Analysis
-
max time kernel
148s -
max time network
185s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
22-10-2021 03:34
Static task
static1
Behavioral task
behavioral1
Sample
XLOQKH087654560780098765.exe
Resource
win7-en-20210920
General
-
Target
XLOQKH087654560780098765.exe
-
Size
416KB
-
MD5
1a3bcd7f400b0d7a37166c1c5af7f886
-
SHA1
a654cdfc29951ac2e77af3fbbbd7160b5205c8f9
-
SHA256
fe63755f7b7c30e933cb3897136a75a7d1903ca044a04ef9bd91d426596f279d
-
SHA512
47974116e9b5b0cc6407fe7c651619b6fef5af7df0190d3b4e5c906a1520ed66ae7e4e1af6e578bf93af9dbd3625845678fd834aea15db9082dad2abbd77f69f
Malware Config
Extracted
xloader
2.5
iaop
http://www.georgeinnhatherleigh.com/iaop/
oosakichi.com
group1beadles.com
navegadorexclusivo.digital
awefca.xyz
strakerwilliams.com
stone-img.com
radialodge.com
tequesquitengo.net
humanegardens.com
rubberyporqjp.xyz
farazkhak.com
gfsexpornvideos.com
stealth-carrier.com
hemtpi.xyz
tygcj.com
agileiance.com
ioan316.com
kitchendesigns.xyz
shannacarolphotography.com
oheytech88.net
dashiter.com
zijinmenhu.com
dmfiller.com
amberchee.com
farmaciaepspllu.com
help-kmcsupport.com
naxek.com
yuumgo.academy
baopishuizhong.com
appcast-64.com
vpm-vektra.com
privygym.com
texascyclerepair.com
queerstakepool.com
maxicashprokil.xyz
enchantbnuyxc.xyz
heyunshangcheng.info
blockchainsupport.company
consultoriathayanechlad.com
cigreencig.com
enriquelopez.net
ultimateexitstrategy.com
jesuspodcast.biz
wecuxs.com
louroblottoyof2.xyz
12monthmillionairetraining.com
autoecoleamiens.com
kokko-kids.com
uniquecarbonbrush.com
fardaruilen.quest
generalcontractortheodoreal.com
kare-furniture.com
odnglobal.com
rihaltravels.com
jdlpcpa.com
websupportoutlook.com
sonyagivensrealty.com
johnmcnamaraimages.net
fa7777.xyz
northvisiondigital.com
docteurhouyengah.com
contactcenter7.email
lebenohnefleisch.com
sign-egypt.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1404-57-0x000000000041D4E0-mapping.dmp xloader behavioral1/memory/1404-56-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/620-65-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1760 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
XLOQKH087654560780098765.exepid process 376 XLOQKH087654560780098765.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
XLOQKH087654560780098765.exeXLOQKH087654560780098765.exeNETSTAT.EXEdescription pid process target process PID 376 set thread context of 1404 376 XLOQKH087654560780098765.exe XLOQKH087654560780098765.exe PID 1404 set thread context of 1384 1404 XLOQKH087654560780098765.exe Explorer.EXE PID 620 set thread context of 1384 620 NETSTAT.EXE Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
NETSTAT.EXEpid process 620 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
XLOQKH087654560780098765.exeNETSTAT.EXEpid process 1404 XLOQKH087654560780098765.exe 1404 XLOQKH087654560780098765.exe 620 NETSTAT.EXE 620 NETSTAT.EXE 620 NETSTAT.EXE 620 NETSTAT.EXE 620 NETSTAT.EXE 620 NETSTAT.EXE 620 NETSTAT.EXE 620 NETSTAT.EXE 620 NETSTAT.EXE 620 NETSTAT.EXE 620 NETSTAT.EXE 620 NETSTAT.EXE 620 NETSTAT.EXE 620 NETSTAT.EXE 620 NETSTAT.EXE 620 NETSTAT.EXE 620 NETSTAT.EXE 620 NETSTAT.EXE 620 NETSTAT.EXE 620 NETSTAT.EXE 620 NETSTAT.EXE 620 NETSTAT.EXE 620 NETSTAT.EXE 620 NETSTAT.EXE 620 NETSTAT.EXE 620 NETSTAT.EXE 620 NETSTAT.EXE 620 NETSTAT.EXE 620 NETSTAT.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1384 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
XLOQKH087654560780098765.exeNETSTAT.EXEpid process 1404 XLOQKH087654560780098765.exe 1404 XLOQKH087654560780098765.exe 1404 XLOQKH087654560780098765.exe 620 NETSTAT.EXE 620 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
XLOQKH087654560780098765.exeNETSTAT.EXEdescription pid process Token: SeDebugPrivilege 1404 XLOQKH087654560780098765.exe Token: SeDebugPrivilege 620 NETSTAT.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1384 Explorer.EXE 1384 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1384 Explorer.EXE 1384 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
XLOQKH087654560780098765.exeExplorer.EXENETSTAT.EXEdescription pid process target process PID 376 wrote to memory of 1404 376 XLOQKH087654560780098765.exe XLOQKH087654560780098765.exe PID 376 wrote to memory of 1404 376 XLOQKH087654560780098765.exe XLOQKH087654560780098765.exe PID 376 wrote to memory of 1404 376 XLOQKH087654560780098765.exe XLOQKH087654560780098765.exe PID 376 wrote to memory of 1404 376 XLOQKH087654560780098765.exe XLOQKH087654560780098765.exe PID 376 wrote to memory of 1404 376 XLOQKH087654560780098765.exe XLOQKH087654560780098765.exe PID 376 wrote to memory of 1404 376 XLOQKH087654560780098765.exe XLOQKH087654560780098765.exe PID 376 wrote to memory of 1404 376 XLOQKH087654560780098765.exe XLOQKH087654560780098765.exe PID 1384 wrote to memory of 620 1384 Explorer.EXE NETSTAT.EXE PID 1384 wrote to memory of 620 1384 Explorer.EXE NETSTAT.EXE PID 1384 wrote to memory of 620 1384 Explorer.EXE NETSTAT.EXE PID 1384 wrote to memory of 620 1384 Explorer.EXE NETSTAT.EXE PID 620 wrote to memory of 1760 620 NETSTAT.EXE cmd.exe PID 620 wrote to memory of 1760 620 NETSTAT.EXE cmd.exe PID 620 wrote to memory of 1760 620 NETSTAT.EXE cmd.exe PID 620 wrote to memory of 1760 620 NETSTAT.EXE cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\XLOQKH087654560780098765.exe"C:\Users\Admin\AppData\Local\Temp\XLOQKH087654560780098765.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\XLOQKH087654560780098765.exe"C:\Users\Admin\AppData\Local\Temp\XLOQKH087654560780098765.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\XLOQKH087654560780098765.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nsy587D.tmp\wvhivcwcy.dllMD5
5d0d2589c6c859b43bb0e6c6b88fa767
SHA14085e250109fefddf1a35b3fb3fadc66714effda
SHA2566de76b65e1561c0897a3261b9fe55ac75ef4d1e2456a302a9257dc38dcb81d1e
SHA5128ef33f865ed19fd6779e7520590bbe1aa864cc5f7e3222f314f6953abcbc7537aaf2397f0b91a720db3e220cea1c3da15ec453ea1d5bb82a7d783bf5853b68af
-
memory/376-54-0x0000000075C11000-0x0000000075C13000-memory.dmpFilesize
8KB
-
memory/620-62-0x0000000000000000-mapping.dmp
-
memory/620-67-0x0000000001F80000-0x0000000002010000-memory.dmpFilesize
576KB
-
memory/620-64-0x0000000000540000-0x0000000000549000-memory.dmpFilesize
36KB
-
memory/620-66-0x0000000002110000-0x0000000002413000-memory.dmpFilesize
3.0MB
-
memory/620-65-0x0000000000080000-0x00000000000A9000-memory.dmpFilesize
164KB
-
memory/1384-61-0x0000000004880000-0x0000000004969000-memory.dmpFilesize
932KB
-
memory/1384-68-0x0000000005E40000-0x0000000005F19000-memory.dmpFilesize
868KB
-
memory/1404-59-0x0000000000850000-0x0000000000B53000-memory.dmpFilesize
3.0MB
-
memory/1404-60-0x00000000002C0000-0x00000000002D1000-memory.dmpFilesize
68KB
-
memory/1404-56-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1404-57-0x000000000041D4E0-mapping.dmp
-
memory/1760-63-0x0000000000000000-mapping.dmp