Analysis
-
max time kernel
150s -
max time network
164s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
21-07-2021 14:03
Static task
static1
Behavioral task
behavioral1
Sample
NEW ORDER DWG.exe
Resource
win7v20210410
General
-
Target
NEW ORDER DWG.exe
-
Size
64KB
-
MD5
29aa61fab0d0a3868c1bfc5af0573740
-
SHA1
6d0d3f16b8210385416f80d5dd52f88bc22d78b2
-
SHA256
13bce5abe3e50d2d91387b5de52da3b3339e0139d01072cca59114de61c58c44
-
SHA512
4c05803880d69203b9baee670638841c01e1065c3da0c93af38ab7c8e4cdf53e263c92e41105a2ec28af9247c6371636e915fdb15572f3495e0d381174625516
Malware Config
Extracted
xloader
2.3
http://www.sayhellosarah.com/0tog/
corona-info.space
laleach.com
dofreemovies.com
buntunm3.com
oxfordplainsdragway.info
hillsoverlandgear.com
unserenervos.xyz
mateacs.com
galepresbyterian.net
onlineorderingmadeeazy.com
simplyrhodeisland.com
vacandsew360.com
aspokanehome.com
shirleyswigshopinc.com
ymtfb16.com
yourpublishinganddesign.com
cbdafy.com
txtravelnurse.com
atonalai.net
ndiatv.com
zinniasweaters.com
xn--adblack-cya.com
cloudzella.com
speightslawnmaintenance.com
sp398.site
uhrengold.com
wellshelp.com
tjjj.net
bighomip.com
dinoksa.com
haribharisociety.com
mamachengsauce.com
missbabss.com
noisi.vision
debratreesaudiology.com
loafri.com
refunder.net
bethterryhelps.com
ibrahimbusiness.com
thumbnails.pro
mountstat.com
anlegerfuchs.com
thecustomokie.com
productoramag.com
kopenschoenennl.com
nyh.xyz
letsstartsavingnow.com
sliceworkshop.com
wuguxian.net
bebasauction.com
oddthingsforsale.com
trademarkinjury.com
diss6.com
yinnantech.com
belaronconsulting.com
testcaresort.com
shoppingnow1.club
hotelboutiquemarrakesh.com
debamnurshing.com
ppxfaka.xyz
dotpayasam.com
c63hristine.xyz
arabacekilisleri.com
wl-takarakuji.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3768-128-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/3768-129-0x000000000041CFE0-mapping.dmp xloader behavioral2/memory/1316-135-0x0000000000BA0000-0x0000000000BC8000-memory.dmp xloader -
Drops startup file 3 IoCs
Processes:
cmd.exeNEW ORDER DWG.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NEW ORDER DWG.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NEW ORDER DWG.exe NEW ORDER DWG.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NEW ORDER DWG.exe cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
NEW ORDER DWG.exeNEW ORDER DWG.execmd.exedescription pid process target process PID 3728 set thread context of 3768 3728 NEW ORDER DWG.exe NEW ORDER DWG.exe PID 3768 set thread context of 3028 3768 NEW ORDER DWG.exe Explorer.EXE PID 1316 set thread context of 3028 1316 cmd.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
NEW ORDER DWG.exeNEW ORDER DWG.execmd.exepid process 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3728 NEW ORDER DWG.exe 3768 NEW ORDER DWG.exe 3768 NEW ORDER DWG.exe 3768 NEW ORDER DWG.exe 3768 NEW ORDER DWG.exe 1316 cmd.exe 1316 cmd.exe 1316 cmd.exe 1316 cmd.exe 1316 cmd.exe 1316 cmd.exe 1316 cmd.exe 1316 cmd.exe 1316 cmd.exe 1316 cmd.exe 1316 cmd.exe 1316 cmd.exe 1316 cmd.exe 1316 cmd.exe 1316 cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3028 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
NEW ORDER DWG.execmd.exepid process 3768 NEW ORDER DWG.exe 3768 NEW ORDER DWG.exe 3768 NEW ORDER DWG.exe 1316 cmd.exe 1316 cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
NEW ORDER DWG.exeNEW ORDER DWG.execmd.exedescription pid process Token: SeDebugPrivilege 3728 NEW ORDER DWG.exe Token: SeDebugPrivilege 3768 NEW ORDER DWG.exe Token: SeDebugPrivilege 1316 cmd.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3028 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
NEW ORDER DWG.exeExplorer.EXEdescription pid process target process PID 3728 wrote to memory of 1116 3728 NEW ORDER DWG.exe cmd.exe PID 3728 wrote to memory of 1116 3728 NEW ORDER DWG.exe cmd.exe PID 3728 wrote to memory of 1116 3728 NEW ORDER DWG.exe cmd.exe PID 3728 wrote to memory of 3768 3728 NEW ORDER DWG.exe NEW ORDER DWG.exe PID 3728 wrote to memory of 3768 3728 NEW ORDER DWG.exe NEW ORDER DWG.exe PID 3728 wrote to memory of 3768 3728 NEW ORDER DWG.exe NEW ORDER DWG.exe PID 3728 wrote to memory of 3768 3728 NEW ORDER DWG.exe NEW ORDER DWG.exe PID 3728 wrote to memory of 3768 3728 NEW ORDER DWG.exe NEW ORDER DWG.exe PID 3728 wrote to memory of 3768 3728 NEW ORDER DWG.exe NEW ORDER DWG.exe PID 3028 wrote to memory of 1316 3028 Explorer.EXE cmd.exe PID 3028 wrote to memory of 1316 3028 Explorer.EXE cmd.exe PID 3028 wrote to memory of 1316 3028 Explorer.EXE cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\NEW ORDER DWG.exe"C:\Users\Admin\AppData\Local\Temp\NEW ORDER DWG.exe"2⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c Copy "C:\Users\Admin\AppData\Local\Temp\NEW ORDER DWG.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\NEW ORDER DWG.exe"3⤵
- Drops startup file
PID:1116
-
-
C:\Users\Admin\AppData\Local\Temp\NEW ORDER DWG.exe"C:\Users\Admin\AppData\Local\Temp\NEW ORDER DWG.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3768
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1316
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
29aa61fab0d0a3868c1bfc5af0573740
SHA16d0d3f16b8210385416f80d5dd52f88bc22d78b2
SHA25613bce5abe3e50d2d91387b5de52da3b3339e0139d01072cca59114de61c58c44
SHA5124c05803880d69203b9baee670638841c01e1065c3da0c93af38ab7c8e4cdf53e263c92e41105a2ec28af9247c6371636e915fdb15572f3495e0d381174625516