Analysis
-
max time kernel
75s -
max time network
39s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
06-10-2021 13:57
Static task
static1
Behavioral task
behavioral1
Sample
METALIMEX-RFQBYSM-207_SC_offer_kaismiddleeast74567377.7z.exe
Resource
win7-en-20210920
General
-
Target
METALIMEX-RFQBYSM-207_SC_offer_kaismiddleeast74567377.7z.exe
-
Size
309KB
-
MD5
0070ab3e990bd8c6eaca780527718ace
-
SHA1
8079e31f033b3fe6ecc3bc5647f3d46179536fb5
-
SHA256
b4dd5b1d79a6d7fb71d62379aec4338a4072a9736e1383d0d1ee185d02e47619
-
SHA512
87df1fd9152462d6fb0c0a2310e5e9feacd124053c6487f7ae4834266fb4ec3b765f21a0456ee2038ab4546fed5b80bb488645629f5c54a727ebcdca846eb7b4
Malware Config
Extracted
xloader
2.5
dhua
http://www.segurosramosroman.com/dhua/
ketostar.club
icanmakeyoufamous.com
claimygdejection.com
garlicinterestedparent.xyz
bits-clicks.com
030atk.xyz
ballwiegand.com
logs-illumidesk.com
785686.com
flnewsfeed.com
transporteshrj.net
agenciamundodigital.online
bowersllc.com
urchncenw.com
wuauwuaumx.com
littlesportsacademy.com
xn--m3chb3ax0abdta3fwhk.com
prmarketings.com
jiaozhanlianmeng.com
whenisthestore.space
ventureagora.net
ditrixmed.store
gitlab-tamskillpage.com
samgravikasnidhi.com
lenti4you.com
reviewallstarscommerce.com
nissimarble.com
md2px.xyz
tristarelectronics.net
you11.net
vaccinationfraud.xyz
bu3helo.com
marcellcheckpoint.com
hassinkandroos.com
socw.quest
screenedscooptoknow-today.info
aciburada.com
edimacare.com
smokenation.net
elga-groupinc.com
26dgj.xyz
chandleenews.com
sugarcanemultisport.com
nichellejonesrealtor.com
architektschnur.com
atehgroup.com
ocoeeboys.com
zanesells.com
878971.com
infringement-notice.com
orzame.com
darlindough.com
bwpassionenterprise.com
switchress.com
willcowblog.online
rsyncpalace.com
ayderstudio.com
ascotintrenational.com
omeducationhelp.com
kimberleydawnwallace.com
thereisnooneway.com
marketobserve.com
sildenafilnrx.com
willowbaldwin.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1080-56-0x000000000041D4E0-mapping.dmp xloader behavioral1/memory/1080-55-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Loads dropped DLL 1 IoCs
Processes:
METALIMEX-RFQBYSM-207_SC_offer_kaismiddleeast74567377.7z.exepid process 1424 METALIMEX-RFQBYSM-207_SC_offer_kaismiddleeast74567377.7z.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
METALIMEX-RFQBYSM-207_SC_offer_kaismiddleeast74567377.7z.exedescription pid process target process PID 1424 set thread context of 1080 1424 METALIMEX-RFQBYSM-207_SC_offer_kaismiddleeast74567377.7z.exe METALIMEX-RFQBYSM-207_SC_offer_kaismiddleeast74567377.7z.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
METALIMEX-RFQBYSM-207_SC_offer_kaismiddleeast74567377.7z.exepid process 1080 METALIMEX-RFQBYSM-207_SC_offer_kaismiddleeast74567377.7z.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
METALIMEX-RFQBYSM-207_SC_offer_kaismiddleeast74567377.7z.exedescription pid process target process PID 1424 wrote to memory of 1080 1424 METALIMEX-RFQBYSM-207_SC_offer_kaismiddleeast74567377.7z.exe METALIMEX-RFQBYSM-207_SC_offer_kaismiddleeast74567377.7z.exe PID 1424 wrote to memory of 1080 1424 METALIMEX-RFQBYSM-207_SC_offer_kaismiddleeast74567377.7z.exe METALIMEX-RFQBYSM-207_SC_offer_kaismiddleeast74567377.7z.exe PID 1424 wrote to memory of 1080 1424 METALIMEX-RFQBYSM-207_SC_offer_kaismiddleeast74567377.7z.exe METALIMEX-RFQBYSM-207_SC_offer_kaismiddleeast74567377.7z.exe PID 1424 wrote to memory of 1080 1424 METALIMEX-RFQBYSM-207_SC_offer_kaismiddleeast74567377.7z.exe METALIMEX-RFQBYSM-207_SC_offer_kaismiddleeast74567377.7z.exe PID 1424 wrote to memory of 1080 1424 METALIMEX-RFQBYSM-207_SC_offer_kaismiddleeast74567377.7z.exe METALIMEX-RFQBYSM-207_SC_offer_kaismiddleeast74567377.7z.exe PID 1424 wrote to memory of 1080 1424 METALIMEX-RFQBYSM-207_SC_offer_kaismiddleeast74567377.7z.exe METALIMEX-RFQBYSM-207_SC_offer_kaismiddleeast74567377.7z.exe PID 1424 wrote to memory of 1080 1424 METALIMEX-RFQBYSM-207_SC_offer_kaismiddleeast74567377.7z.exe METALIMEX-RFQBYSM-207_SC_offer_kaismiddleeast74567377.7z.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\METALIMEX-RFQBYSM-207_SC_offer_kaismiddleeast74567377.7z.exe"C:\Users\Admin\AppData\Local\Temp\METALIMEX-RFQBYSM-207_SC_offer_kaismiddleeast74567377.7z.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\METALIMEX-RFQBYSM-207_SC_offer_kaismiddleeast74567377.7z.exe"C:\Users\Admin\AppData\Local\Temp\METALIMEX-RFQBYSM-207_SC_offer_kaismiddleeast74567377.7z.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nsgA0E1.tmp\bqoyh.dllMD5
2398a8915987ab4d01052d44014fa752
SHA1a8b696f9219a3f784af4ac779529fa22c445a7a4
SHA256adaaffcb35ec341473059471f03cc34fec4474d63361d848cff64657ed669355
SHA512cbf3650f700cd8ca1276bf59c956a406bcf505f87fb98167d5092dc4c9099d9b76b93816fa8f4b07de4f4c0c33b2a46aeabf00d7c44aaad4e62ae6549915eafb
-
memory/1080-56-0x000000000041D4E0-mapping.dmp
-
memory/1080-55-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1080-57-0x00000000006F0000-0x00000000009F3000-memory.dmpFilesize
3.0MB
-
memory/1424-53-0x0000000076201000-0x0000000076203000-memory.dmpFilesize
8KB