Analysis
-
max time kernel
120s -
max time network
163s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
21-10-2021 21:26
Static task
static1
General
-
Target
7d1119a09c3f150ab964941c3a539fa3d1257cdb980df7e1535012378ae3974e.exe
-
Size
253KB
-
MD5
5e9c6466f89089a73465bec3e84f6731
-
SHA1
7faa635ff81bf5a1ff5b56109f9d0a7088b5c1d1
-
SHA256
7d1119a09c3f150ab964941c3a539fa3d1257cdb980df7e1535012378ae3974e
-
SHA512
84241a9a1d1e700c52a736cf9d1225300c4d5c14485533aa08429b2c01f0d712067ba90c334ec474f997d8686e8433b08d1e5c925b6aeda6892c71cd17ad842b
Malware Config
Extracted
xloader
2.5
ons6
http://www.parasitevhs.net/ons6/
946acc.net
ilkermulla.com
edificationhub.com
aptbaby.com
luisrgonzalez.com
postandpine.com
objective-object.com
storeydrive.rentals
mobile-find.com
africanbridaluk.com
zzjn12.xyz
ritechoiceinvestmentgroup.com
zitzies.xyz
trulyproofreading.com
ktndetermine.xyz
advertising.land
keywordgomuwk.xyz
niecliomusicspirit.com
lhortelecom.com
cryptochieftan.com
fumctulsa.com
librariumclub.com
tinturas-espagiricas.com
regencyimperial.com
worldremirt.com
nikurei.com
edukado.online
med2cloud.com
sasktwl.net
ancditalia.com
nagukoohatomo.xyz
febfit.com
brasbux.com
bilinili236.xyz
girlxyz.com
trm.computer
studiomuis.com
pinnap.online
ra-hanbaiten-lulusia.xyz
desso.one
devilsheartdesign.com
gestproducts.com
mount-motion.com
miltonjorge.net
xiaomiyp6.com
rurikon2.com
wwwmwrfinancial.com
mikexktolsd.com
businessim.net
algoescrow.com
bitterbaybay.com
acidulante.com
yourchancemarketing.com
accidental-blogger.com
breastcancerforumbd.com
viellacharteredland.com
wkefaromaticum.com
guardianenergy.group
gamblersprintcars.com
midiff.com
firstbymel.com
fdwqw.xyz
ngatihaukoporeihana.com
pictureballthose.top
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/316-116-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/316-117-0x000000000041D400-mapping.dmp xloader -
Loads dropped DLL 1 IoCs
Processes:
7d1119a09c3f150ab964941c3a539fa3d1257cdb980df7e1535012378ae3974e.exepid process 1588 7d1119a09c3f150ab964941c3a539fa3d1257cdb980df7e1535012378ae3974e.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
7d1119a09c3f150ab964941c3a539fa3d1257cdb980df7e1535012378ae3974e.exedescription pid process target process PID 1588 set thread context of 316 1588 7d1119a09c3f150ab964941c3a539fa3d1257cdb980df7e1535012378ae3974e.exe 7d1119a09c3f150ab964941c3a539fa3d1257cdb980df7e1535012378ae3974e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
7d1119a09c3f150ab964941c3a539fa3d1257cdb980df7e1535012378ae3974e.exepid process 316 7d1119a09c3f150ab964941c3a539fa3d1257cdb980df7e1535012378ae3974e.exe 316 7d1119a09c3f150ab964941c3a539fa3d1257cdb980df7e1535012378ae3974e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
7d1119a09c3f150ab964941c3a539fa3d1257cdb980df7e1535012378ae3974e.exedescription pid process target process PID 1588 wrote to memory of 316 1588 7d1119a09c3f150ab964941c3a539fa3d1257cdb980df7e1535012378ae3974e.exe 7d1119a09c3f150ab964941c3a539fa3d1257cdb980df7e1535012378ae3974e.exe PID 1588 wrote to memory of 316 1588 7d1119a09c3f150ab964941c3a539fa3d1257cdb980df7e1535012378ae3974e.exe 7d1119a09c3f150ab964941c3a539fa3d1257cdb980df7e1535012378ae3974e.exe PID 1588 wrote to memory of 316 1588 7d1119a09c3f150ab964941c3a539fa3d1257cdb980df7e1535012378ae3974e.exe 7d1119a09c3f150ab964941c3a539fa3d1257cdb980df7e1535012378ae3974e.exe PID 1588 wrote to memory of 316 1588 7d1119a09c3f150ab964941c3a539fa3d1257cdb980df7e1535012378ae3974e.exe 7d1119a09c3f150ab964941c3a539fa3d1257cdb980df7e1535012378ae3974e.exe PID 1588 wrote to memory of 316 1588 7d1119a09c3f150ab964941c3a539fa3d1257cdb980df7e1535012378ae3974e.exe 7d1119a09c3f150ab964941c3a539fa3d1257cdb980df7e1535012378ae3974e.exe PID 1588 wrote to memory of 316 1588 7d1119a09c3f150ab964941c3a539fa3d1257cdb980df7e1535012378ae3974e.exe 7d1119a09c3f150ab964941c3a539fa3d1257cdb980df7e1535012378ae3974e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7d1119a09c3f150ab964941c3a539fa3d1257cdb980df7e1535012378ae3974e.exe"C:\Users\Admin\AppData\Local\Temp\7d1119a09c3f150ab964941c3a539fa3d1257cdb980df7e1535012378ae3974e.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7d1119a09c3f150ab964941c3a539fa3d1257cdb980df7e1535012378ae3974e.exe"C:\Users\Admin\AppData\Local\Temp\7d1119a09c3f150ab964941c3a539fa3d1257cdb980df7e1535012378ae3974e.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nsf5030.tmp\rnzyao.dllMD5
70e70786ba2215991447cbbf5706f54f
SHA15477a0ec6586cff23039a387f3a1c8968a945d6d
SHA256cc86b72fe9369a197c80b38555433c296e0e46808b74d75ad719799087642be0
SHA51235471023269d350004827ee5565804eaddf01f75ecfa4944e339ae8ec1dd73470a3b11301b00739bd924de1fda9bd2d03d1437455fe78dace83bb6dadd9fda9a
-
memory/316-116-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/316-117-0x000000000041D400-mapping.dmp
-
memory/316-118-0x0000000000A20000-0x0000000000D40000-memory.dmpFilesize
3.1MB