Analysis
-
max time kernel
150s -
max time network
96s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
29-09-2021 07:10
Static task
static1
Behavioral task
behavioral1
Sample
f9d0f03aba5378393fe83fa8e473b89a.exe
Resource
win7v20210408
General
-
Target
f9d0f03aba5378393fe83fa8e473b89a.exe
-
Size
493KB
-
MD5
f9d0f03aba5378393fe83fa8e473b89a
-
SHA1
174def16b7a286eeb3f97f68817ab393414ac5fc
-
SHA256
64e3a0f2298f21833eb7a9c51aa0b2b8d3354bdcefb0156bb34371e3163d8b3d
-
SHA512
c2b21c01fe2af50c3358e61d7a81cf4889fe34b222ee555a487e93f73f57f8392a3947ab3572f10c2df3b7444e4b3b2f520c6bae8effb50bf1014ca0a40bcb3b
Malware Config
Extracted
xloader
2.5
m0np
http://www.devmedicalcentre.com/m0np/
gruppovimar.com
seniordatingtv.com
pinpinyouqian.website
retreatreflectreplenish.com
baby-handmade.store
econsupplies.com
helloaustinpodcast.com
europe-lodging.com
ferahanaokulu.com
thehomeinspo.com
rawhoneytnpasumo6.xyz
tyckasei.quest
scissorsandbuffer.com
jatinvestmentsmaldives.com
softandcute.store
afuturemakerspromotions.online
leonsigntech.com
havetheshortscovered.com
cvkf.email
iplyyu.com
motphimz.net
slimmerpage.com
fifthbelle.com
moneybagsinfinity.com
architettoaroma.com
rio-script.com
millieandmaude.net
pvinayak.com
nyctattoing.com
fermanfood.com
medardlake.com
40acgidd.com
mrbrianalba.com
110bao.com
shguitong.com
why5mkt.com
diptv.xyz
gotbn-a01.com
rene-weise.com
meltaluminum.com
tobiasqbrown.com
eiqor.com
bnabd.com
painubloc.com
bofoz.com
maxicashprogtq.xyz
probinns.com
yourroddays1.xyz
friedmantrusts.com
patrianilancamentos.com
cetpa.solutions
fengxiaowangluo.com
zkimax.com
bibberyhills.com
colegiodeltaaps.com
fraternitybrand.com
codemais.net
ohayouwww.com
keenflat.com
devvabaek.com
rouxbylarease.online
hongyuyinji.com
cybersecurity-andorra.online
zs4.info
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1888-62-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1888-63-0x000000000041D450-mapping.dmp xloader -
Loads dropped DLL 1 IoCs
Processes:
f9d0f03aba5378393fe83fa8e473b89a.exepid process 1068 f9d0f03aba5378393fe83fa8e473b89a.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
f9d0f03aba5378393fe83fa8e473b89a.exedescription pid process target process PID 1068 set thread context of 1888 1068 f9d0f03aba5378393fe83fa8e473b89a.exe f9d0f03aba5378393fe83fa8e473b89a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
f9d0f03aba5378393fe83fa8e473b89a.exepid process 1888 f9d0f03aba5378393fe83fa8e473b89a.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
f9d0f03aba5378393fe83fa8e473b89a.exedescription pid process target process PID 1068 wrote to memory of 1888 1068 f9d0f03aba5378393fe83fa8e473b89a.exe f9d0f03aba5378393fe83fa8e473b89a.exe PID 1068 wrote to memory of 1888 1068 f9d0f03aba5378393fe83fa8e473b89a.exe f9d0f03aba5378393fe83fa8e473b89a.exe PID 1068 wrote to memory of 1888 1068 f9d0f03aba5378393fe83fa8e473b89a.exe f9d0f03aba5378393fe83fa8e473b89a.exe PID 1068 wrote to memory of 1888 1068 f9d0f03aba5378393fe83fa8e473b89a.exe f9d0f03aba5378393fe83fa8e473b89a.exe PID 1068 wrote to memory of 1888 1068 f9d0f03aba5378393fe83fa8e473b89a.exe f9d0f03aba5378393fe83fa8e473b89a.exe PID 1068 wrote to memory of 1888 1068 f9d0f03aba5378393fe83fa8e473b89a.exe f9d0f03aba5378393fe83fa8e473b89a.exe PID 1068 wrote to memory of 1888 1068 f9d0f03aba5378393fe83fa8e473b89a.exe f9d0f03aba5378393fe83fa8e473b89a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9d0f03aba5378393fe83fa8e473b89a.exe"C:\Users\Admin\AppData\Local\Temp\f9d0f03aba5378393fe83fa8e473b89a.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f9d0f03aba5378393fe83fa8e473b89a.exe"C:\Users\Admin\AppData\Local\Temp\f9d0f03aba5378393fe83fa8e473b89a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nsqA747.tmp\vxzhefqohet.dllMD5
5ce792c789b4f543dcd483328705b149
SHA1def861f44b722e4f5f96e90aff6de12f3ff4427b
SHA256b05b77c57fd3fef88f05f5a7d0013f80885e148217c3f38f56aedd342464a86c
SHA51270623479ca68e2f420b9159e3e600fd3cc94fa07a67e6d21e859800bfe4211924fce2ccfd15376c2e9bc52af8893cb1d3c40a9a6cf126545c86267e1f69b0f43
-
memory/1068-60-0x0000000075801000-0x0000000075803000-memory.dmpFilesize
8KB
-
memory/1888-62-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1888-63-0x000000000041D450-mapping.dmp
-
memory/1888-64-0x0000000000740000-0x0000000000A43000-memory.dmpFilesize
3.0MB