Analysis
-
max time kernel
73s -
max time network
76s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
28-09-2021 12:11
Static task
static1
Behavioral task
behavioral1
Sample
f2afb3a86d4b205705b0ec883e969f39.exe
Resource
win7-en-20210920
General
-
Target
f2afb3a86d4b205705b0ec883e969f39.exe
-
Size
256KB
-
MD5
f2afb3a86d4b205705b0ec883e969f39
-
SHA1
edb2e066091b33f278e45d77c2c5fa0d0f2f360d
-
SHA256
cf3038247c7a2a5779f655fdf594bdad56b22d198b6edb1c3197b84d9c4f153a
-
SHA512
0a7e09bbdfb44b66916646bfb3c464911fcbc79eb521354406c69dfb93cd0c6ea21b0558c178cb7cfb45071589824cbebcc899ffa05c3cef8be28006dc4f372f
Malware Config
Extracted
xloader
2.5
m0np
http://www.devmedicalcentre.com/m0np/
gruppovimar.com
seniordatingtv.com
pinpinyouqian.website
retreatreflectreplenish.com
baby-handmade.store
econsupplies.com
helloaustinpodcast.com
europe-lodging.com
ferahanaokulu.com
thehomeinspo.com
rawhoneytnpasumo6.xyz
tyckasei.quest
scissorsandbuffer.com
jatinvestmentsmaldives.com
softandcute.store
afuturemakerspromotions.online
leonsigntech.com
havetheshortscovered.com
cvkf.email
iplyyu.com
motphimz.net
slimmerpage.com
fifthbelle.com
moneybagsinfinity.com
architettoaroma.com
rio-script.com
millieandmaude.net
pvinayak.com
nyctattoing.com
fermanfood.com
medardlake.com
40acgidd.com
mrbrianalba.com
110bao.com
shguitong.com
why5mkt.com
diptv.xyz
gotbn-a01.com
rene-weise.com
meltaluminum.com
tobiasqbrown.com
eiqor.com
bnabd.com
painubloc.com
bofoz.com
maxicashprogtq.xyz
probinns.com
yourroddays1.xyz
friedmantrusts.com
patrianilancamentos.com
cetpa.solutions
fengxiaowangluo.com
zkimax.com
bibberyhills.com
colegiodeltaaps.com
fraternitybrand.com
codemais.net
ohayouwww.com
keenflat.com
devvabaek.com
rouxbylarease.online
hongyuyinji.com
cybersecurity-andorra.online
zs4.info
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/864-115-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/864-116-0x000000000041D450-mapping.dmp xloader -
Loads dropped DLL 1 IoCs
Processes:
f2afb3a86d4b205705b0ec883e969f39.exepid process 636 f2afb3a86d4b205705b0ec883e969f39.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
f2afb3a86d4b205705b0ec883e969f39.exedescription pid process target process PID 636 set thread context of 864 636 f2afb3a86d4b205705b0ec883e969f39.exe f2afb3a86d4b205705b0ec883e969f39.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
f2afb3a86d4b205705b0ec883e969f39.exepid process 864 f2afb3a86d4b205705b0ec883e969f39.exe 864 f2afb3a86d4b205705b0ec883e969f39.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
f2afb3a86d4b205705b0ec883e969f39.exedescription pid process target process PID 636 wrote to memory of 864 636 f2afb3a86d4b205705b0ec883e969f39.exe f2afb3a86d4b205705b0ec883e969f39.exe PID 636 wrote to memory of 864 636 f2afb3a86d4b205705b0ec883e969f39.exe f2afb3a86d4b205705b0ec883e969f39.exe PID 636 wrote to memory of 864 636 f2afb3a86d4b205705b0ec883e969f39.exe f2afb3a86d4b205705b0ec883e969f39.exe PID 636 wrote to memory of 864 636 f2afb3a86d4b205705b0ec883e969f39.exe f2afb3a86d4b205705b0ec883e969f39.exe PID 636 wrote to memory of 864 636 f2afb3a86d4b205705b0ec883e969f39.exe f2afb3a86d4b205705b0ec883e969f39.exe PID 636 wrote to memory of 864 636 f2afb3a86d4b205705b0ec883e969f39.exe f2afb3a86d4b205705b0ec883e969f39.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2afb3a86d4b205705b0ec883e969f39.exe"C:\Users\Admin\AppData\Local\Temp\f2afb3a86d4b205705b0ec883e969f39.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f2afb3a86d4b205705b0ec883e969f39.exe"C:\Users\Admin\AppData\Local\Temp\f2afb3a86d4b205705b0ec883e969f39.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nsb8D48.tmp\scwtnv.dllMD5
844abf1b6643336b6e55f1fc4f7fedf2
SHA1e23d3aeab06c84bb9b4c7477bf52e92b6f9bd556
SHA2565bf2cb1e36454321595cf5a7304254e5968690b92a7e27e5b519db0c2dc04e5f
SHA512d9a58d387829148574eae6f82738c2724b33e2425803e0ed2b623cbf7bbc2436b05c7e9eeeca4cda2ddbb1d73f2f2daf6f2eb73eb48278bd9b7bcfcd3172075f
-
memory/864-115-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/864-116-0x000000000041D450-mapping.dmp
-
memory/864-117-0x00000000009B0000-0x0000000000CD0000-memory.dmpFilesize
3.1MB