Analysis
-
max time kernel
153s -
max time network
156s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
27-09-2021 11:13
Static task
static1
Behavioral task
behavioral1
Sample
DN_467842234567.exe
Resource
win7v20210408
General
-
Target
DN_467842234567.exe
-
Size
253KB
-
MD5
c16013ea29f9dd1525dcb65c2184784e
-
SHA1
5afd533f29573050734e428f9f8c9ba08c79546a
-
SHA256
df05d916a02c09e1dba0df0841f93697e407a334ce8d2371dfe8befd909d8a43
-
SHA512
87c9e01aac687d2c675cb281592c930ce7bfefebc4eecde4135834bf896265d0238f9afc98726214fc30ef19c2528740aadf12df00e7cb44c469e56d5e9eefca
Malware Config
Extracted
xloader
2.4
r95e
http://www.bofight.store/r95e/
mindyourbusinesscoin.com
melandri.club
13011196.com
bespinpoker.com
ohchainpodklo.xyz
paolacapitanio.com
hnczppjs.com
healthygold-carefit.club
drive16pay.art
5foldmastermind.com
especialistasorteios.online
cjcveterotqze.com
originaldigitalspaces.com
21lawsofconfidence.com
uscryptomininglaws.com
nilist.xyz
bergstromgreenholt.icu
dumbasslures.com
companieus.com
2gtfy0.com
jpbrunos.com
cdsensor.host
memorypc.gmbh
blue-music.com
lottochain.bet
exegen.online
gardenmanager.net
tyczhhapph5.com
financecreditpro.com
you-teikeis.site
portale-accessi-anomali.com
performansorganizasyon.xyz
coinoforum.com
kagulowa.com
kxdrstone.com
projudi-poker.com
glu-coin.com
mremvd.icu
smpldebts.com
gabgbang.com
hoochhousebar.com
zuowxk.icu
whatipm.com
healthcaresms.com
nurhalilah.xyz
platforma-gaz.space
railrats.com
lastmedicalcard.com
1auwifsr.icu
ctgybebuy.com
2377k.com
mightynz.com
sbcsdaia.com
conversionlist.com
ventas.rest
scotlaenlinea.site
byemreperde.com
getsilverberg.com
meannamemories.com
signotimes.com
jhuipx1cnb.xyz
5apchk35.xyz
tspd.site
aoshihuanyu.com
Signatures
-
Xloader Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/2164-116-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2164-117-0x000000000041D3E0-mapping.dmp xloader behavioral2/memory/2420-123-0x0000000002D00000-0x0000000002D29000-memory.dmp xloader behavioral2/memory/2420-125-0x0000000002D30000-0x0000000002E7A000-memory.dmp xloader -
Loads dropped DLL 1 IoCs
Processes:
DN_467842234567.exepid process 2016 DN_467842234567.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
DN_467842234567.exeDN_467842234567.execmd.exedescription pid process target process PID 2016 set thread context of 2164 2016 DN_467842234567.exe DN_467842234567.exe PID 2164 set thread context of 3028 2164 DN_467842234567.exe Explorer.EXE PID 2420 set thread context of 3028 2420 cmd.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 62 IoCs
Processes:
DN_467842234567.execmd.exepid process 2164 DN_467842234567.exe 2164 DN_467842234567.exe 2164 DN_467842234567.exe 2164 DN_467842234567.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe 2420 cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3028 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
DN_467842234567.execmd.exepid process 2164 DN_467842234567.exe 2164 DN_467842234567.exe 2164 DN_467842234567.exe 2420 cmd.exe 2420 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
DN_467842234567.execmd.exedescription pid process Token: SeDebugPrivilege 2164 DN_467842234567.exe Token: SeDebugPrivilege 2420 cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
DN_467842234567.exeExplorer.EXEcmd.exedescription pid process target process PID 2016 wrote to memory of 2164 2016 DN_467842234567.exe DN_467842234567.exe PID 2016 wrote to memory of 2164 2016 DN_467842234567.exe DN_467842234567.exe PID 2016 wrote to memory of 2164 2016 DN_467842234567.exe DN_467842234567.exe PID 2016 wrote to memory of 2164 2016 DN_467842234567.exe DN_467842234567.exe PID 2016 wrote to memory of 2164 2016 DN_467842234567.exe DN_467842234567.exe PID 2016 wrote to memory of 2164 2016 DN_467842234567.exe DN_467842234567.exe PID 3028 wrote to memory of 2420 3028 Explorer.EXE cmd.exe PID 3028 wrote to memory of 2420 3028 Explorer.EXE cmd.exe PID 3028 wrote to memory of 2420 3028 Explorer.EXE cmd.exe PID 2420 wrote to memory of 2660 2420 cmd.exe cmd.exe PID 2420 wrote to memory of 2660 2420 cmd.exe cmd.exe PID 2420 wrote to memory of 2660 2420 cmd.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\DN_467842234567.exe"C:\Users\Admin\AppData\Local\Temp\DN_467842234567.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\DN_467842234567.exe"C:\Users\Admin\AppData\Local\Temp\DN_467842234567.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\DN_467842234567.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nsv94B5.tmp\rcgwzvp.dllMD5
6b93d55cd940babd5eab05e0a8a2fea7
SHA1e2fc9047947bdd96f92b8e1d103fc13fb606d540
SHA2563eefd1c7daf2b08bc38159f216cd5e79ca1bdaf923ee6993eddbc602e6b84e15
SHA512070016b91be674ad938cc407d045d1d175acbee61161ec63a994d84e74e72663aa6b1bc3e57843f6bef5c13c26e066e245ccdddc41fa198435ded18caa3a2dd8
-
memory/2164-116-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2164-117-0x000000000041D3E0-mapping.dmp
-
memory/2164-119-0x00000000004C0000-0x000000000056E000-memory.dmpFilesize
696KB
-
memory/2164-118-0x0000000000A60000-0x0000000000D80000-memory.dmpFilesize
3.1MB
-
memory/2420-121-0x0000000000000000-mapping.dmp
-
memory/2420-123-0x0000000002D00000-0x0000000002D29000-memory.dmpFilesize
164KB
-
memory/2420-122-0x0000000000850000-0x00000000008A9000-memory.dmpFilesize
356KB
-
memory/2420-125-0x0000000002D30000-0x0000000002E7A000-memory.dmpFilesize
1.3MB
-
memory/2420-126-0x0000000003360000-0x00000000033F0000-memory.dmpFilesize
576KB
-
memory/2660-124-0x0000000000000000-mapping.dmp
-
memory/3028-120-0x0000000006740000-0x0000000006880000-memory.dmpFilesize
1.2MB
-
memory/3028-127-0x0000000006880000-0x00000000069FC000-memory.dmpFilesize
1.5MB