Analysis
-
max time kernel
300s -
max time network
284s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
23-09-2021 13:51
Static task
static1
Behavioral task
behavioral1
Sample
RFQ8943.pdf.exe
Resource
win7-en-20210920
General
-
Target
RFQ8943.pdf.exe
-
Size
276KB
-
MD5
89e074f1f6ffd1421078fdab1a00ab5d
-
SHA1
a5c4d75dbbe10ed36f1ffaba930456592e268169
-
SHA256
559e207d1e3a1217b69796fc762cb2eb9db98717b983b789097faf774985bb6c
-
SHA512
2992a62c4d11a605429dea066336141701852d3866c9f6ba034f753e76714deaafd0a4a51108f0bca34ca561707a47abb28870048a27efd63344249cf0b1f3c1
Malware Config
Extracted
xloader
2.5
dhua
http://www.segurosramosroman.com/dhua/
ketostar.club
icanmakeyoufamous.com
claimygdejection.com
garlicinterestedparent.xyz
bits-clicks.com
030atk.xyz
ballwiegand.com
logs-illumidesk.com
785686.com
flnewsfeed.com
transporteshrj.net
agenciamundodigital.online
bowersllc.com
urchncenw.com
wuauwuaumx.com
littlesportsacademy.com
xn--m3chb3ax0abdta3fwhk.com
prmarketings.com
jiaozhanlianmeng.com
whenisthestore.space
ventureagora.net
ditrixmed.store
gitlab-tamskillpage.com
samgravikasnidhi.com
lenti4you.com
reviewallstarscommerce.com
nissimarble.com
md2px.xyz
tristarelectronics.net
you11.net
vaccinationfraud.xyz
bu3helo.com
marcellcheckpoint.com
hassinkandroos.com
socw.quest
screenedscooptoknow-today.info
aciburada.com
edimacare.com
smokenation.net
elga-groupinc.com
26dgj.xyz
chandleenews.com
sugarcanemultisport.com
nichellejonesrealtor.com
architektschnur.com
atehgroup.com
ocoeeboys.com
zanesells.com
878971.com
infringement-notice.com
orzame.com
darlindough.com
bwpassionenterprise.com
switchress.com
willcowblog.online
rsyncpalace.com
ayderstudio.com
ascotintrenational.com
omeducationhelp.com
kimberleydawnwallace.com
thereisnooneway.com
marketobserve.com
sildenafilnrx.com
willowbaldwin.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1572-56-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1000-65-0x0000000000110000-0x0000000000139000-memory.dmp xloader -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
help.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run help.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\XXWT4RBPT = "C:\\Program Files (x86)\\Twptlwb\\systraynpe0p08h.exe" help.exe -
Executes dropped EXE 2 IoCs
Processes:
systraynpe0p08h.exesystraynpe0p08h.exepid process 1464 systraynpe0p08h.exe 1764 systraynpe0p08h.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1724 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
RFQ8943.pdf.exesystraynpe0p08h.exepid process 1464 RFQ8943.pdf.exe 1464 systraynpe0p08h.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
RFQ8943.pdf.exeRFQ8943.pdf.exehelp.exesystraynpe0p08h.exedescription pid process target process PID 1464 set thread context of 1572 1464 RFQ8943.pdf.exe RFQ8943.pdf.exe PID 1572 set thread context of 1388 1572 RFQ8943.pdf.exe Explorer.EXE PID 1572 set thread context of 1388 1572 RFQ8943.pdf.exe Explorer.EXE PID 1000 set thread context of 1388 1000 help.exe Explorer.EXE PID 1464 set thread context of 1764 1464 systraynpe0p08h.exe systraynpe0p08h.exe -
Drops file in Program Files directory 2 IoCs
Processes:
help.exeExplorer.EXEdescription ioc process File opened for modification C:\Program Files (x86)\Twptlwb\systraynpe0p08h.exe help.exe File created C:\Program Files (x86)\Twptlwb\systraynpe0p08h.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 6 IoCs
Processes:
resource yara_rule C:\Program Files (x86)\Twptlwb\systraynpe0p08h.exe nsis_installer_1 C:\Program Files (x86)\Twptlwb\systraynpe0p08h.exe nsis_installer_2 C:\Program Files (x86)\Twptlwb\systraynpe0p08h.exe nsis_installer_1 C:\Program Files (x86)\Twptlwb\systraynpe0p08h.exe nsis_installer_2 C:\Program Files (x86)\Twptlwb\systraynpe0p08h.exe nsis_installer_1 C:\Program Files (x86)\Twptlwb\systraynpe0p08h.exe nsis_installer_2 -
Processes:
help.exedescription ioc process Key created \Registry\User\S-1-5-21-3456797065-1076791440-4146276586-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 help.exe -
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
RFQ8943.pdf.exehelp.exesystraynpe0p08h.exepid process 1572 RFQ8943.pdf.exe 1572 RFQ8943.pdf.exe 1572 RFQ8943.pdf.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1764 systraynpe0p08h.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe 1000 help.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1388 Explorer.EXE -
Suspicious behavior: MapViewOfSection 10 IoCs
Processes:
RFQ8943.pdf.exeRFQ8943.pdf.exehelp.exesystraynpe0p08h.exepid process 1464 RFQ8943.pdf.exe 1572 RFQ8943.pdf.exe 1572 RFQ8943.pdf.exe 1572 RFQ8943.pdf.exe 1572 RFQ8943.pdf.exe 1000 help.exe 1000 help.exe 1000 help.exe 1464 systraynpe0p08h.exe 1000 help.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
RFQ8943.pdf.exehelp.exeExplorer.EXEsystraynpe0p08h.exedescription pid process Token: SeDebugPrivilege 1572 RFQ8943.pdf.exe Token: SeDebugPrivilege 1000 help.exe Token: SeShutdownPrivilege 1388 Explorer.EXE Token: SeDebugPrivilege 1764 systraynpe0p08h.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
Processes:
Explorer.EXEpid process 1388 Explorer.EXE 1388 Explorer.EXE 1388 Explorer.EXE 1388 Explorer.EXE 1388 Explorer.EXE 1388 Explorer.EXE -
Suspicious use of SendNotifyMessage 16 IoCs
Processes:
Explorer.EXEpid process 1388 Explorer.EXE 1388 Explorer.EXE 1388 Explorer.EXE 1388 Explorer.EXE 1388 Explorer.EXE 1388 Explorer.EXE 1388 Explorer.EXE 1388 Explorer.EXE 1388 Explorer.EXE 1388 Explorer.EXE 1388 Explorer.EXE 1388 Explorer.EXE 1388 Explorer.EXE 1388 Explorer.EXE 1388 Explorer.EXE 1388 Explorer.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
RFQ8943.pdf.exeRFQ8943.pdf.exehelp.exeExplorer.EXEsystraynpe0p08h.exedescription pid process target process PID 1464 wrote to memory of 1572 1464 RFQ8943.pdf.exe RFQ8943.pdf.exe PID 1464 wrote to memory of 1572 1464 RFQ8943.pdf.exe RFQ8943.pdf.exe PID 1464 wrote to memory of 1572 1464 RFQ8943.pdf.exe RFQ8943.pdf.exe PID 1464 wrote to memory of 1572 1464 RFQ8943.pdf.exe RFQ8943.pdf.exe PID 1464 wrote to memory of 1572 1464 RFQ8943.pdf.exe RFQ8943.pdf.exe PID 1572 wrote to memory of 1000 1572 RFQ8943.pdf.exe help.exe PID 1572 wrote to memory of 1000 1572 RFQ8943.pdf.exe help.exe PID 1572 wrote to memory of 1000 1572 RFQ8943.pdf.exe help.exe PID 1572 wrote to memory of 1000 1572 RFQ8943.pdf.exe help.exe PID 1000 wrote to memory of 1724 1000 help.exe cmd.exe PID 1000 wrote to memory of 1724 1000 help.exe cmd.exe PID 1000 wrote to memory of 1724 1000 help.exe cmd.exe PID 1000 wrote to memory of 1724 1000 help.exe cmd.exe PID 1000 wrote to memory of 1760 1000 help.exe Firefox.exe PID 1000 wrote to memory of 1760 1000 help.exe Firefox.exe PID 1000 wrote to memory of 1760 1000 help.exe Firefox.exe PID 1000 wrote to memory of 1760 1000 help.exe Firefox.exe PID 1388 wrote to memory of 1464 1388 Explorer.EXE systraynpe0p08h.exe PID 1388 wrote to memory of 1464 1388 Explorer.EXE systraynpe0p08h.exe PID 1388 wrote to memory of 1464 1388 Explorer.EXE systraynpe0p08h.exe PID 1388 wrote to memory of 1464 1388 Explorer.EXE systraynpe0p08h.exe PID 1464 wrote to memory of 1764 1464 systraynpe0p08h.exe systraynpe0p08h.exe PID 1464 wrote to memory of 1764 1464 systraynpe0p08h.exe systraynpe0p08h.exe PID 1464 wrote to memory of 1764 1464 systraynpe0p08h.exe systraynpe0p08h.exe PID 1464 wrote to memory of 1764 1464 systraynpe0p08h.exe systraynpe0p08h.exe PID 1464 wrote to memory of 1764 1464 systraynpe0p08h.exe systraynpe0p08h.exe PID 1000 wrote to memory of 1760 1000 help.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Drops file in Program Files directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RFQ8943.pdf.exe"C:\Users\Admin\AppData\Local\Temp\RFQ8943.pdf.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RFQ8943.pdf.exe"C:\Users\Admin\AppData\Local\Temp\RFQ8943.pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"4⤵
- Adds policy Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\RFQ8943.pdf.exe"5⤵
- Deletes itself
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"5⤵
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Program Files (x86)\Twptlwb\systraynpe0p08h.exe"C:\Program Files (x86)\Twptlwb\systraynpe0p08h.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Twptlwb\systraynpe0p08h.exe"C:\Program Files (x86)\Twptlwb\systraynpe0p08h.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Twptlwb\systraynpe0p08h.exeMD5
89e074f1f6ffd1421078fdab1a00ab5d
SHA1a5c4d75dbbe10ed36f1ffaba930456592e268169
SHA256559e207d1e3a1217b69796fc762cb2eb9db98717b983b789097faf774985bb6c
SHA5122992a62c4d11a605429dea066336141701852d3866c9f6ba034f753e76714deaafd0a4a51108f0bca34ca561707a47abb28870048a27efd63344249cf0b1f3c1
-
C:\Program Files (x86)\Twptlwb\systraynpe0p08h.exeMD5
89e074f1f6ffd1421078fdab1a00ab5d
SHA1a5c4d75dbbe10ed36f1ffaba930456592e268169
SHA256559e207d1e3a1217b69796fc762cb2eb9db98717b983b789097faf774985bb6c
SHA5122992a62c4d11a605429dea066336141701852d3866c9f6ba034f753e76714deaafd0a4a51108f0bca34ca561707a47abb28870048a27efd63344249cf0b1f3c1
-
C:\Program Files (x86)\Twptlwb\systraynpe0p08h.exeMD5
89e074f1f6ffd1421078fdab1a00ab5d
SHA1a5c4d75dbbe10ed36f1ffaba930456592e268169
SHA256559e207d1e3a1217b69796fc762cb2eb9db98717b983b789097faf774985bb6c
SHA5122992a62c4d11a605429dea066336141701852d3866c9f6ba034f753e76714deaafd0a4a51108f0bca34ca561707a47abb28870048a27efd63344249cf0b1f3c1
-
\Users\Admin\AppData\Local\Temp\nsbAF23.tmp\qrtethbaa.dllMD5
15f7482c81007eff5abdca2a8fcf93b9
SHA1c6aad787f62ee9e6421cd8d7bcce78cdd812df4e
SHA256acc5d7029dd7c89f300f07f3743772417081e3acc13e054f4dbfb8bf84796569
SHA512ab6e6d602d156dc408275e03043a6f5096c31b9f9668adfe5b62335fefe43637a4a10941b011a88ac6cbbf2e0ec50ddf21c4b835a275a80cfdc9bc86d526fcf5
-
\Users\Admin\AppData\Local\Temp\nsiBD47.tmp\qrtethbaa.dllMD5
15f7482c81007eff5abdca2a8fcf93b9
SHA1c6aad787f62ee9e6421cd8d7bcce78cdd812df4e
SHA256acc5d7029dd7c89f300f07f3743772417081e3acc13e054f4dbfb8bf84796569
SHA512ab6e6d602d156dc408275e03043a6f5096c31b9f9668adfe5b62335fefe43637a4a10941b011a88ac6cbbf2e0ec50ddf21c4b835a275a80cfdc9bc86d526fcf5
-
memory/1000-65-0x0000000000110000-0x0000000000139000-memory.dmpFilesize
164KB
-
memory/1000-62-0x0000000000000000-mapping.dmp
-
memory/1000-64-0x0000000000690000-0x0000000000696000-memory.dmpFilesize
24KB
-
memory/1000-66-0x0000000000830000-0x0000000000B33000-memory.dmpFilesize
3.0MB
-
memory/1000-67-0x0000000000420000-0x00000000004B0000-memory.dmpFilesize
576KB
-
memory/1388-68-0x0000000008810000-0x0000000008942000-memory.dmpFilesize
1.2MB
-
memory/1388-61-0x00000000069A0000-0x0000000006AA1000-memory.dmpFilesize
1.0MB
-
memory/1388-59-0x0000000004320000-0x0000000004430000-memory.dmpFilesize
1.1MB
-
memory/1464-70-0x0000000000000000-mapping.dmp
-
memory/1464-53-0x0000000075BD1000-0x0000000075BD3000-memory.dmpFilesize
8KB
-
memory/1572-57-0x0000000000860000-0x0000000000B63000-memory.dmpFilesize
3.0MB
-
memory/1572-60-0x0000000000320000-0x0000000000331000-memory.dmpFilesize
68KB
-
memory/1572-58-0x00000000002E0000-0x00000000002F1000-memory.dmpFilesize
68KB
-
memory/1572-56-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1572-55-0x000000000041D4E0-mapping.dmp
-
memory/1724-63-0x0000000000000000-mapping.dmp
-
memory/1760-78-0x0000000000000000-mapping.dmp
-
memory/1760-79-0x000000013F410000-0x000000013F4A3000-memory.dmpFilesize
588KB
-
memory/1760-80-0x00000000023D0000-0x00000000024BB000-memory.dmpFilesize
940KB
-
memory/1764-75-0x000000000041D4E0-mapping.dmp
-
memory/1764-77-0x0000000000770000-0x0000000000A73000-memory.dmpFilesize
3.0MB