 IoCs
Processes:
BANKINV280308VBSINO.exeRegSvcs.exewlanext.exepid process 1684 BANKINV280308VBSINO.exe 1684 BANKINV280308VBSINO.exe 1684 BANKINV280308VBSINO.exe 1564 RegSvcs.exe 1564 RegSvcs.exe 1564 RegSvcs.exe 536 wlanext.exe 536 wlanext.exe 536 wlanext.exe 536 wlanext.exe 536 wlanext.exe 536 wlanext.exe 536 wlanext.exe 536 wlanext.exe 536 wlanext.exe 536 wlanext.exe 536 wlanext.exe 536 wlanext.exe 536 wlanext.exe 536 wlanext.exe 536 wlanext.exe 536 wlanext.exe 536 wlanext.exe 536 wlanext.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
RegSvcs.exewlanext.exepid process 1564 RegSvcs.exe 1564 RegSvcs.exe 1564 RegSvcs.exe 1564 RegSvcs.exe 536 wlanext.exe 536 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
BANKINV280308VBSINO.exeRegSvcs.exewlanext.exedescription pid process Token: SeDebugPrivilege 1684 BANKINV280308VBSINO.exe Token: SeDebugPrivilege 1564 RegSvcs.exe Token: SeDebugPrivilege 536 wlanext.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
Processes:
BANKINV280308VBSINO.exeExplorer.EXEwlanext.exedescription pid process target process PID 1684 wrote to memory of 852 1684 BANKINV280308VBSINO.exe schtasks.exe PID 1684 wrote to memory of 852 1684 BANKINV280308VBSINO.exe schtasks.exe PID 1684 wrote to memory of 852 1684 BANKINV280308VBSINO.exe schtasks.exe PID 1684 wrote to memory of 852 1684 BANKINV280308VBSINO.exe schtasks.exe PID 1684 wrote to memory of 1504 1684 BANKINV280308VBSINO.exe RegSvcs.exe PID 1684 wrote to memory of 1504 1684 BANKINV280308VBSINO.exe RegSvcs.exe PID 1684 wrote to memory of 1504 1684 BANKINV280308VBSINO.exe RegSvcs.exe PID 1684 wrote to memory of 1504 1684 BANKINV280308VBSINO.exe RegSvcs.exe PID 1684 wrote to memory of 1504 1684 BANKINV280308VBSINO.exe RegSvcs.exe PID 1684 wrote to memory of 1504 1684 BANKINV280308VBSINO.exe RegSvcs.exe PID 1684 wrote to memory of 1504 1684 BANKINV280308VBSINO.exe RegSvcs.exe PID 1684 wrote to memory of 1564 1684 BANKINV280308VBSINO.exe RegSvcs.exe PID 1684 wrote to memory of 1564 1684 BANKINV280308VBSINO.exe RegSvcs.exe PID 1684 wrote to memory of 1564 1684 BANKINV280308VBSINO.exe RegSvcs.exe PID 1684 wrote to memory of 1564 1684 BANKINV280308VBSINO.exe RegSvcs.exe PID 1684 wrote to memory of 1564 1684 BANKINV280308VBSINO.exe RegSvcs.exe PID 1684 wrote to memory of 1564 1684 BANKINV280308VBSINO.exe RegSvcs.exe PID 1684 wrote to memory of 1564 1684 BANKINV280308VBSINO.exe RegSvcs.exe PID 1684 wrote to memory of 1564 1684 BANKINV280308VBSINO.exe RegSvcs.exe PID 1684 wrote to memory of 1564 1684 BANKINV280308VBSINO.exe RegSvcs.exe PID 1684 wrote to memory of 1564 1684 BANKINV280308VBSINO.exe RegSvcs.exe PID 1228 wrote to memory of 536 1228 Explorer.EXE wlanext.exe PID 1228 wrote to memory of 536 1228 Explorer.EXE wlanext.exe PID 1228 wrote to memory of 536 1228 Explorer.EXE wlanext.exe PID 1228 wrote to memory of 536 1228 Explorer.EXE wlanext.exe PID 536 wrote to memory of 548 536 wlanext.exe cmd.exe PID 536 wrote to memory of 548 536 wlanext.exe cmd.exe PID 536 wrote to memory of 548 536 wlanext.exe cmd.exe PID 536 wrote to memory of 548 536 wlanext.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\BANKINV280308VBSINO.exe"C:\Users\Admin\AppData\Local\Temp\BANKINV280308VBSINO.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SxbGfivF" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2ECE.tmp"3⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp2ECE.tmpMD5
40eaa4d0429ab80fe6bdf07f694e3752
SHA1616597719c8b2bfa8b89d12897841dcdece13ad4
SHA256a1d6d464456a6f826ec0faa8c79115fb05aa3a4526425b2e3fb48175819e3151
SHA512379dbe69480290ecf7e60e7da13eae1e790667f2d239128723506defab593c2d032a6866c63f2a9f767a7c90bc1c0a584187b0b0bc9bf092ce2e6ad9969de11d
-
memory/536-76-0x0000000000000000-mapping.dmp
-
memory/536-81-0x00000000007F0000-0x000000000087F000-memory.dmpFilesize
572KB
-
memory/536-80-0x0000000001FD0000-0x00000000022D3000-memory.dmpFilesize
3.0MB
-
memory/536-77-0x0000000000A20000-0x0000000000A36000-memory.dmpFilesize
88KB
-
memory/536-78-0x00000000000C0000-0x00000000000E8000-memory.dmpFilesize
160KB
-
memory/548-79-0x0000000000000000-mapping.dmp
-
memory/852-66-0x0000000000000000-mapping.dmp
-
memory/1228-73-0x0000000004220000-0x00000000042F1000-memory.dmpFilesize
836KB
-
memory/1228-82-0x0000000003E90000-0x0000000003F46000-memory.dmpFilesize
728KB
-
memory/1228-75-0x00000000067D0000-0x0000000006953000-memory.dmpFilesize
1.5MB
-
memory/1564-68-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1564-74-0x00000000002C0000-0x00000000002D0000-memory.dmpFilesize
64KB
-
memory/1564-72-0x0000000000270000-0x0000000000280000-memory.dmpFilesize
64KB
-
memory/1564-69-0x000000000041D030-mapping.dmp
-
memory/1564-71-0x00000000008A0000-0x0000000000BA3000-memory.dmpFilesize
3.0MB
-
memory/1684-60-0x00000000010A0000-0x00000000010A1000-memory.dmpFilesize
4KB
-
memory/1684-65-0x00000000060B0000-0x000000000612A000-memory.dmpFilesize
488KB
-
memory/1684-64-0x0000000008000000-0x00000000080C9000-memory.dmpFilesize
804KB
-
memory/1684-63-0x00000000003D0000-0x00000000003DE000-memory.dmpFilesize
56KB
-
memory/1684-62-0x0000000000DA0000-0x0000000000DA1000-memory.dmpFilesize
4KB