Analysis
-
max time kernel
134s -
max time network
121s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
05-10-2021 13:53
Static task
static1
Behavioral task
behavioral1
Sample
RFQ54488203expediere_doc202177,pdf.exe
Resource
win7-en-20210920
General
-
Target
RFQ54488203expediere_doc202177,pdf.exe
-
Size
299KB
-
MD5
486990b975aa0c60bdbc054ae6a2b3cd
-
SHA1
9806f58700e62c3de83536edb99fd66aa1c01d82
-
SHA256
222c8a0ce49171c3bb93631e7001bb152ad05fa4ba13437a173f1d0dd9fd0a4e
-
SHA512
d1091d97ac39c381086424a55867eed1029879aa91174222fc94cd0f255bc4e5d877fb6b52761528fd9e08821150b4df6f8bd8bd846ade9f0e5b520cde8554a9
Malware Config
Extracted
xloader
2.5
dhua
http://www.segurosramosroman.com/dhua/
ketostar.club
icanmakeyoufamous.com
claimygdejection.com
garlicinterestedparent.xyz
bits-clicks.com
030atk.xyz
ballwiegand.com
logs-illumidesk.com
785686.com
flnewsfeed.com
transporteshrj.net
agenciamundodigital.online
bowersllc.com
urchncenw.com
wuauwuaumx.com
littlesportsacademy.com
xn--m3chb3ax0abdta3fwhk.com
prmarketings.com
jiaozhanlianmeng.com
whenisthestore.space
ventureagora.net
ditrixmed.store
gitlab-tamskillpage.com
samgravikasnidhi.com
lenti4you.com
reviewallstarscommerce.com
nissimarble.com
md2px.xyz
tristarelectronics.net
you11.net
vaccinationfraud.xyz
bu3helo.com
marcellcheckpoint.com
hassinkandroos.com
socw.quest
screenedscooptoknow-today.info
aciburada.com
edimacare.com
smokenation.net
elga-groupinc.com
26dgj.xyz
chandleenews.com
sugarcanemultisport.com
nichellejonesrealtor.com
architektschnur.com
atehgroup.com
ocoeeboys.com
zanesells.com
878971.com
infringement-notice.com
orzame.com
darlindough.com
bwpassionenterprise.com
switchress.com
willcowblog.online
rsyncpalace.com
ayderstudio.com
ascotintrenational.com
omeducationhelp.com
kimberleydawnwallace.com
thereisnooneway.com
marketobserve.com
sildenafilnrx.com
willowbaldwin.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2024-55-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2024-56-0x000000000041D4E0-mapping.dmp xloader -
Loads dropped DLL 1 IoCs
Processes:
RFQ54488203expediere_doc202177,pdf.exepid process 2036 RFQ54488203expediere_doc202177,pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
RFQ54488203expediere_doc202177,pdf.exedescription pid process target process PID 2036 set thread context of 2024 2036 RFQ54488203expediere_doc202177,pdf.exe RFQ54488203expediere_doc202177,pdf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
RFQ54488203expediere_doc202177,pdf.exepid process 2024 RFQ54488203expediere_doc202177,pdf.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
RFQ54488203expediere_doc202177,pdf.exedescription pid process target process PID 2036 wrote to memory of 2024 2036 RFQ54488203expediere_doc202177,pdf.exe RFQ54488203expediere_doc202177,pdf.exe PID 2036 wrote to memory of 2024 2036 RFQ54488203expediere_doc202177,pdf.exe RFQ54488203expediere_doc202177,pdf.exe PID 2036 wrote to memory of 2024 2036 RFQ54488203expediere_doc202177,pdf.exe RFQ54488203expediere_doc202177,pdf.exe PID 2036 wrote to memory of 2024 2036 RFQ54488203expediere_doc202177,pdf.exe RFQ54488203expediere_doc202177,pdf.exe PID 2036 wrote to memory of 2024 2036 RFQ54488203expediere_doc202177,pdf.exe RFQ54488203expediere_doc202177,pdf.exe PID 2036 wrote to memory of 2024 2036 RFQ54488203expediere_doc202177,pdf.exe RFQ54488203expediere_doc202177,pdf.exe PID 2036 wrote to memory of 2024 2036 RFQ54488203expediere_doc202177,pdf.exe RFQ54488203expediere_doc202177,pdf.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\RFQ54488203expediere_doc202177,pdf.exe"C:\Users\Admin\AppData\Local\Temp\RFQ54488203expediere_doc202177,pdf.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RFQ54488203expediere_doc202177,pdf.exe"C:\Users\Admin\AppData\Local\Temp\RFQ54488203expediere_doc202177,pdf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nsgAAA1.tmp\rwajh.dllMD5
186d1d11820a440827ee416f70cc3f82
SHA1137c092412fdd2d5b37cf6de89b4fb6fb68b097e
SHA2563b813b0b19bd0f10547adc1245760f1f75ffc386f8ba9459b9d1d7521f7fe9a7
SHA5127ad80068effd64824378ece834556e02faf6ad8af6a104ad5b5331de171461526a081fd5516f5d93d536805678ef931f0cde7c201862ee3f0a5ecd8a35861380
-
memory/2024-55-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2024-56-0x000000000041D4E0-mapping.dmp
-
memory/2024-57-0x0000000000840000-0x0000000000B43000-memory.dmpFilesize
3.0MB
-
memory/2036-53-0x00000000765A1000-0x00000000765A3000-memory.dmpFilesize
8KB