Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
22-10-2021 08:08
Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7-en-20211014
General
-
Target
1.exe
-
Size
416KB
-
MD5
1a3bcd7f400b0d7a37166c1c5af7f886
-
SHA1
a654cdfc29951ac2e77af3fbbbd7160b5205c8f9
-
SHA256
fe63755f7b7c30e933cb3897136a75a7d1903ca044a04ef9bd91d426596f279d
-
SHA512
47974116e9b5b0cc6407fe7c651619b6fef5af7df0190d3b4e5c906a1520ed66ae7e4e1af6e578bf93af9dbd3625845678fd834aea15db9082dad2abbd77f69f
Malware Config
Extracted
xloader
2.5
iaop
http://www.georgeinnhatherleigh.com/iaop/
oosakichi.com
group1beadles.com
navegadorexclusivo.digital
awefca.xyz
strakerwilliams.com
stone-img.com
radialodge.com
tequesquitengo.net
humanegardens.com
rubberyporqjp.xyz
farazkhak.com
gfsexpornvideos.com
stealth-carrier.com
hemtpi.xyz
tygcj.com
agileiance.com
ioan316.com
kitchendesigns.xyz
shannacarolphotography.com
oheytech88.net
dashiter.com
zijinmenhu.com
dmfiller.com
amberchee.com
farmaciaepspllu.com
help-kmcsupport.com
naxek.com
yuumgo.academy
baopishuizhong.com
appcast-64.com
vpm-vektra.com
privygym.com
texascyclerepair.com
queerstakepool.com
maxicashprokil.xyz
enchantbnuyxc.xyz
heyunshangcheng.info
blockchainsupport.company
consultoriathayanechlad.com
cigreencig.com
enriquelopez.net
ultimateexitstrategy.com
jesuspodcast.biz
wecuxs.com
louroblottoyof2.xyz
12monthmillionairetraining.com
autoecoleamiens.com
kokko-kids.com
uniquecarbonbrush.com
fardaruilen.quest
generalcontractortheodoreal.com
kare-furniture.com
odnglobal.com
rihaltravels.com
jdlpcpa.com
websupportoutlook.com
sonyagivensrealty.com
johnmcnamaraimages.net
fa7777.xyz
northvisiondigital.com
docteurhouyengah.com
contactcenter7.email
lebenohnefleisch.com
sign-egypt.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1328-57-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1328-58-0x000000000041D4E0-mapping.dmp xloader behavioral1/memory/1476-65-0x0000000000090000-0x00000000000B9000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 920 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
1.exepid process 1876 1.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
1.exe1.exehelp.exedescription pid process target process PID 1876 set thread context of 1328 1876 1.exe 1.exe PID 1328 set thread context of 1304 1328 1.exe Explorer.EXE PID 1476 set thread context of 1304 1476 help.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
1.exehelp.exepid process 1328 1.exe 1328 1.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe 1476 help.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1304 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
1.exehelp.exepid process 1328 1.exe 1328 1.exe 1328 1.exe 1476 help.exe 1476 help.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
1.exehelp.exedescription pid process Token: SeDebugPrivilege 1328 1.exe Token: SeDebugPrivilege 1476 help.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1304 Explorer.EXE 1304 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1304 Explorer.EXE 1304 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
1.exeExplorer.EXEhelp.exedescription pid process target process PID 1876 wrote to memory of 1328 1876 1.exe 1.exe PID 1876 wrote to memory of 1328 1876 1.exe 1.exe PID 1876 wrote to memory of 1328 1876 1.exe 1.exe PID 1876 wrote to memory of 1328 1876 1.exe 1.exe PID 1876 wrote to memory of 1328 1876 1.exe 1.exe PID 1876 wrote to memory of 1328 1876 1.exe 1.exe PID 1876 wrote to memory of 1328 1876 1.exe 1.exe PID 1304 wrote to memory of 1476 1304 Explorer.EXE help.exe PID 1304 wrote to memory of 1476 1304 Explorer.EXE help.exe PID 1304 wrote to memory of 1476 1304 Explorer.EXE help.exe PID 1304 wrote to memory of 1476 1304 Explorer.EXE help.exe PID 1476 wrote to memory of 920 1476 help.exe cmd.exe PID 1476 wrote to memory of 920 1476 help.exe cmd.exe PID 1476 wrote to memory of 920 1476 help.exe cmd.exe PID 1476 wrote to memory of 920 1476 help.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\1.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nsyBEED.tmp\wvhivcwcy.dllMD5
5d0d2589c6c859b43bb0e6c6b88fa767
SHA14085e250109fefddf1a35b3fb3fadc66714effda
SHA2566de76b65e1561c0897a3261b9fe55ac75ef4d1e2456a302a9257dc38dcb81d1e
SHA5128ef33f865ed19fd6779e7520590bbe1aa864cc5f7e3222f314f6953abcbc7537aaf2397f0b91a720db3e220cea1c3da15ec453ea1d5bb82a7d783bf5853b68af
-
memory/920-67-0x0000000000000000-mapping.dmp
-
memory/1304-62-0x0000000007570000-0x0000000007706000-memory.dmpFilesize
1.6MB
-
memory/1304-69-0x0000000005DC0000-0x0000000005EA0000-memory.dmpFilesize
896KB
-
memory/1328-58-0x000000000041D4E0-mapping.dmp
-
memory/1328-60-0x0000000000740000-0x0000000000A43000-memory.dmpFilesize
3.0MB
-
memory/1328-61-0x0000000000360000-0x0000000000371000-memory.dmpFilesize
68KB
-
memory/1328-57-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1476-63-0x0000000000000000-mapping.dmp
-
memory/1476-64-0x0000000000030000-0x0000000000036000-memory.dmpFilesize
24KB
-
memory/1476-65-0x0000000000090000-0x00000000000B9000-memory.dmpFilesize
164KB
-
memory/1476-66-0x00000000008B0000-0x0000000000BB3000-memory.dmpFilesize
3.0MB
-
memory/1476-68-0x00000000002F0000-0x0000000000380000-memory.dmpFilesize
576KB
-
memory/1876-55-0x0000000075B71000-0x0000000075B73000-memory.dmpFilesize
8KB