Analysis
-
max time kernel
23s -
max time network
25s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
03-05-2021 08:51
Static task
static1
Behavioral task
behavioral1
Sample
fb6c841478354f42dd2baa5e0b617dff.exe
Resource
win7v20210408
General
-
Target
fb6c841478354f42dd2baa5e0b617dff.exe
-
Size
207KB
-
MD5
fb6c841478354f42dd2baa5e0b617dff
-
SHA1
c1d1212b6e7cae77ae2d617f461a7d6003cb6c6c
-
SHA256
b55552391ee123f26e577b412c0df78bd0a59644ec510d1e7e708feff12a2abb
-
SHA512
49fdaae6792f72de12b4303c4a1874a99e7d1c69bb32cb37d59d9e207e693cdf90612f5ec8278cd7e1cb8c1d1dcd8124b7f66165ed6730ab5c1ec0e8cc8dddb8
Malware Config
Extracted
xloader
2.3
http://www.montcoimmigrationlawyer.com/uoe8/
chalance.design
certifiedlaywernj.com
bsbgraphic.com
caeka.com
zagorafinancial.com
cvingenieriacivil.net
mojilifenoosa.com
bucktheherd.net
sparkmonic.com
catherineandwilson.com
cdefenders.com
intersp.net
santoriniimpressivetours.net
arkansaspaymentrelief.com
tewab.com
bjzjgjg.com
michgoliki.com
oallahplease.com
plaisterpress.com
redyroblx.com
funnyfootballmugs.com
borderlesstrade.info
partequity.net
3992199.com
bestcoloncleanseblog.com
online-legalservices.com
fibermover.com
magen-tracks.xyz
hotelsinshirdimkm.com
beachjunction.com
lanren.plus
nouvellecartebancaire.com
thegiftsofdepression.com
metabol.parts
dvxdkrbll.icu
flsprayer.com
przyczepy.net
cantinhosdeaparecida.com
californiasecuritycamera.com
nevadasmallbusinessattorney.com
skipperdaily.com
missjeschickt.com
rocketmortgageshady.net
upholsteredwineracks.com
best20singles.com
fsquanyi.com
ronlinebiz.com
gaelmobilecarwash.com
commercials.pro
bl927.com
workforceuae.com
innercritictypes.com
unipacksexpress.com
chaitanya99.com
rangamaty.com
7chd.com
keydefi.com
liveporn.wiki
carajedellcasting.com
gooddoggymedia.com
boldercoolware.com
hispekdiamond.com
expnashvilletn.com
swashbug.com
Signatures
-
Xloader Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1348-63-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Loads dropped DLL 1 IoCs
Processes:
fb6c841478354f42dd2baa5e0b617dff.exepid process 340 fb6c841478354f42dd2baa5e0b617dff.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fb6c841478354f42dd2baa5e0b617dff.exedescription pid process target process PID 340 set thread context of 1348 340 fb6c841478354f42dd2baa5e0b617dff.exe fb6c841478354f42dd2baa5e0b617dff.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
fb6c841478354f42dd2baa5e0b617dff.exepid process 1348 fb6c841478354f42dd2baa5e0b617dff.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
fb6c841478354f42dd2baa5e0b617dff.exepid process 340 fb6c841478354f42dd2baa5e0b617dff.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
fb6c841478354f42dd2baa5e0b617dff.exedescription pid process target process PID 340 wrote to memory of 1348 340 fb6c841478354f42dd2baa5e0b617dff.exe fb6c841478354f42dd2baa5e0b617dff.exe PID 340 wrote to memory of 1348 340 fb6c841478354f42dd2baa5e0b617dff.exe fb6c841478354f42dd2baa5e0b617dff.exe PID 340 wrote to memory of 1348 340 fb6c841478354f42dd2baa5e0b617dff.exe fb6c841478354f42dd2baa5e0b617dff.exe PID 340 wrote to memory of 1348 340 fb6c841478354f42dd2baa5e0b617dff.exe fb6c841478354f42dd2baa5e0b617dff.exe PID 340 wrote to memory of 1348 340 fb6c841478354f42dd2baa5e0b617dff.exe fb6c841478354f42dd2baa5e0b617dff.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb6c841478354f42dd2baa5e0b617dff.exe"C:\Users\Admin\AppData\Local\Temp\fb6c841478354f42dd2baa5e0b617dff.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Users\Admin\AppData\Local\Temp\fb6c841478354f42dd2baa5e0b617dff.exe"C:\Users\Admin\AppData\Local\Temp\fb6c841478354f42dd2baa5e0b617dff.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1348
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
40ad901ded07128f45c05b24c6aee1e0
SHA1cdf241938b7e2574ad66ced23de599dc7e523bc8
SHA25615e60d9e5fa792cd5cc27efc82d3f678cb4b75e28db4ae0161674f48f91977ab
SHA512b21ab6c90e1bde8ffeb96eedc9ac580eb33a13489dc2d786951fd976034b55d36b28bb720efdbdf30437848ac57c6d5844678a0896c219e85fe71a462904b0d3