Analysis
-
max time kernel
30s -
max time network
122s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
13-10-2021 09:42
Static task
static1
Behavioral task
behavioral1
Sample
cd082d86c8243824b21969ef80ebd2e8.exe
Resource
win7-en-20210920
General
-
Target
cd082d86c8243824b21969ef80ebd2e8.exe
-
Size
248KB
-
MD5
cd082d86c8243824b21969ef80ebd2e8
-
SHA1
dae3abb03aaab4bed3733d8756b8ddca512c9806
-
SHA256
dc79715b1603acf022ff683ea5042eda16428d8d383d3779b292e8ea8c72f81a
-
SHA512
73218fbaf8b7ee9c6d729f30e88fcf7c491dd6af09bd06af5dd4ef956cc0243e2d4a2c7f04ea9e67f7a6242bdcc2fec174c8d3693e6a629ad04bcbbe86f0a5bf
Malware Config
Extracted
xloader
2.5
mxnu
http://www.naplesconciergerealty.com/mxnu/
insightmyhome.com
gabriellamaxey.com
029atk.xyz
marshconstructions.com
technichoffghosts.com
blue-ivy-boutique-au.com
1sunsetgroup.com
elfkuhnispb.store
caoliudh.club
verifiedpaypal.net
jellyice-tr.com
gatescres.com
bloomberq.online
crystaltopagent.net
uggs-line.com
ecommerceplatform.xyz
historyofcambridge.com
sattaking-gaziabad.xyz
digisor.com
beachpawsmobilegrooming.com
whitebot.xyz
zacky6.online
qlfa8gzk8f.com
scottjasonfowler.com
influxair.com
desongli.com
xn--w7uy63f0ne2sj.com
pinup722bk.com
haohuatour.com
dharmathinkural.com
hanjyu.com
tbrhc.com
clarityflux.com
meltonandcompany.com
revgeek.com
onehigh.club
closetu.com
yama-nkok.com
brandonhistoryandinfo.com
funkidsroomdecor.com
epilasyonmerkeziankara.com
265411.com
watch12.online
dealsbonaza.com
gold2guide.art
tomclark.online
877961.com
washingtonboatrentals.com
promovart.com
megapollice.online
taquerialoteria.com
foxsontreeservice.com
safebookkeeping.com
theeducationwheel.online
sasanos.com
procurovariedades.com
normandia.pro
ingdalynnia.xyz
campusguideconsulting.com
ashramseries.com
clubcupids.art
mortgagerates.solutions
deepscanlabs.com
insulated-box.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3788-115-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3788-116-0x000000000041D4A0-mapping.dmp xloader -
Loads dropped DLL 1 IoCs
Processes:
cd082d86c8243824b21969ef80ebd2e8.exepid process 3728 cd082d86c8243824b21969ef80ebd2e8.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
cd082d86c8243824b21969ef80ebd2e8.exedescription pid process target process PID 3728 set thread context of 3788 3728 cd082d86c8243824b21969ef80ebd2e8.exe cd082d86c8243824b21969ef80ebd2e8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
cd082d86c8243824b21969ef80ebd2e8.exepid process 3788 cd082d86c8243824b21969ef80ebd2e8.exe 3788 cd082d86c8243824b21969ef80ebd2e8.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cd082d86c8243824b21969ef80ebd2e8.exedescription pid process target process PID 3728 wrote to memory of 3788 3728 cd082d86c8243824b21969ef80ebd2e8.exe cd082d86c8243824b21969ef80ebd2e8.exe PID 3728 wrote to memory of 3788 3728 cd082d86c8243824b21969ef80ebd2e8.exe cd082d86c8243824b21969ef80ebd2e8.exe PID 3728 wrote to memory of 3788 3728 cd082d86c8243824b21969ef80ebd2e8.exe cd082d86c8243824b21969ef80ebd2e8.exe PID 3728 wrote to memory of 3788 3728 cd082d86c8243824b21969ef80ebd2e8.exe cd082d86c8243824b21969ef80ebd2e8.exe PID 3728 wrote to memory of 3788 3728 cd082d86c8243824b21969ef80ebd2e8.exe cd082d86c8243824b21969ef80ebd2e8.exe PID 3728 wrote to memory of 3788 3728 cd082d86c8243824b21969ef80ebd2e8.exe cd082d86c8243824b21969ef80ebd2e8.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd082d86c8243824b21969ef80ebd2e8.exe"C:\Users\Admin\AppData\Local\Temp\cd082d86c8243824b21969ef80ebd2e8.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\cd082d86c8243824b21969ef80ebd2e8.exe"C:\Users\Admin\AppData\Local\Temp\cd082d86c8243824b21969ef80ebd2e8.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nss66CF.tmp\qjlai.dllMD5
6c8b646db465cc86802da2d0998b6f41
SHA114718c272ce06b56bd65fc60d17ab19be45f8766
SHA256ffe13c127deadbd715b04324469a50e3f88f4f2aa1497350052a579ec41cdeeb
SHA512b957b26f07f31fdc9da2f72f87b4af03f94a8f1b2618d5c1fe1e69ddb571f1cda7412ced4e54e7c328f0695b758bffea5a9a6719ea104872a158d265b1185549
-
memory/3788-115-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3788-116-0x000000000041D4A0-mapping.dmp
-
memory/3788-117-0x0000000000950000-0x0000000000C70000-memory.dmpFilesize
3.1MB