Analysis
-
max time kernel
111s -
max time network
125s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
26-10-2021 13:11
Static task
static1
General
-
Target
f8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d.exe
-
Size
349KB
-
MD5
6ff3af29fcf1cabca1e7df8a6094e4a3
-
SHA1
f382d117151ad79fa9ecd42920fe63e105aed461
-
SHA256
f8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d
-
SHA512
578cc3c53fcbc51b42b18e0cedf898b9540e74a13a075d312e776b42c5c46f5d14db0e81d76f87efc90c3fe0b34a421388c48d573846ae37de88003d6cea3661
Malware Config
Extracted
xloader
2.5
b2c0
http://www.thesewhitevvalls.com/b2c0/
bjyxszd520.xyz
hsvfingerprinting.com
elliotpioneer.com
bf396.com
chinaopedia.com
6233v.com
shopeuphoricapparel.com
loccssol.store
truefictionpictures.com
playstarexch.com
peruviancoffee.store
shobhajoshi.com
philme.net
avito-rules.com
independencehomecenters.com
atp-cayenne.com
invetorsbank.com
sasanos.com
scentfreebnb.com
catfuid.com
sunshinefamilysupport.com
madison-co-atty.net
newhousebr.com
newstodayupdate.com
kamalaanjna.com
itpronto.com
hi-loentertainment.com
sadpartyrentals.com
vertuminy.com
khomayphotocopy.club
roleconstructora.com
cottonhome.online
starsspell.com
bedrijfs-kledingshop.com
aydeyahouse.com
miaintervista.com
taolemix.com
lnagvv.space
bjmobi.com
collabkc.art
onayli.net
ecostainable.com
vi88.info
brightlifeprochoice.com
taoluzhibo.info
techgobble.com
ideemimarlikinsaat.com
andajzx.com
shineshaft.website
arroundworld.com
reyuzed.com
emilfaucets.com
lumberjackguitarloops.com
pearl-interior.com
altitudebc.com
cqjiubai.com
kutahyaescortbayanlarim.xyz
metalworkingadditives.online
unasolucioendesa.com
andrewfjohnston.com
visionmark.net
dxxlewis.com
carts-amazon.com
anadolu.academy
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3136-126-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/3136-127-0x000000000041D4C0-mapping.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
f8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d.exedescription pid process target process PID 3488 set thread context of 3136 3488 f8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d.exe f8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
f8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d.exef8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d.exepid process 3488 f8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d.exe 3488 f8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d.exe 3136 f8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d.exe 3136 f8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
f8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d.exedescription pid process Token: SeDebugPrivilege 3488 f8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
f8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d.exedescription pid process target process PID 3488 wrote to memory of 4072 3488 f8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d.exe schtasks.exe PID 3488 wrote to memory of 4072 3488 f8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d.exe schtasks.exe PID 3488 wrote to memory of 4072 3488 f8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d.exe schtasks.exe PID 3488 wrote to memory of 3136 3488 f8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d.exe f8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d.exe PID 3488 wrote to memory of 3136 3488 f8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d.exe f8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d.exe PID 3488 wrote to memory of 3136 3488 f8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d.exe f8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d.exe PID 3488 wrote to memory of 3136 3488 f8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d.exe f8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d.exe PID 3488 wrote to memory of 3136 3488 f8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d.exe f8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d.exe PID 3488 wrote to memory of 3136 3488 f8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d.exe f8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d.exe"C:\Users\Admin\AppData\Local\Temp\f8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\QmGzsmhXZS" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9C8A.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\f8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d.exe"C:\Users\Admin\AppData\Local\Temp\f8b6860b5f79411ce377df615b3e72745e773c9e89347fdf00adea4f8200e51d.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3136-126-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3136-128-0x00000000012D0000-0x00000000015F0000-memory.dmpFilesize
3.1MB
-
memory/3136-127-0x000000000041D4C0-mapping.dmp
-
memory/3488-122-0x0000000007B60000-0x0000000007B67000-memory.dmpFilesize
28KB
-
memory/3488-120-0x0000000005600000-0x0000000005601000-memory.dmpFilesize
4KB
-
memory/3488-121-0x00000000058C0000-0x00000000058C1000-memory.dmpFilesize
4KB
-
memory/3488-115-0x0000000000C30000-0x0000000000C31000-memory.dmpFilesize
4KB
-
memory/3488-123-0x000000007EBA0000-0x000000007EBA1000-memory.dmpFilesize
4KB
-
memory/3488-124-0x0000000007E40000-0x0000000007E8A000-memory.dmpFilesize
296KB
-
memory/3488-119-0x00000000055E0000-0x0000000005ADE000-memory.dmpFilesize
5.0MB
-
memory/3488-118-0x0000000005680000-0x0000000005681000-memory.dmpFilesize
4KB
-
memory/3488-117-0x0000000005AE0000-0x0000000005AE1000-memory.dmpFilesize
4KB
-
memory/4072-125-0x0000000000000000-mapping.dmp