Analysis
-
max time kernel
299s -
max time network
341s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
29-09-2021 03:10
Static task
static1
Behavioral task
behavioral1
Sample
QUOTE_PRICE_REQUEST.exe
Resource
win7v20210408
General
-
Target
QUOTE_PRICE_REQUEST.exe
-
Size
252KB
-
MD5
48043c9a21d0547478331c1613660595
-
SHA1
9985a65e0aa690308454632223393d8d18a1c744
-
SHA256
75772375acbcfb6cb668fc2449671a6a83afe1434184ac7c01fd895825fcf5e6
-
SHA512
408613c89266eedf165e465e6021880cb4e2db943bec88d068db954ee23f80b55445fd9fd66f42f08924a93fa11f25e343c8f654c7cc2918efa09b00570294db
Malware Config
Extracted
xloader
2.5
m6rs
http://www.litediv.com/m6rs/
globalsovereignbank.com
ktnrape.xyz
churchybulletin.com
ddyla.com
imatge.cat
iwholesalestore.com
cultivapro.club
ibcfcl.com
refurbisheddildo.com
killerinktnpasumo4.xyz
mdphotoart.com
smi-ity.com
stanprolearningcenter.com
companyintelapp.com
tacticarc.com
soolls.com
gra68.net
cedricettori.digital
mossobuy.com
way2liv.com
j9b.xyz
bmfgi.com
gargantua-traiteur.com
tavolabread.com
neoplus-create.com
tracks-clicks.com
santsp.com
tokusa-f.com
yardparx.online
seinvestments-sg.com
elegantbrushes.net
restaurantemachupicchu.com
ha0313.com
dock7rods.com
emphatictrifles.com
onefunline.top
caulsshop.com
kittyol.com
thehealthyheifer.net
plotmyplot.com
leewaysvcs.com
eur86.com
lightsinwall.com
jiankangkyw.com
travilent.com
dvaccounts.com
wittyon.com
tommywoodenski.com
dividendoylibertad.com
aqscksw.com
familiapena2475.com
australianmeatandwine.com
leading.delivery
giftcards2you.com
bethlehemsmith.com
osterparrots.com
getignore.com
joyandsatisfy.club
sanibelislandhomesearch.com
smedivision.com
kitcycle.com
hills-renta.com
brownbeargraphics.com
46sheridan.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1324-61-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1324-62-0x000000000041D3D0-mapping.dmp xloader behavioral1/memory/528-72-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1884 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
QUOTE_PRICE_REQUEST.exepid process 760 QUOTE_PRICE_REQUEST.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
QUOTE_PRICE_REQUEST.exeQUOTE_PRICE_REQUEST.exeraserver.exedescription pid process target process PID 760 set thread context of 1324 760 QUOTE_PRICE_REQUEST.exe QUOTE_PRICE_REQUEST.exe PID 1324 set thread context of 1200 1324 QUOTE_PRICE_REQUEST.exe Explorer.EXE PID 1324 set thread context of 1200 1324 QUOTE_PRICE_REQUEST.exe Explorer.EXE PID 528 set thread context of 1200 528 raserver.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 61 IoCs
Processes:
QUOTE_PRICE_REQUEST.exeraserver.exepid process 1324 QUOTE_PRICE_REQUEST.exe 1324 QUOTE_PRICE_REQUEST.exe 1324 QUOTE_PRICE_REQUEST.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe 528 raserver.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1200 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
QUOTE_PRICE_REQUEST.exeraserver.exepid process 1324 QUOTE_PRICE_REQUEST.exe 1324 QUOTE_PRICE_REQUEST.exe 1324 QUOTE_PRICE_REQUEST.exe 1324 QUOTE_PRICE_REQUEST.exe 528 raserver.exe 528 raserver.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
QUOTE_PRICE_REQUEST.exeraserver.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 1324 QUOTE_PRICE_REQUEST.exe Token: SeDebugPrivilege 528 raserver.exe Token: SeShutdownPrivilege 1200 Explorer.EXE -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
QUOTE_PRICE_REQUEST.exeExplorer.EXEraserver.exedescription pid process target process PID 760 wrote to memory of 1324 760 QUOTE_PRICE_REQUEST.exe QUOTE_PRICE_REQUEST.exe PID 760 wrote to memory of 1324 760 QUOTE_PRICE_REQUEST.exe QUOTE_PRICE_REQUEST.exe PID 760 wrote to memory of 1324 760 QUOTE_PRICE_REQUEST.exe QUOTE_PRICE_REQUEST.exe PID 760 wrote to memory of 1324 760 QUOTE_PRICE_REQUEST.exe QUOTE_PRICE_REQUEST.exe PID 760 wrote to memory of 1324 760 QUOTE_PRICE_REQUEST.exe QUOTE_PRICE_REQUEST.exe PID 760 wrote to memory of 1324 760 QUOTE_PRICE_REQUEST.exe QUOTE_PRICE_REQUEST.exe PID 760 wrote to memory of 1324 760 QUOTE_PRICE_REQUEST.exe QUOTE_PRICE_REQUEST.exe PID 1200 wrote to memory of 528 1200 Explorer.EXE raserver.exe PID 1200 wrote to memory of 528 1200 Explorer.EXE raserver.exe PID 1200 wrote to memory of 528 1200 Explorer.EXE raserver.exe PID 1200 wrote to memory of 528 1200 Explorer.EXE raserver.exe PID 528 wrote to memory of 1884 528 raserver.exe cmd.exe PID 528 wrote to memory of 1884 528 raserver.exe cmd.exe PID 528 wrote to memory of 1884 528 raserver.exe cmd.exe PID 528 wrote to memory of 1884 528 raserver.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\QUOTE_PRICE_REQUEST.exe"C:\Users\Admin\AppData\Local\Temp\QUOTE_PRICE_REQUEST.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\QUOTE_PRICE_REQUEST.exe"C:\Users\Admin\AppData\Local\Temp\QUOTE_PRICE_REQUEST.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\QUOTE_PRICE_REQUEST.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nsg30C1.tmp\vogxk.dllMD5
1fea91e3debf7c3115cd97b8be64da57
SHA1dc1fd88108a94cea7d802f9e8ab20c8d120c7602
SHA256fae6a3048e91247206a42ee5f9261b9602afc2bd7fd8665f5a08b82c517a1789
SHA51276357d24719d57f73b39fa3418897e90a817fdea4f54f588cc7958baeefa0028310b8a94b08627d45fd1a4f7a5a63b54a470bc02ccd24bbcf3f6df4a7039a850
-
memory/528-74-0x0000000000910000-0x00000000009A0000-memory.dmpFilesize
576KB
-
memory/528-73-0x0000000000B60000-0x0000000000E63000-memory.dmpFilesize
3.0MB
-
memory/528-72-0x0000000000080000-0x00000000000A9000-memory.dmpFilesize
164KB
-
memory/528-71-0x0000000000E80000-0x0000000000E9C000-memory.dmpFilesize
112KB
-
memory/528-68-0x0000000000000000-mapping.dmp
-
memory/760-59-0x0000000075051000-0x0000000075053000-memory.dmpFilesize
8KB
-
memory/1200-67-0x0000000006DE0000-0x0000000006F15000-memory.dmpFilesize
1.2MB
-
memory/1200-65-0x0000000004ED0000-0x0000000004FA4000-memory.dmpFilesize
848KB
-
memory/1200-75-0x00000000064B0000-0x0000000006622000-memory.dmpFilesize
1.4MB
-
memory/1324-66-0x00000000004A0000-0x00000000004B1000-memory.dmpFilesize
68KB
-
memory/1324-63-0x00000000008A0000-0x0000000000BA3000-memory.dmpFilesize
3.0MB
-
memory/1324-64-0x0000000000450000-0x0000000000461000-memory.dmpFilesize
68KB
-
memory/1324-62-0x000000000041D3D0-mapping.dmp
-
memory/1324-61-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1884-70-0x0000000000000000-mapping.dmp