Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
04-05-2021 09:58
Static task
static1
Behavioral task
behavioral1
Sample
Lanco,pdf.exe
Resource
win7v20210408
General
-
Target
Lanco,pdf.exe
-
Size
245KB
-
MD5
d539972067e967998d09d0a2f1b31b52
-
SHA1
20fce9b0e4e0f86143dfba1259b0293a32d74cbb
-
SHA256
b36a2901bfafd8723bfddd0388f65b0a46237b063ca33edbf773bb589f929981
-
SHA512
ffa91ce8a780bf1a8fb9f2dba0d5fc74744c82a600d6890acafeff6610828e6d8da751b34cb2ea46558c9a2387c66415c82c254c6131467546fbbae19b3bcd65
Malware Config
Extracted
xloader
2.3
http://www.buymobilia.com/ugtw/
keystohumanconnection.com
kba5imberly.xyz
wanshuila.com
haus2690dsgnbuild.com
sf-exprrss.com
volesvip.com
pointmansoutpost.com
rytfs.com
hosoume.com
momentsbymich.com
foxterrier-vonderfinsterley.com
uviibe.com
chiaraborrello.com
ild.academy
chinchinyap.com
cn-emmy.com
ixhaberler.com
styles28.space
schutz-service.com
ycgcwsp.com
wmylb.com
chepuha.info
ddklm.net
vaesports.design
buyroguevalley.com
nuoandianli.com
conmidinerono.com
luchericleaningservices.com
carlapendergraft.com
realtybyaustin.com
callforwebdev.com
rosalestransport.com
shopstashtea.com
fldkfkdklfdklder.com
astrorelay.net
astrokhushbooshokeen.com
beckyhallcoaching.com
littlebrothersandsisters.net
neckoart.com
folkloremine.guru
gabrielaaa.com
allinindustry.com
tepeyacoriginal.com
astardream.com
cunerier.com
urimi-ks.com
point1properties.com
outlawldn.com
malcolmxtc.com
cafe-genova.com
cheapdroptaxi.com
nailsbymoni.com
talbotserver.com
zhbook.net
thekizplay.com
okg11uf.com
docjini.com
augmenteddataanalytics.com
nationwidescholarship.com
warnerconnect.tech
ffseinc.com
shopthehonorcode.mobi
spinewiz.com
adinaroseyoga.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/784-63-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/1732-70-0x0000000000080000-0x00000000000A8000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1564 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
Lanco,pdf.exepid process 1840 Lanco,pdf.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Lanco,pdf.exeLanco,pdf.exeNAPSTAT.EXEdescription pid process target process PID 1840 set thread context of 784 1840 Lanco,pdf.exe Lanco,pdf.exe PID 784 set thread context of 1200 784 Lanco,pdf.exe Explorer.EXE PID 1732 set thread context of 1200 1732 NAPSTAT.EXE Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
Lanco,pdf.exeNAPSTAT.EXEpid process 784 Lanco,pdf.exe 784 Lanco,pdf.exe 1732 NAPSTAT.EXE 1732 NAPSTAT.EXE 1732 NAPSTAT.EXE 1732 NAPSTAT.EXE 1732 NAPSTAT.EXE 1732 NAPSTAT.EXE 1732 NAPSTAT.EXE 1732 NAPSTAT.EXE 1732 NAPSTAT.EXE 1732 NAPSTAT.EXE 1732 NAPSTAT.EXE 1732 NAPSTAT.EXE 1732 NAPSTAT.EXE 1732 NAPSTAT.EXE 1732 NAPSTAT.EXE 1732 NAPSTAT.EXE 1732 NAPSTAT.EXE 1732 NAPSTAT.EXE 1732 NAPSTAT.EXE 1732 NAPSTAT.EXE 1732 NAPSTAT.EXE 1732 NAPSTAT.EXE 1732 NAPSTAT.EXE 1732 NAPSTAT.EXE 1732 NAPSTAT.EXE 1732 NAPSTAT.EXE 1732 NAPSTAT.EXE 1732 NAPSTAT.EXE 1732 NAPSTAT.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1200 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
Lanco,pdf.exeLanco,pdf.exeNAPSTAT.EXEpid process 1840 Lanco,pdf.exe 784 Lanco,pdf.exe 784 Lanco,pdf.exe 784 Lanco,pdf.exe 1732 NAPSTAT.EXE 1732 NAPSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Lanco,pdf.exeNAPSTAT.EXEdescription pid process Token: SeDebugPrivilege 784 Lanco,pdf.exe Token: SeDebugPrivilege 1732 NAPSTAT.EXE -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Lanco,pdf.exeExplorer.EXENAPSTAT.EXEdescription pid process target process PID 1840 wrote to memory of 784 1840 Lanco,pdf.exe Lanco,pdf.exe PID 1840 wrote to memory of 784 1840 Lanco,pdf.exe Lanco,pdf.exe PID 1840 wrote to memory of 784 1840 Lanco,pdf.exe Lanco,pdf.exe PID 1840 wrote to memory of 784 1840 Lanco,pdf.exe Lanco,pdf.exe PID 1840 wrote to memory of 784 1840 Lanco,pdf.exe Lanco,pdf.exe PID 1200 wrote to memory of 1732 1200 Explorer.EXE NAPSTAT.EXE PID 1200 wrote to memory of 1732 1200 Explorer.EXE NAPSTAT.EXE PID 1200 wrote to memory of 1732 1200 Explorer.EXE NAPSTAT.EXE PID 1200 wrote to memory of 1732 1200 Explorer.EXE NAPSTAT.EXE PID 1732 wrote to memory of 1564 1732 NAPSTAT.EXE cmd.exe PID 1732 wrote to memory of 1564 1732 NAPSTAT.EXE cmd.exe PID 1732 wrote to memory of 1564 1732 NAPSTAT.EXE cmd.exe PID 1732 wrote to memory of 1564 1732 NAPSTAT.EXE cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Lanco,pdf.exe"C:\Users\Admin\AppData\Local\Temp\Lanco,pdf.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Lanco,pdf.exe"C:\Users\Admin\AppData\Local\Temp\Lanco,pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\NAPSTAT.EXE"C:\Windows\SysWOW64\NAPSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Lanco,pdf.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nsn9F0F.tmp\b64gt.dllMD5
c51e82e4d8b71b52311dd3b83ed82da8
SHA1d30a8cd5a36fe7d59b1ec9209913e2297e588b7c
SHA2565293ac79c7ae9256c12874bacd71b555250484a139726625ebc414e871616f12
SHA51245127a9290386396b26f050ed653985651c7c19f281743fc3aa9d0f7b69c72a22a9b5fee09c2862360ef3d1b289a1569babd5b25a0861c271efc7f0e15183c93
-
memory/784-65-0x0000000000460000-0x0000000000470000-memory.dmpFilesize
64KB
-
memory/784-61-0x000000000041D040-mapping.dmp
-
memory/784-63-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/784-64-0x00000000008B0000-0x0000000000BB3000-memory.dmpFilesize
3.0MB
-
memory/1200-73-0x0000000006130000-0x0000000006246000-memory.dmpFilesize
1.1MB
-
memory/1200-66-0x0000000004A30000-0x0000000004AFE000-memory.dmpFilesize
824KB
-
memory/1564-68-0x0000000000000000-mapping.dmp
-
memory/1732-67-0x0000000000000000-mapping.dmp
-
memory/1732-69-0x0000000000C10000-0x0000000000C56000-memory.dmpFilesize
280KB
-
memory/1732-70-0x0000000000080000-0x00000000000A8000-memory.dmpFilesize
160KB
-
memory/1732-71-0x0000000002060000-0x0000000002363000-memory.dmpFilesize
3.0MB
-
memory/1732-72-0x00000000008A0000-0x000000000092F000-memory.dmpFilesize
572KB
-
memory/1840-59-0x00000000757C1000-0x00000000757C3000-memory.dmpFilesize
8KB
-
memory/1840-62-0x0000000001C70000-0x0000000001C72000-memory.dmpFilesize
8KB