Analysis
-
max time kernel
133s -
max time network
157s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
21-10-2021 21:26
Static task
static1
General
-
Target
19428f9c431fb0f8d6fbd9ca194589bacf9d9d3e475717031373b71982bea2a5.exe
-
Size
254KB
-
MD5
73fe142254abec3aeaef375f0564d40a
-
SHA1
8529d972dd89f69eb2dc2a3ba9207e67626de9b9
-
SHA256
19428f9c431fb0f8d6fbd9ca194589bacf9d9d3e475717031373b71982bea2a5
-
SHA512
848d4bc144f1f861823f08ab355184786f3832555236dffa2b5639e3ceb6c2578ff0da8c3870ba26f11f7609f0f4bbc50312db565c3a6adc6e8e3155915b328e
Malware Config
Extracted
xloader
2.5
kqna
http://www.surfsolutions.info/kqna/
achyutlifesciences.com
anthemmg.com
netkopat.com
generationgirlnaturals.com
novatel-network.com
craftstockco.com
thevishantiverse.art
elkerfly.com
haerotechs.com
candypalette.com
gregdokes.com
e-commerce.company
gratitudeland.com
companyintelcloud.com
publicyazilim.com
xc6811.com
aracsozluk.com
janesgalant.quest
fraserstephendop.com
ryan.rentals
wyse-solutions.com
reddishslouqb.xyz
rukygua.xyz
unlimitedrehab.com
fundafes.com
goodoffice.online
guserq.com
tigerstarmatka.com
ganleychevybuyscars.com
murrayforcongress.com
artistandfund.com
integritynotarial.com
cantomarbait.com
alifdanismanlik.com
meggisiegert.com
high-clicks3.com
xn--schwche-8wa.com
caffeiny.com
landsoftexasranchland.com
armmapp.com
cursosminharendaextra.com
globalmarineserv.com
lowestfars.com
finlayo.com
hautlescoeurscollection.com
cyclesforyou.com
bagwashs.com
medicaltrust-sd.com
passivemen.com
midatlanticbath.com
mchaskellproperties.com
facetofacewith.com
worldwidecorumuk.com
g632b.online
atozshoppingllc.com
jcswkj.net
czemi.com
minutemannetwork.net
hjku.xyz
uko7wuyj.xyz
amigasconesencia.com
hodgeandpartners.com
edfnu.com
corncobmeal.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1084-119-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1084-120-0x000000000041D400-mapping.dmp xloader -
Loads dropped DLL 1 IoCs
Processes:
19428f9c431fb0f8d6fbd9ca194589bacf9d9d3e475717031373b71982bea2a5.exepid process 660 19428f9c431fb0f8d6fbd9ca194589bacf9d9d3e475717031373b71982bea2a5.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
19428f9c431fb0f8d6fbd9ca194589bacf9d9d3e475717031373b71982bea2a5.exedescription pid process target process PID 660 set thread context of 1084 660 19428f9c431fb0f8d6fbd9ca194589bacf9d9d3e475717031373b71982bea2a5.exe 19428f9c431fb0f8d6fbd9ca194589bacf9d9d3e475717031373b71982bea2a5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
19428f9c431fb0f8d6fbd9ca194589bacf9d9d3e475717031373b71982bea2a5.exepid process 1084 19428f9c431fb0f8d6fbd9ca194589bacf9d9d3e475717031373b71982bea2a5.exe 1084 19428f9c431fb0f8d6fbd9ca194589bacf9d9d3e475717031373b71982bea2a5.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
19428f9c431fb0f8d6fbd9ca194589bacf9d9d3e475717031373b71982bea2a5.exedescription pid process target process PID 660 wrote to memory of 1084 660 19428f9c431fb0f8d6fbd9ca194589bacf9d9d3e475717031373b71982bea2a5.exe 19428f9c431fb0f8d6fbd9ca194589bacf9d9d3e475717031373b71982bea2a5.exe PID 660 wrote to memory of 1084 660 19428f9c431fb0f8d6fbd9ca194589bacf9d9d3e475717031373b71982bea2a5.exe 19428f9c431fb0f8d6fbd9ca194589bacf9d9d3e475717031373b71982bea2a5.exe PID 660 wrote to memory of 1084 660 19428f9c431fb0f8d6fbd9ca194589bacf9d9d3e475717031373b71982bea2a5.exe 19428f9c431fb0f8d6fbd9ca194589bacf9d9d3e475717031373b71982bea2a5.exe PID 660 wrote to memory of 1084 660 19428f9c431fb0f8d6fbd9ca194589bacf9d9d3e475717031373b71982bea2a5.exe 19428f9c431fb0f8d6fbd9ca194589bacf9d9d3e475717031373b71982bea2a5.exe PID 660 wrote to memory of 1084 660 19428f9c431fb0f8d6fbd9ca194589bacf9d9d3e475717031373b71982bea2a5.exe 19428f9c431fb0f8d6fbd9ca194589bacf9d9d3e475717031373b71982bea2a5.exe PID 660 wrote to memory of 1084 660 19428f9c431fb0f8d6fbd9ca194589bacf9d9d3e475717031373b71982bea2a5.exe 19428f9c431fb0f8d6fbd9ca194589bacf9d9d3e475717031373b71982bea2a5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\19428f9c431fb0f8d6fbd9ca194589bacf9d9d3e475717031373b71982bea2a5.exe"C:\Users\Admin\AppData\Local\Temp\19428f9c431fb0f8d6fbd9ca194589bacf9d9d3e475717031373b71982bea2a5.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\19428f9c431fb0f8d6fbd9ca194589bacf9d9d3e475717031373b71982bea2a5.exe"C:\Users\Admin\AppData\Local\Temp\19428f9c431fb0f8d6fbd9ca194589bacf9d9d3e475717031373b71982bea2a5.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nsn318C.tmp\yhjjbtf.dllMD5
2109a0431e1e8fbce8007bc6dbdc8d2d
SHA1f85d1cfa01ca893063af01510115bc279da84c2a
SHA256520857c7a5bfaeebf0f39504ae85d32b7e153774e93cb2be486f9a5d35b76d05
SHA512a190901c467b65b18370aa3dbec9bb994294042fb78965b6baaf92a31fdc316912679a23f81f76a0d30f51c9c9ccbabcd58b0d420a1c6060508de1f0c0d320fb
-
memory/1084-119-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1084-120-0x000000000041D400-mapping.dmp
-
memory/1084-121-0x00000000009E0000-0x0000000000D00000-memory.dmpFilesize
3.1MB