Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
21-07-2021 14:03
Static task
static1
Behavioral task
behavioral1
Sample
NEW ORDER DWG.exe
Resource
win7v20210410
General
-
Target
NEW ORDER DWG.exe
-
Size
64KB
-
MD5
29aa61fab0d0a3868c1bfc5af0573740
-
SHA1
6d0d3f16b8210385416f80d5dd52f88bc22d78b2
-
SHA256
13bce5abe3e50d2d91387b5de52da3b3339e0139d01072cca59114de61c58c44
-
SHA512
4c05803880d69203b9baee670638841c01e1065c3da0c93af38ab7c8e4cdf53e263c92e41105a2ec28af9247c6371636e915fdb15572f3495e0d381174625516
Malware Config
Extracted
xloader
2.3
http://www.sayhellosarah.com/0tog/
corona-info.space
laleach.com
dofreemovies.com
buntunm3.com
oxfordplainsdragway.info
hillsoverlandgear.com
unserenervos.xyz
mateacs.com
galepresbyterian.net
onlineorderingmadeeazy.com
simplyrhodeisland.com
vacandsew360.com
aspokanehome.com
shirleyswigshopinc.com
ymtfb16.com
yourpublishinganddesign.com
cbdafy.com
txtravelnurse.com
atonalai.net
ndiatv.com
zinniasweaters.com
xn--adblack-cya.com
cloudzella.com
speightslawnmaintenance.com
sp398.site
uhrengold.com
wellshelp.com
tjjj.net
bighomip.com
dinoksa.com
haribharisociety.com
mamachengsauce.com
missbabss.com
noisi.vision
debratreesaudiology.com
loafri.com
refunder.net
bethterryhelps.com
ibrahimbusiness.com
thumbnails.pro
mountstat.com
anlegerfuchs.com
thecustomokie.com
productoramag.com
kopenschoenennl.com
nyh.xyz
letsstartsavingnow.com
sliceworkshop.com
wuguxian.net
bebasauction.com
oddthingsforsale.com
trademarkinjury.com
diss6.com
yinnantech.com
belaronconsulting.com
testcaresort.com
shoppingnow1.club
hotelboutiquemarrakesh.com
debamnurshing.com
ppxfaka.xyz
dotpayasam.com
c63hristine.xyz
arabacekilisleri.com
wl-takarakuji.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/920-68-0x000000000041CFE0-mapping.dmp xloader behavioral1/memory/920-67-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/328-76-0x0000000000070000-0x0000000000098000-memory.dmp xloader -
Drops startup file 3 IoCs
Processes:
cmd.exeNEW ORDER DWG.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NEW ORDER DWG.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NEW ORDER DWG.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NEW ORDER DWG.exe NEW ORDER DWG.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
NEW ORDER DWG.exeNEW ORDER DWG.execscript.exedescription pid process target process PID 752 set thread context of 920 752 NEW ORDER DWG.exe NEW ORDER DWG.exe PID 920 set thread context of 1244 920 NEW ORDER DWG.exe Explorer.EXE PID 920 set thread context of 1244 920 NEW ORDER DWG.exe Explorer.EXE PID 328 set thread context of 1244 328 cscript.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
NEW ORDER DWG.exeNEW ORDER DWG.execscript.exepid process 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 752 NEW ORDER DWG.exe 920 NEW ORDER DWG.exe 920 NEW ORDER DWG.exe 920 NEW ORDER DWG.exe 328 cscript.exe 328 cscript.exe 328 cscript.exe 328 cscript.exe 328 cscript.exe 328 cscript.exe 328 cscript.exe 328 cscript.exe 328 cscript.exe 328 cscript.exe 328 cscript.exe 328 cscript.exe 328 cscript.exe 328 cscript.exe 328 cscript.exe 328 cscript.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
NEW ORDER DWG.execscript.exepid process 920 NEW ORDER DWG.exe 920 NEW ORDER DWG.exe 920 NEW ORDER DWG.exe 920 NEW ORDER DWG.exe 328 cscript.exe 328 cscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
NEW ORDER DWG.exeNEW ORDER DWG.execscript.exedescription pid process Token: SeDebugPrivilege 752 NEW ORDER DWG.exe Token: SeDebugPrivilege 920 NEW ORDER DWG.exe Token: SeDebugPrivilege 328 cscript.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE 1244 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
NEW ORDER DWG.exeExplorer.EXEdescription pid process target process PID 752 wrote to memory of 1732 752 NEW ORDER DWG.exe cmd.exe PID 752 wrote to memory of 1732 752 NEW ORDER DWG.exe cmd.exe PID 752 wrote to memory of 1732 752 NEW ORDER DWG.exe cmd.exe PID 752 wrote to memory of 1732 752 NEW ORDER DWG.exe cmd.exe PID 752 wrote to memory of 920 752 NEW ORDER DWG.exe NEW ORDER DWG.exe PID 752 wrote to memory of 920 752 NEW ORDER DWG.exe NEW ORDER DWG.exe PID 752 wrote to memory of 920 752 NEW ORDER DWG.exe NEW ORDER DWG.exe PID 752 wrote to memory of 920 752 NEW ORDER DWG.exe NEW ORDER DWG.exe PID 752 wrote to memory of 920 752 NEW ORDER DWG.exe NEW ORDER DWG.exe PID 752 wrote to memory of 920 752 NEW ORDER DWG.exe NEW ORDER DWG.exe PID 752 wrote to memory of 920 752 NEW ORDER DWG.exe NEW ORDER DWG.exe PID 1244 wrote to memory of 328 1244 Explorer.EXE cscript.exe PID 1244 wrote to memory of 328 1244 Explorer.EXE cscript.exe PID 1244 wrote to memory of 328 1244 Explorer.EXE cscript.exe PID 1244 wrote to memory of 328 1244 Explorer.EXE cscript.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\NEW ORDER DWG.exe"C:\Users\Admin\AppData\Local\Temp\NEW ORDER DWG.exe"2⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c Copy "C:\Users\Admin\AppData\Local\Temp\NEW ORDER DWG.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NEW ORDER DWG.exe"3⤵
- Drops startup file
PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\NEW ORDER DWG.exe"C:\Users\Admin\AppData\Local\Temp\NEW ORDER DWG.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:920
-
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:288
-
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:328
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e