Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
05-11-2021 06:36
Static task
static1
Behavioral task
behavioral1
Sample
New order 7nbm471.exe
Resource
win7-en-20211104
General
-
Target
New order 7nbm471.exe
-
Size
287KB
-
MD5
799da86c201ef4652c1f8ca1ce49373f
-
SHA1
dec072bcf61ecccef4d330ec0fd70823994bd3b9
-
SHA256
253a4d6b49703d6dfbf3aeadd226ea692997edfb4bd0df7c6e97b7cffd1ef2f2
-
SHA512
f7cac00d671c31558de18b548fc994d4ad7bbbcd583b5a62840bb97e67f55cec429ae6ad42f0b23ac0f857b201d230ddd776a8b6757f335111707878c201b6a7
Malware Config
Extracted
xloader
2.5
u9xn
http://www.crisisinterventionadvocates.com/u9xn/
lifeguardingcoursenearme.com
bolsaspapelcdmx.com
parsleypkllqu.xyz
68134.online
shopthatlookboutique.com
canlibahisportal.com
oligopoly.city
srchwithus.online
151motors.com
17yue.info
auntmarysnj.com
hanansalman.com
heyunshangcheng.info
doorslamersplus.com
sfcn-dng.com
highvizpeople.com
seoexpertinbangladesh.com
christinegagnonjewellery.com
artifactorie.biz
mre3.net
webbyteanalysis.online
medicmir.store
shdxh.com
salvationshippingsecurity.com
michita.xyz
itskosi.com
aligncoachingconsulting.com
cryptorickclub.art
cyliamartisbackup.com
ttemola.com
mujeresenfarmalatam.com
mykombuchafactory.com
irasutoya-ryou.com
envtmyouliqy.mobi
expert-rse.com
oddanimalsink.com
piezoelectricenergy.com
itservices-india.com
wintwiin.com
umgaleloacademy.com
everythangbutwhite.com
ishhs.xyz
brandsofcannabis.com
sculptingstones.com
hilldetailingllc.com
stone-project.net
rbrituelbeaute.com
atzoom.store
pronogtiki.store
baybeg.com
b148tlrfee9evtvorgm5947.com
msjanej.com
western-overseas.info
sharpecommunications.com
atlantahomesforcarguys.com
neosudo.com
blulacedefense.com
profilecolombia.com
blacksaltspain.com
sejiw3.xyz
saint444.com
getoken.net
joycegsy.com
fezora.xyz
Signatures
-
Xloader Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1160-57-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1160-58-0x000000000041D4F0-mapping.dmp xloader behavioral1/memory/1160-63-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1892-70-0x0000000000090000-0x00000000000B9000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1116 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
New order 7nbm471.exepid process 1696 New order 7nbm471.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
New order 7nbm471.exeNew order 7nbm471.exerundll32.exedescription pid process target process PID 1696 set thread context of 1160 1696 New order 7nbm471.exe New order 7nbm471.exe PID 1160 set thread context of 1212 1160 New order 7nbm471.exe Explorer.EXE PID 1160 set thread context of 1212 1160 New order 7nbm471.exe Explorer.EXE PID 1892 set thread context of 1212 1892 rundll32.exe Explorer.EXE -
Drops file in Program Files directory 1 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\Program Files (x86)\Lxtkd\Cookies_nu0.exe rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 29 IoCs
Processes:
New order 7nbm471.exerundll32.exepid process 1160 New order 7nbm471.exe 1160 New order 7nbm471.exe 1160 New order 7nbm471.exe 1892 rundll32.exe 1892 rundll32.exe 1892 rundll32.exe 1892 rundll32.exe 1892 rundll32.exe 1892 rundll32.exe 1892 rundll32.exe 1892 rundll32.exe 1892 rundll32.exe 1892 rundll32.exe 1892 rundll32.exe 1892 rundll32.exe 1892 rundll32.exe 1892 rundll32.exe 1892 rundll32.exe 1892 rundll32.exe 1892 rundll32.exe 1892 rundll32.exe 1892 rundll32.exe 1892 rundll32.exe 1892 rundll32.exe 1892 rundll32.exe 1892 rundll32.exe 1892 rundll32.exe 1892 rundll32.exe 1892 rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1212 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
New order 7nbm471.exerundll32.exepid process 1160 New order 7nbm471.exe 1160 New order 7nbm471.exe 1160 New order 7nbm471.exe 1160 New order 7nbm471.exe 1892 rundll32.exe 1892 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
New order 7nbm471.exerundll32.exedescription pid process Token: SeDebugPrivilege 1160 New order 7nbm471.exe Token: SeDebugPrivilege 1892 rundll32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1212 Explorer.EXE 1212 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1212 Explorer.EXE 1212 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
New order 7nbm471.exeNew order 7nbm471.exerundll32.exedescription pid process target process PID 1696 wrote to memory of 1160 1696 New order 7nbm471.exe New order 7nbm471.exe PID 1696 wrote to memory of 1160 1696 New order 7nbm471.exe New order 7nbm471.exe PID 1696 wrote to memory of 1160 1696 New order 7nbm471.exe New order 7nbm471.exe PID 1696 wrote to memory of 1160 1696 New order 7nbm471.exe New order 7nbm471.exe PID 1696 wrote to memory of 1160 1696 New order 7nbm471.exe New order 7nbm471.exe PID 1696 wrote to memory of 1160 1696 New order 7nbm471.exe New order 7nbm471.exe PID 1696 wrote to memory of 1160 1696 New order 7nbm471.exe New order 7nbm471.exe PID 1160 wrote to memory of 1892 1160 New order 7nbm471.exe rundll32.exe PID 1160 wrote to memory of 1892 1160 New order 7nbm471.exe rundll32.exe PID 1160 wrote to memory of 1892 1160 New order 7nbm471.exe rundll32.exe PID 1160 wrote to memory of 1892 1160 New order 7nbm471.exe rundll32.exe PID 1160 wrote to memory of 1892 1160 New order 7nbm471.exe rundll32.exe PID 1160 wrote to memory of 1892 1160 New order 7nbm471.exe rundll32.exe PID 1160 wrote to memory of 1892 1160 New order 7nbm471.exe rundll32.exe PID 1892 wrote to memory of 1116 1892 rundll32.exe cmd.exe PID 1892 wrote to memory of 1116 1892 rundll32.exe cmd.exe PID 1892 wrote to memory of 1116 1892 rundll32.exe cmd.exe PID 1892 wrote to memory of 1116 1892 rundll32.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\New order 7nbm471.exe"C:\Users\Admin\AppData\Local\Temp\New order 7nbm471.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\New order 7nbm471.exe"C:\Users\Admin\AppData\Local\Temp\New order 7nbm471.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"4⤵
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\New order 7nbm471.exe"5⤵
- Deletes itself
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nsdBB16.tmp\rcbzyxq.dllMD5
2a3da24089acc7336f88fee94669c076
SHA1b75d6f45d201de0ccd0e57995552bf92e89f98ed
SHA2569e6fe495fbc2d93d6bb59fc2a3a72f6bf580ba4e199e441f09b2ff86db981ec0
SHA5122a7d011f3a1b05cf83cd8af8ff30bce8cf3bddf5bbad700da6b67be79c44e23f64387ba68e5650fd83125f56b3623aad56d97d75bf24dec890117cf589858ee9
-
memory/1116-68-0x0000000000000000-mapping.dmp
-
memory/1160-64-0x00000000005C0000-0x00000000005D1000-memory.dmpFilesize
68KB
-
memory/1160-57-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1160-58-0x000000000041D4F0-mapping.dmp
-
memory/1160-61-0x0000000000580000-0x0000000000591000-memory.dmpFilesize
68KB
-
memory/1160-60-0x0000000000700000-0x0000000000A03000-memory.dmpFilesize
3.0MB
-
memory/1160-63-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1212-65-0x00000000077C0000-0x00000000078F2000-memory.dmpFilesize
1.2MB
-
memory/1212-62-0x0000000006340000-0x0000000006460000-memory.dmpFilesize
1.1MB
-
memory/1212-73-0x0000000007980000-0x0000000007ABC000-memory.dmpFilesize
1.2MB
-
memory/1696-55-0x0000000075D01000-0x0000000075D03000-memory.dmpFilesize
8KB
-
memory/1892-66-0x0000000000000000-mapping.dmp
-
memory/1892-69-0x0000000000330000-0x000000000033E000-memory.dmpFilesize
56KB
-
memory/1892-70-0x0000000000090000-0x00000000000B9000-memory.dmpFilesize
164KB
-
memory/1892-71-0x0000000002280000-0x0000000002583000-memory.dmpFilesize
3.0MB
-
memory/1892-72-0x0000000000340000-0x00000000003D0000-memory.dmpFilesize
576KB