Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
15-11-2021 07:05
Static task
static1
Behavioral task
behavioral1
Sample
soa#2021011015.exe
Resource
win7-en-20211104
General
-
Target
soa#2021011015.exe
-
Size
286KB
-
MD5
77f19e38f4e1eeb655d01114be0e710c
-
SHA1
a7bbc2ed7b159f441107d43dcceca5be98623556
-
SHA256
f9744d616627a9e5640bfb7cc0c88b03e52b53141f1647c57a3b3d77766d510d
-
SHA512
1c0f548fe3cc9e4a7ac16d7365b7f11f475b9e78daff61b548d1a7f45b7c5b633d82fdb770b079dfd51bbb0d5ee85a8891c411d1de925720184385071101db5f
Malware Config
Extracted
xloader
2.5
e8ia
http://www.helpfromjames.com/e8ia/
le-hameau-enchanteur.com
quantumsystem-au.club
engravedeeply.com
yesrecompensas.lat
cavallitowerofficials.com
800seaspray.com
skifun-jetski.com
thouartafoot.com
nft2dollar.com
petrestore.online
cjcutthecord2.com
tippimccullough.com
gadget198.xyz
djmiriam.com
bitbasepay.com
cukierniawz.com
mcclureic.xyz
inthekitchenshakinandbakin.com
busy-clicks.com
melaniemorris.online
elysiangp.com
7bkj.com
wakeanddraw.com
ascalar.com
iteraxon.com
henleygirlscricket.com
torresflooringdecorllc.com
helgquieta.quest
xesteem.com
graffity-aws.com
bolerparts.com
andriylysenko.com
bestinvest-4-you.com
frelsicycling.com
airductcleaningindianapolis.net
nlproperties.net
alkoora.xyz
sakiyaman.com
wwwsmyrnaschooldistrict.com
unitedsafetyassociation.com
fiveallianceapparel.com
edgelordkids.com
herhauling.com
intelldat.com
weprepareamerica-planet.com
webartsolution.net
yiquge.com
marraasociados.com
dentalimplantnearyou-ca.space
linemanbible.com
dunamisdispatchservicellc.com
latamoperationalinstitute.com
stpaulsschoolbagidora.com
groupninemed.com
solar-tribe.com
footairdz.com
blttsperma.quest
xfeuio.xyz
sahodyafbdchapter.com
0934800.com
dandftrading.com
gladway.net
mineriasinmercurio.com
inaampm.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/3264-116-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3264-117-0x000000000041D4D0-mapping.dmp xloader behavioral2/memory/3264-122-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/960-127-0x0000000002EF0000-0x0000000002F19000-memory.dmp xloader behavioral2/memory/960-129-0x0000000002F20000-0x0000000002FCE000-memory.dmp xloader -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
wlanext.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wlanext.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\AFM8FTBPNLW = "C:\\Program Files (x86)\\Octfht\\mssrmdb.exe" wlanext.exe -
Executes dropped EXE 1 IoCs
Processes:
mssrmdb.exepid process 776 mssrmdb.exe -
Loads dropped DLL 2 IoCs
Processes:
soa#2021011015.exemssrmdb.exepid process 2788 soa#2021011015.exe 776 mssrmdb.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 4 IoCs
Processes:
soa#2021011015.exesoa#2021011015.exewlanext.exedescription pid process target process PID 2788 set thread context of 3264 2788 soa#2021011015.exe soa#2021011015.exe PID 3264 set thread context of 3024 3264 soa#2021011015.exe Explorer.EXE PID 3264 set thread context of 3024 3264 soa#2021011015.exe Explorer.EXE PID 960 set thread context of 3024 960 wlanext.exe Explorer.EXE -
Drops file in Program Files directory 4 IoCs
Processes:
wlanext.exeExplorer.EXEdescription ioc process File opened for modification C:\Program Files (x86)\Octfht\mssrmdb.exe wlanext.exe File opened for modification C:\Program Files (x86)\Octfht Explorer.EXE File created C:\Program Files (x86)\Octfht\mssrmdb.exe Explorer.EXE File opened for modification C:\Program Files (x86)\Octfht\mssrmdb.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 4 IoCs
Processes:
resource yara_rule C:\Program Files (x86)\Octfht\mssrmdb.exe nsis_installer_1 C:\Program Files (x86)\Octfht\mssrmdb.exe nsis_installer_2 C:\Program Files (x86)\Octfht\mssrmdb.exe nsis_installer_1 C:\Program Files (x86)\Octfht\mssrmdb.exe nsis_installer_2 -
Processes:
wlanext.exedescription ioc process Key created \Registry\User\S-1-5-21-941723256-3451054534-3089625102-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 wlanext.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
Processes:
soa#2021011015.exewlanext.exepid process 3264 soa#2021011015.exe 3264 soa#2021011015.exe 3264 soa#2021011015.exe 3264 soa#2021011015.exe 3264 soa#2021011015.exe 3264 soa#2021011015.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3024 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
soa#2021011015.exewlanext.exepid process 3264 soa#2021011015.exe 3264 soa#2021011015.exe 3264 soa#2021011015.exe 3264 soa#2021011015.exe 960 wlanext.exe 960 wlanext.exe 960 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
soa#2021011015.exewlanext.exedescription pid process Token: SeDebugPrivilege 3264 soa#2021011015.exe Token: SeDebugPrivilege 960 wlanext.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
soa#2021011015.exeExplorer.EXEwlanext.exedescription pid process target process PID 2788 wrote to memory of 3264 2788 soa#2021011015.exe soa#2021011015.exe PID 2788 wrote to memory of 3264 2788 soa#2021011015.exe soa#2021011015.exe PID 2788 wrote to memory of 3264 2788 soa#2021011015.exe soa#2021011015.exe PID 2788 wrote to memory of 3264 2788 soa#2021011015.exe soa#2021011015.exe PID 2788 wrote to memory of 3264 2788 soa#2021011015.exe soa#2021011015.exe PID 2788 wrote to memory of 3264 2788 soa#2021011015.exe soa#2021011015.exe PID 3024 wrote to memory of 960 3024 Explorer.EXE wlanext.exe PID 3024 wrote to memory of 960 3024 Explorer.EXE wlanext.exe PID 3024 wrote to memory of 960 3024 Explorer.EXE wlanext.exe PID 960 wrote to memory of 660 960 wlanext.exe cmd.exe PID 960 wrote to memory of 660 960 wlanext.exe cmd.exe PID 960 wrote to memory of 660 960 wlanext.exe cmd.exe PID 960 wrote to memory of 1732 960 wlanext.exe cmd.exe PID 960 wrote to memory of 1732 960 wlanext.exe cmd.exe PID 960 wrote to memory of 1732 960 wlanext.exe cmd.exe PID 960 wrote to memory of 1012 960 wlanext.exe Firefox.exe PID 960 wrote to memory of 1012 960 wlanext.exe Firefox.exe PID 3024 wrote to memory of 776 3024 Explorer.EXE mssrmdb.exe PID 3024 wrote to memory of 776 3024 Explorer.EXE mssrmdb.exe PID 3024 wrote to memory of 776 3024 Explorer.EXE mssrmdb.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Drops file in Program Files directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\soa#2021011015.exe"C:\Users\Admin\AppData\Local\Temp\soa#2021011015.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\soa#2021011015.exe"C:\Users\Admin\AppData\Local\Temp\soa#2021011015.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Adds policy Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\soa#2021011015.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe/c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V3⤵
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵
-
C:\Program Files (x86)\Octfht\mssrmdb.exe"C:\Program Files (x86)\Octfht\mssrmdb.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Octfht\mssrmdb.exeMD5
77f19e38f4e1eeb655d01114be0e710c
SHA1a7bbc2ed7b159f441107d43dcceca5be98623556
SHA256f9744d616627a9e5640bfb7cc0c88b03e52b53141f1647c57a3b3d77766d510d
SHA5121c0f548fe3cc9e4a7ac16d7365b7f11f475b9e78daff61b548d1a7f45b7c5b633d82fdb770b079dfd51bbb0d5ee85a8891c411d1de925720184385071101db5f
-
C:\Program Files (x86)\Octfht\mssrmdb.exeMD5
77f19e38f4e1eeb655d01114be0e710c
SHA1a7bbc2ed7b159f441107d43dcceca5be98623556
SHA256f9744d616627a9e5640bfb7cc0c88b03e52b53141f1647c57a3b3d77766d510d
SHA5121c0f548fe3cc9e4a7ac16d7365b7f11f475b9e78daff61b548d1a7f45b7c5b633d82fdb770b079dfd51bbb0d5ee85a8891c411d1de925720184385071101db5f
-
C:\Users\Admin\AppData\Local\Temp\DB1MD5
b608d407fc15adea97c26936bc6f03f6
SHA1953e7420801c76393902c0d6bb56148947e41571
SHA256b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf
SHA512cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4
-
C:\Users\Admin\AppData\Local\Temp\oa3a5r1rlemkc8unMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Users\Admin\AppData\Local\Temp\nsf22.tmp\hiib.dllMD5
0aecec56e3ae0fb3d77c3c2c35d2a147
SHA1f6478611f5048e9f7d6b79c29e4e187ae15b2ada
SHA256d22526223a8d35f173f0704477783bbe564d69babbef43aa2133b8ca4172dd27
SHA5125009e773fee22b766edb902b850864b062cdf01b77bdf5ada7f9cf8b889b788b0aefc73be5e6f2af0d2b252a229001b8f3aa64989cdcf917561916dd3fbae0ae
-
\Users\Admin\AppData\Local\Temp\nstC054.tmp\hiib.dllMD5
0aecec56e3ae0fb3d77c3c2c35d2a147
SHA1f6478611f5048e9f7d6b79c29e4e187ae15b2ada
SHA256d22526223a8d35f173f0704477783bbe564d69babbef43aa2133b8ca4172dd27
SHA5125009e773fee22b766edb902b850864b062cdf01b77bdf5ada7f9cf8b889b788b0aefc73be5e6f2af0d2b252a229001b8f3aa64989cdcf917561916dd3fbae0ae
-
memory/660-128-0x0000000000000000-mapping.dmp
-
memory/776-134-0x0000000000000000-mapping.dmp
-
memory/960-130-0x0000000003400000-0x0000000003490000-memory.dmpFilesize
576KB
-
memory/960-125-0x0000000000000000-mapping.dmp
-
memory/960-126-0x0000000000030000-0x0000000000047000-memory.dmpFilesize
92KB
-
memory/960-127-0x0000000002EF0000-0x0000000002F19000-memory.dmpFilesize
164KB
-
memory/960-129-0x0000000002F20000-0x0000000002FCE000-memory.dmpFilesize
696KB
-
memory/1732-132-0x0000000000000000-mapping.dmp
-
memory/3024-131-0x0000000001080000-0x0000000001121000-memory.dmpFilesize
644KB
-
memory/3024-124-0x0000000006690000-0x00000000067DB000-memory.dmpFilesize
1.3MB
-
memory/3024-121-0x0000000006490000-0x00000000065F8000-memory.dmpFilesize
1.4MB
-
memory/3264-123-0x0000000000A20000-0x0000000000A31000-memory.dmpFilesize
68KB
-
memory/3264-122-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3264-119-0x0000000000A40000-0x0000000000D60000-memory.dmpFilesize
3.1MB
-
memory/3264-120-0x0000000000600000-0x0000000000611000-memory.dmpFilesize
68KB
-
memory/3264-117-0x000000000041D4D0-mapping.dmp
-
memory/3264-116-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB