Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
03-11-2021 11:36
Static task
static1
Behavioral task
behavioral1
Sample
rfq.exe
Resource
win7-en-20211014
General
-
Target
rfq.exe
-
Size
304KB
-
MD5
1fefc11b33956003889da1a5337179f4
-
SHA1
01a2773637fa5eea87508ee768d7ccff9bd09f7b
-
SHA256
9b4f227304980351439c58e4b8a29844c7929c11de71051cf7c79f348996e8b1
-
SHA512
f5e8faf8d630acf5a5f9cdd34e2b87cb67cb8877e5790ab63626adcb7f447bc05cd2d54b728b2c613f12b656c3a8f5b7516c0c5dcbed1a3d8bbcc1c0fa7c292a
Malware Config
Extracted
xloader
2.5
unzn
http://www.davanamays.com/unzn/
xiulf.com
highcountrymortar.com
523561.com
marketingagency.tools
ganmovie.net
nationaalcontactpunt.com
sirrbter.com
begizas.xyz
missimi-fashion.com
munixc.info
daas.support
spaceworbc.com
faithtruthresolve.com
gymkub.com
thegrayverse.xyz
artisanmakefurniture.com
029tryy.com
ijuubx.biz
iphone13promax.club
techuniversus.com
samrgov.xyz
grownupcurl.com
sj0755.net
beekeeperkit.com
richessesabondantes.com
xclgjgjh.net
webworkscork.com
vedepviet365.com
bretabeameven.com
cdzsmhw.com
clearperspective.biz
tigrg5g784sh.biz
bbezan011.xyz
mycar.store
mansooralobeidli.com
ascensionmemberszoom.com
unlimitedrehab.com
wozka.top
askylarkgoods.com
rj793.com
prosvalor.com
primetimeexpress.com
boixosnoisperu.com
mmasportgear.com
concertiranian.net
hyponymys.info
maila.one
yti0fyic.xyz
shashiprayag.com
speedprosmotorsports.com
westchestercountyjunkcars.com
patienceinmypocket.com
rausachbaoloc.com
plexregroup.com
outsydercs.com
foodandflour.com
lenacrypto.xyz
homeservicetoday.net
marthaperry.com
vmtcyd4q8.com
shamefulguys.com
loccssol.store
gnarledportra.xyz
042atk.xyz
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/572-57-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/572-58-0x000000000041D430-mapping.dmp xloader behavioral1/memory/1124-66-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1100 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
rfq.exepid process 1820 rfq.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
rfq.exerfq.execmd.exedescription pid process target process PID 1820 set thread context of 572 1820 rfq.exe rfq.exe PID 572 set thread context of 1212 572 rfq.exe Explorer.EXE PID 1124 set thread context of 1212 1124 cmd.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
rfq.execmd.exepid process 572 rfq.exe 572 rfq.exe 1124 cmd.exe 1124 cmd.exe 1124 cmd.exe 1124 cmd.exe 1124 cmd.exe 1124 cmd.exe 1124 cmd.exe 1124 cmd.exe 1124 cmd.exe 1124 cmd.exe 1124 cmd.exe 1124 cmd.exe 1124 cmd.exe 1124 cmd.exe 1124 cmd.exe 1124 cmd.exe 1124 cmd.exe 1124 cmd.exe 1124 cmd.exe 1124 cmd.exe 1124 cmd.exe 1124 cmd.exe 1124 cmd.exe 1124 cmd.exe 1124 cmd.exe 1124 cmd.exe 1124 cmd.exe 1124 cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1212 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
rfq.execmd.exepid process 572 rfq.exe 572 rfq.exe 572 rfq.exe 1124 cmd.exe 1124 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
rfq.execmd.exedescription pid process Token: SeDebugPrivilege 572 rfq.exe Token: SeDebugPrivilege 1124 cmd.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1212 Explorer.EXE 1212 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1212 Explorer.EXE 1212 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
rfq.exeExplorer.EXEcmd.exedescription pid process target process PID 1820 wrote to memory of 572 1820 rfq.exe rfq.exe PID 1820 wrote to memory of 572 1820 rfq.exe rfq.exe PID 1820 wrote to memory of 572 1820 rfq.exe rfq.exe PID 1820 wrote to memory of 572 1820 rfq.exe rfq.exe PID 1820 wrote to memory of 572 1820 rfq.exe rfq.exe PID 1820 wrote to memory of 572 1820 rfq.exe rfq.exe PID 1820 wrote to memory of 572 1820 rfq.exe rfq.exe PID 1212 wrote to memory of 1124 1212 Explorer.EXE cmd.exe PID 1212 wrote to memory of 1124 1212 Explorer.EXE cmd.exe PID 1212 wrote to memory of 1124 1212 Explorer.EXE cmd.exe PID 1212 wrote to memory of 1124 1212 Explorer.EXE cmd.exe PID 1124 wrote to memory of 1100 1124 cmd.exe cmd.exe PID 1124 wrote to memory of 1100 1124 cmd.exe cmd.exe PID 1124 wrote to memory of 1100 1124 cmd.exe cmd.exe PID 1124 wrote to memory of 1100 1124 cmd.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\rfq.exe"C:\Users\Admin\AppData\Local\Temp\rfq.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\rfq.exe"C:\Users\Admin\AppData\Local\Temp\rfq.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\rfq.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nsdCAA0.tmp\lgyx.dllMD5
85f315070bb4e1181d70ad3cd91fb245
SHA11848b67bb67f9c5235367e60f9828c0081c34a25
SHA256fd1cedeacb764040a514e54679106f609c1724559b17ae4c051f73135190cfcb
SHA5121868003df1d37738929d4a88bf3666a3157cc36b17f243fd034f1301872617d91104314fe6a4c66253e0c63d36e63f0a307c22810099777dbd2580415d8fb927
-
memory/572-57-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/572-58-0x000000000041D430-mapping.dmp
-
memory/572-61-0x00000000003E0000-0x00000000003F1000-memory.dmpFilesize
68KB
-
memory/572-60-0x0000000000770000-0x0000000000A73000-memory.dmpFilesize
3.0MB
-
memory/1100-64-0x0000000000000000-mapping.dmp
-
memory/1124-65-0x000000004A220000-0x000000004A26C000-memory.dmpFilesize
304KB
-
memory/1124-63-0x0000000000000000-mapping.dmp
-
memory/1124-66-0x0000000000080000-0x00000000000A9000-memory.dmpFilesize
164KB
-
memory/1124-67-0x0000000002130000-0x0000000002433000-memory.dmpFilesize
3.0MB
-
memory/1124-68-0x0000000000460000-0x00000000004F0000-memory.dmpFilesize
576KB
-
memory/1212-62-0x0000000007500000-0x0000000007697000-memory.dmpFilesize
1.6MB
-
memory/1212-69-0x0000000003CB0000-0x0000000003D56000-memory.dmpFilesize
664KB
-
memory/1820-55-0x00000000757E1000-0x00000000757E3000-memory.dmpFilesize
8KB