Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
21-04-2021 18:24
Static task
static1
Behavioral task
behavioral1
Sample
BANKINV280308VBSINO.exe
Resource
win7v20210408
General
-
Target
BANKINV280308VBSINO.exe
-
Size
845KB
-
MD5
6fe314b5b083a64d830a528ba0568d70
-
SHA1
6875a0afb8f02b27ac0b1aca81571bdb8e427f65
-
SHA256
a09c8246d5ddd3d7b444c2b89ae0b486b767e30d7340efb2d92e07ab7a806109
-
SHA512
ff7d760d603890f3382cda0ab9becfceff2783011a4fcec28b4655892126e5c14619729238cfbda63110d14a3f5cf346258bc12ddc97bb9267ce864fa1584aa9
Malware Config
Extracted
xloader
2.3
http://www.trendyheld.com/edbs/
ehealthak.com
kingdavidtiferetshop.com
allincursive.com
quickshop.xyz
hallfaxgroupuk.online
barebeautybrand.com
verificationpays.com
2k20-aide.com
cameralogs.com
blackdotdesignco.com
thepredictable360.com
huangguanlin600270.com
hounslowkebab.com
kuppers.info
ohjoephoto.com
bhavyaarora.com
thecoolprojector.com
abelprocess.com
856379765.xyz
growth.run
skin-win.net
dovepethospital.com
mchglobe.com
roleta.site
kolmonitor.com
clientcentre.net
vietngapcapp.info
cakeunderwear.com
hilleye24.com
gekijyou.com
bohemianquill.com
subjectfield.store
highclassmassage.club
buttergolfco.com
mangaarabic.com
sagemenerji.com
mastermind-kc.com
affiliate-revenue.site
ienvoices.com
lojewski4assembly.com
mitchellbarnesphoto.com
daghidelivery.com
daturanatura.com
royaltylashesnola.com
meemtee.com
stevenemily.com
hessbbqsweeps.com
worldofannabel.com
best-tuning.com
ichaugames.com
doctors4change.net
haoshi68.com
yourrealestaterealtor.com
schekerland.com
siguelacorriente.com
rockthomasonline.com
amewolf.com
bawakamus.online
puntopymeschile.com
empiricalmystic.com
hxc28.com
nzessential.com
jennamariehoward.com
pranatarot.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3900-126-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/3900-127-0x000000000041D030-mapping.dmp xloader behavioral2/memory/1404-134-0x0000000000180000-0x00000000001A8000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
BANKINV280308VBSINO.exeRegSvcs.exeipconfig.exedescription pid process target process PID 3944 set thread context of 3900 3944 BANKINV280308VBSINO.exe RegSvcs.exe PID 3900 set thread context of 2492 3900 RegSvcs.exe Explorer.EXE PID 1404 set thread context of 2492 1404 ipconfig.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 1404 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
Processes:
BANKINV280308VBSINO.exeRegSvcs.exeipconfig.exepid process 3944 BANKINV280308VBSINO.exe 3944 BANKINV280308VBSINO.exe 3944 BANKINV280308VBSINO.exe 3900 RegSvcs.exe 3900 RegSvcs.exe 3900 RegSvcs.exe 3900 RegSvcs.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe 1404 ipconfig.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2492 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
RegSvcs.exeipconfig.exepid process 3900 RegSvcs.exe 3900 RegSvcs.exe 3900 RegSvcs.exe 1404 ipconfig.exe 1404 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
BANKINV280308VBSINO.exeRegSvcs.exeipconfig.exedescription pid process Token: SeDebugPrivilege 3944 BANKINV280308VBSINO.exe Token: SeDebugPrivilege 3900 RegSvcs.exe Token: SeDebugPrivilege 1404 ipconfig.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 2492 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
BANKINV280308VBSINO.exeExplorer.EXEipconfig.exedescription pid process target process PID 3944 wrote to memory of 3228 3944 BANKINV280308VBSINO.exe schtasks.exe PID 3944 wrote to memory of 3228 3944 BANKINV280308VBSINO.exe schtasks.exe PID 3944 wrote to memory of 3228 3944 BANKINV280308VBSINO.exe schtasks.exe PID 3944 wrote to memory of 3872 3944 BANKINV280308VBSINO.exe RegSvcs.exe PID 3944 wrote to memory of 3872 3944 BANKINV280308VBSINO.exe RegSvcs.exe PID 3944 wrote to memory of 3872 3944 BANKINV280308VBSINO.exe RegSvcs.exe PID 3944 wrote to memory of 3900 3944 BANKINV280308VBSINO.exe RegSvcs.exe PID 3944 wrote to memory of 3900 3944 BANKINV280308VBSINO.exe RegSvcs.exe PID 3944 wrote to memory of 3900 3944 BANKINV280308VBSINO.exe RegSvcs.exe PID 3944 wrote to memory of 3900 3944 BANKINV280308VBSINO.exe RegSvcs.exe PID 3944 wrote to memory of 3900 3944 BANKINV280308VBSINO.exe RegSvcs.exe PID 3944 wrote to memory of 3900 3944 BANKINV280308VBSINO.exe RegSvcs.exe PID 2492 wrote to memory of 1404 2492 Explorer.EXE ipconfig.exe PID 2492 wrote to memory of 1404 2492 Explorer.EXE ipconfig.exe PID 2492 wrote to memory of 1404 2492 Explorer.EXE ipconfig.exe PID 1404 wrote to memory of 1760 1404 ipconfig.exe cmd.exe PID 1404 wrote to memory of 1760 1404 ipconfig.exe cmd.exe PID 1404 wrote to memory of 1760 1404 ipconfig.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\BANKINV280308VBSINO.exe"C:\Users\Admin\AppData\Local\Temp\BANKINV280308VBSINO.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SxbGfivF" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8979.tmp"3⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp8979.tmpMD5
2a722f99b511884e23f2e4769e2464c2
SHA1cedaac4b88d4230b73a6247e571ce9b08f949ca5
SHA2566229bb50221fc3970ed91e27516c8f767719ac97f36a7ca4274bdbcecfb475f4
SHA512e704dcd5ab629ce6dcc44405563dc4f23385d6f3915bdf9370244b733be584966fd167810792d2d077c8a85b849f87a49013711eae03fca6b3c1cd11dcded0a8
-
memory/1404-137-0x0000000002940000-0x00000000029CF000-memory.dmpFilesize
572KB
-
memory/1404-135-0x0000000002AE0000-0x0000000002E00000-memory.dmpFilesize
3.1MB
-
memory/1404-134-0x0000000000180000-0x00000000001A8000-memory.dmpFilesize
160KB
-
memory/1404-133-0x0000000000240000-0x000000000024B000-memory.dmpFilesize
44KB
-
memory/1404-132-0x0000000000000000-mapping.dmp
-
memory/1760-136-0x0000000000000000-mapping.dmp
-
memory/2492-138-0x00000000059F0000-0x0000000005B25000-memory.dmpFilesize
1.2MB
-
memory/2492-131-0x00000000058D0000-0x00000000059D9000-memory.dmpFilesize
1.0MB
-
memory/3228-124-0x0000000000000000-mapping.dmp
-
memory/3900-129-0x00000000012C0000-0x00000000015E0000-memory.dmpFilesize
3.1MB
-
memory/3900-126-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/3900-127-0x000000000041D030-mapping.dmp
-
memory/3900-130-0x00000000009F0000-0x0000000000A00000-memory.dmpFilesize
64KB
-
memory/3944-123-0x000000000B080000-0x000000000B0FA000-memory.dmpFilesize
488KB
-
memory/3944-114-0x0000000000860000-0x0000000000861000-memory.dmpFilesize
4KB
-
memory/3944-122-0x00000000088E0000-0x00000000089A9000-memory.dmpFilesize
804KB
-
memory/3944-121-0x0000000006CB0000-0x0000000006CB1000-memory.dmpFilesize
4KB
-
memory/3944-120-0x0000000005320000-0x000000000532E000-memory.dmpFilesize
56KB
-
memory/3944-119-0x0000000005130000-0x00000000051C2000-memory.dmpFilesize
584KB
-
memory/3944-118-0x0000000005170000-0x0000000005171000-memory.dmpFilesize
4KB
-
memory/3944-117-0x0000000005210000-0x0000000005211000-memory.dmpFilesize
4KB
-
memory/3944-116-0x0000000005710000-0x0000000005711000-memory.dmpFilesize
4KB