Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
12-10-2021 00:13
Static task
static1
Behavioral task
behavioral1
Sample
c0eb90010d882e33340c40bde08474cb.exe
Resource
win7-en-20210920
General
-
Target
c0eb90010d882e33340c40bde08474cb.exe
-
Size
257KB
-
MD5
c0eb90010d882e33340c40bde08474cb
-
SHA1
f76f7e4eff72ed9d5669cef62ecda5b65d051c84
-
SHA256
014fdffc1561ee767b1189c5b496f587d16ba7d394ca9d26d2e7d6f8541ebc92
-
SHA512
19cc012358ad74980a8f1e18bcad3718a5fb36559d5bbfe220c534c271cd8f2701cce06416438796b9dbcb97769d4b3467e0e23a13c49bc60e597e0a6ad49e13
Malware Config
Extracted
xloader
2.5
mxnu
http://www.naplesconciergerealty.com/mxnu/
insightmyhome.com
gabriellamaxey.com
029atk.xyz
marshconstructions.com
technichoffghosts.com
blue-ivy-boutique-au.com
1sunsetgroup.com
elfkuhnispb.store
caoliudh.club
verifiedpaypal.net
jellyice-tr.com
gatescres.com
bloomberq.online
crystaltopagent.net
uggs-line.com
ecommerceplatform.xyz
historyofcambridge.com
sattaking-gaziabad.xyz
digisor.com
beachpawsmobilegrooming.com
whitebot.xyz
zacky6.online
qlfa8gzk8f.com
scottjasonfowler.com
influxair.com
desongli.com
xn--w7uy63f0ne2sj.com
pinup722bk.com
haohuatour.com
dharmathinkural.com
hanjyu.com
tbrhc.com
clarityflux.com
meltonandcompany.com
revgeek.com
onehigh.club
closetu.com
yama-nkok.com
brandonhistoryandinfo.com
funkidsroomdecor.com
epilasyonmerkeziankara.com
265411.com
watch12.online
dealsbonaza.com
gold2guide.art
tomclark.online
877961.com
washingtonboatrentals.com
promovart.com
megapollice.online
taquerialoteria.com
foxsontreeservice.com
safebookkeeping.com
theeducationwheel.online
sasanos.com
procurovariedades.com
normandia.pro
ingdalynnia.xyz
campusguideconsulting.com
ashramseries.com
clubcupids.art
mortgagerates.solutions
deepscanlabs.com
insulated-box.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/320-56-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/320-57-0x000000000041D4A0-mapping.dmp xloader -
Loads dropped DLL 1 IoCs
Processes:
c0eb90010d882e33340c40bde08474cb.exepid process 2032 c0eb90010d882e33340c40bde08474cb.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
c0eb90010d882e33340c40bde08474cb.exedescription pid process target process PID 2032 set thread context of 320 2032 c0eb90010d882e33340c40bde08474cb.exe c0eb90010d882e33340c40bde08474cb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
c0eb90010d882e33340c40bde08474cb.exepid process 320 c0eb90010d882e33340c40bde08474cb.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
c0eb90010d882e33340c40bde08474cb.exedescription pid process target process PID 2032 wrote to memory of 320 2032 c0eb90010d882e33340c40bde08474cb.exe c0eb90010d882e33340c40bde08474cb.exe PID 2032 wrote to memory of 320 2032 c0eb90010d882e33340c40bde08474cb.exe c0eb90010d882e33340c40bde08474cb.exe PID 2032 wrote to memory of 320 2032 c0eb90010d882e33340c40bde08474cb.exe c0eb90010d882e33340c40bde08474cb.exe PID 2032 wrote to memory of 320 2032 c0eb90010d882e33340c40bde08474cb.exe c0eb90010d882e33340c40bde08474cb.exe PID 2032 wrote to memory of 320 2032 c0eb90010d882e33340c40bde08474cb.exe c0eb90010d882e33340c40bde08474cb.exe PID 2032 wrote to memory of 320 2032 c0eb90010d882e33340c40bde08474cb.exe c0eb90010d882e33340c40bde08474cb.exe PID 2032 wrote to memory of 320 2032 c0eb90010d882e33340c40bde08474cb.exe c0eb90010d882e33340c40bde08474cb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0eb90010d882e33340c40bde08474cb.exe"C:\Users\Admin\AppData\Local\Temp\c0eb90010d882e33340c40bde08474cb.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\c0eb90010d882e33340c40bde08474cb.exe"C:\Users\Admin\AppData\Local\Temp\c0eb90010d882e33340c40bde08474cb.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nsyB230.tmp\fgxbpquymg.dllMD5
0b97cba1e0824c22255acd7317ed649d
SHA15c015f2a900554ba0d2303f5da3ebbaa78f7940a
SHA2561618a682392591c00a2ee82b7eb7f4f082ec34350ad30dbe619b57198688b1e8
SHA512e14ff3d23a702ff88077155e4c3262abcb20ad4d63d95070ad27046284db1ecaa586cef4a8ab22d1dd7d0361966d24f418d039cc04a52309ab9314f7fa58f123
-
memory/320-56-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/320-57-0x000000000041D4A0-mapping.dmp
-
memory/320-58-0x0000000000890000-0x0000000000B93000-memory.dmpFilesize
3.0MB
-
memory/2032-54-0x00000000759B1000-0x00000000759B3000-memory.dmpFilesize
8KB