Analysis
-
max time kernel
148s -
max time network
162s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
01-11-2021 11:45
Static task
static1
Behavioral task
behavioral1
Sample
MO_2580986754.exe
Resource
win7-en-20211014
General
-
Target
MO_2580986754.exe
-
Size
251KB
-
MD5
b061f3cb09185ba712407645f423f4b1
-
SHA1
0c3cd8e82548c76e841be16d9ef1e37b6abc4b8f
-
SHA256
a8dd512305c64cc4bb8d456844e1a02defb4d3a012888de8b87b4c8ea58bb3b4
-
SHA512
0a03b535891be17d7fe3c0e9be95eba0a58540cba44a557cddaaca6b9231707431b49bcee667cf458699c9c06dd88fac511a868bce7d48102320721c654e43fc
Malware Config
Extracted
xloader
2.5
u5eh
http://www.retonamoss.com/u5eh/
tryafaq.com
bobcathntshop.com
oglead.com
026skz.xyz
brasbux.com
adna17.com
noveltyrofjiy.xyz
realestatecompanys.com
leman-web.com
df5686.com
jonathonhawkins.com
juliedominyfloralartistry.com
classyeventsco.com
aquaticatt.com
iotworld.xyz
hoc8.com
disposablediapers.store
peregovorim.online
advancebits.club
getaburialplan.com
tiger-trails.com
dnbaba.com
492981.com
eclipse-electrical-euless.com
cassandracchase.com
healthrightmeds.club
permkray.club
tawazoun-dz.com
extrabladet.com
offmanage.com
peoplexplants.com
mumkungiyim.com
personal-email-office-mgt.com
bjmysa.com
hopshomes.com
cnj-power.com
trendproduct.tech
chauffeuredaustralia.online
176ssjp0033.xyz
52juns.com
rewriringcanada.com
seabourneboats.com
sevensummittrek.com
retalent.agency
lz4ios.cloud
mindandbodyalignment.com
bedrijfmail-trk.com
bashmoney.net
xc3654.com
infiteltech.com
sh-hywz.com
huataiqche.com
grannyh.com
devinwithani.com
kingstons.info
fakedocshyundaigiveaway.com
bigsyncmusic.info
predstavnuk.com
frontiervalley8.com
timdpr.com
smartgymadmin.com
brsgeniusschool.com
tuckertractorworks.com
espchange.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2136-116-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2136-117-0x000000000041D3E0-mapping.dmp xloader behavioral2/memory/2260-124-0x0000000000E50000-0x0000000000E79000-memory.dmp xloader -
Loads dropped DLL 1 IoCs
Processes:
MO_2580986754.exepid process 2092 MO_2580986754.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
MO_2580986754.exeMO_2580986754.exehelp.exedescription pid process target process PID 2092 set thread context of 2136 2092 MO_2580986754.exe MO_2580986754.exe PID 2136 set thread context of 3068 2136 MO_2580986754.exe Explorer.EXE PID 2260 set thread context of 3068 2260 help.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
MO_2580986754.exehelp.exepid process 2136 MO_2580986754.exe 2136 MO_2580986754.exe 2136 MO_2580986754.exe 2136 MO_2580986754.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe 2260 help.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3068 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
MO_2580986754.exehelp.exepid process 2136 MO_2580986754.exe 2136 MO_2580986754.exe 2136 MO_2580986754.exe 2260 help.exe 2260 help.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
MO_2580986754.exehelp.exedescription pid process Token: SeDebugPrivilege 2136 MO_2580986754.exe Token: SeDebugPrivilege 2260 help.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
MO_2580986754.exeExplorer.EXEhelp.exedescription pid process target process PID 2092 wrote to memory of 2136 2092 MO_2580986754.exe MO_2580986754.exe PID 2092 wrote to memory of 2136 2092 MO_2580986754.exe MO_2580986754.exe PID 2092 wrote to memory of 2136 2092 MO_2580986754.exe MO_2580986754.exe PID 2092 wrote to memory of 2136 2092 MO_2580986754.exe MO_2580986754.exe PID 2092 wrote to memory of 2136 2092 MO_2580986754.exe MO_2580986754.exe PID 2092 wrote to memory of 2136 2092 MO_2580986754.exe MO_2580986754.exe PID 3068 wrote to memory of 2260 3068 Explorer.EXE help.exe PID 3068 wrote to memory of 2260 3068 Explorer.EXE help.exe PID 3068 wrote to memory of 2260 3068 Explorer.EXE help.exe PID 2260 wrote to memory of 1284 2260 help.exe cmd.exe PID 2260 wrote to memory of 1284 2260 help.exe cmd.exe PID 2260 wrote to memory of 1284 2260 help.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MO_2580986754.exe"C:\Users\Admin\AppData\Local\Temp\MO_2580986754.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MO_2580986754.exe"C:\Users\Admin\AppData\Local\Temp\MO_2580986754.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\MO_2580986754.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nslD246.tmp\uwrccjlozps.dllMD5
fbe1297387ed82513628ea53759fa97f
SHA195a8bb562f6b5c36ef1c938723c10fbfa5ae3a63
SHA2567330257789e2ac84f5af036ccbe203e417bd6d17a731b11914c2cb4a046fcee9
SHA5126273619cdaaab4ab1f78f0822b5949a250a68e4f82fa142178844edbf6c3b7e4cf90cf39a493d9c60ef0ae8bad02bfe76d71b26dd30ec794c129f8773122b73d
-
memory/1284-125-0x0000000000000000-mapping.dmp
-
memory/2136-120-0x00000000006E0000-0x00000000006F1000-memory.dmpFilesize
68KB
-
memory/2136-117-0x000000000041D3E0-mapping.dmp
-
memory/2136-119-0x0000000000B50000-0x0000000000E70000-memory.dmpFilesize
3.1MB
-
memory/2136-116-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2260-122-0x0000000000000000-mapping.dmp
-
memory/2260-124-0x0000000000E50000-0x0000000000E79000-memory.dmpFilesize
164KB
-
memory/2260-123-0x0000000000FD0000-0x0000000000FD7000-memory.dmpFilesize
28KB
-
memory/2260-126-0x00000000036B0000-0x00000000039D0000-memory.dmpFilesize
3.1MB
-
memory/2260-127-0x0000000003280000-0x0000000003310000-memory.dmpFilesize
576KB
-
memory/3068-121-0x0000000000CD0000-0x0000000000DD8000-memory.dmpFilesize
1.0MB
-
memory/3068-128-0x0000000006790000-0x00000000068FE000-memory.dmpFilesize
1.4MB