Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
17-11-2021 07:24
Static task
static1
Behavioral task
behavioral1
Sample
PO_No.202201EYL-01_ABW.exe
Resource
win7-en-20211014
General
-
Target
PO_No.202201EYL-01_ABW.exe
-
Size
1.0MB
-
MD5
0025968e7da258b082f9c904e500568b
-
SHA1
49f3dbc6f9f52322240285c8ba8ac65d6f528c87
-
SHA256
e7f1ace8723e30320b9e8bc3dc8a079c2d82d8c58b6ef7e0810ee4f661f5f141
-
SHA512
d9f6ebef441441c7ef749039c724e7c13bb5d4cb552b2509b7f9aa19a31c255ba6213124b4bff62d78f2867d8edc73286083bf2c454cd8f0ea55fe7d488e378b
Malware Config
Extracted
xloader
2.5
46uq
http://www.liberia-infos.net/46uq/
beardeddentguy.com
envirobombs.com
mintbox.pro
xiangpusun.com
pyjama-france.com
mendocinocountylive.com
innovativepropsolutions.com
hpsaddlerock.com
qrmaindonesia.com
liphelp.com
archaeaenergy.info
18446744073709551615.com
littlecreekacresri.com
elderlycareacademy.com
drshivanieyecare.com
ashibumi.com
stevenalexandergolf.com
adoratv.net
visitnewrichmond.com
fxbvanpool.com
aarondecker.online
environmentalkivul.com
cardsncrepes.com
hopdongdientu-viettel.com
thebroughtguarantee.com
howtofindahotniche.com
1678600.win
pityana.com
akconsultoria.com
markazkreasindo.com
ronniecapitol.com
tailsontour.com
abros88.com
laboratoriodentaltj.com
fuckingmom86.xyz
5pz59.com
centralmadu.com
ispecwar.com
otetransportanddispatching.com
cartaovirtual.net
hsadmin.xyz
xn--12c2bed4dxay5cxdh1s.online
oki-net.com
scenekidfancams.com
preciousmugs.com
754711.com
helpigservices.com
blueharepress.com
xmshzs.com
lovelycharlestonhomes.com
wamhsh.com
burlesquercize.com
oppoexch.com
ditjai.tech
the-hausd-group.com
loosebland.website
syntheticloot.net
gzfusco.com
www-by.com
farraztravel.com
beheld3d.art
douyababy.space
elcuerpohumano.xyz
3soap.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2092-144-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2092-145-0x000000000041D4B0-mapping.dmp xloader behavioral2/memory/1816-240-0x0000000000580000-0x00000000005A9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
PO_No.202201EYL-01_ABW.exePO_No.202201EYL-01_ABW.exemsdt.exedescription pid process target process PID 656 set thread context of 2092 656 PO_No.202201EYL-01_ABW.exe PO_No.202201EYL-01_ABW.exe PID 2092 set thread context of 3020 2092 PO_No.202201EYL-01_ABW.exe Explorer.EXE PID 1816 set thread context of 3020 1816 msdt.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 55 IoCs
Processes:
PO_No.202201EYL-01_ABW.exepowershell.exepowershell.exePO_No.202201EYL-01_ABW.exemsdt.exepid process 656 PO_No.202201EYL-01_ABW.exe 656 PO_No.202201EYL-01_ABW.exe 656 PO_No.202201EYL-01_ABW.exe 656 PO_No.202201EYL-01_ABW.exe 656 PO_No.202201EYL-01_ABW.exe 3672 powershell.exe 3148 powershell.exe 3672 powershell.exe 2092 PO_No.202201EYL-01_ABW.exe 2092 PO_No.202201EYL-01_ABW.exe 3148 powershell.exe 2092 PO_No.202201EYL-01_ABW.exe 2092 PO_No.202201EYL-01_ABW.exe 3672 powershell.exe 3148 powershell.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe 1816 msdt.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3020 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
PO_No.202201EYL-01_ABW.exemsdt.exepid process 2092 PO_No.202201EYL-01_ABW.exe 2092 PO_No.202201EYL-01_ABW.exe 2092 PO_No.202201EYL-01_ABW.exe 1816 msdt.exe 1816 msdt.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
PO_No.202201EYL-01_ABW.exepowershell.exepowershell.exePO_No.202201EYL-01_ABW.exemsdt.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 656 PO_No.202201EYL-01_ABW.exe Token: SeDebugPrivilege 3672 powershell.exe Token: SeDebugPrivilege 3148 powershell.exe Token: SeDebugPrivilege 2092 PO_No.202201EYL-01_ABW.exe Token: SeDebugPrivilege 1816 msdt.exe Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE Token: SeShutdownPrivilege 3020 Explorer.EXE Token: SeCreatePagefilePrivilege 3020 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
PO_No.202201EYL-01_ABW.exeExplorer.EXEdescription pid process target process PID 656 wrote to memory of 3672 656 PO_No.202201EYL-01_ABW.exe powershell.exe PID 656 wrote to memory of 3672 656 PO_No.202201EYL-01_ABW.exe powershell.exe PID 656 wrote to memory of 3672 656 PO_No.202201EYL-01_ABW.exe powershell.exe PID 656 wrote to memory of 3148 656 PO_No.202201EYL-01_ABW.exe powershell.exe PID 656 wrote to memory of 3148 656 PO_No.202201EYL-01_ABW.exe powershell.exe PID 656 wrote to memory of 3148 656 PO_No.202201EYL-01_ABW.exe powershell.exe PID 656 wrote to memory of 1964 656 PO_No.202201EYL-01_ABW.exe schtasks.exe PID 656 wrote to memory of 1964 656 PO_No.202201EYL-01_ABW.exe schtasks.exe PID 656 wrote to memory of 1964 656 PO_No.202201EYL-01_ABW.exe schtasks.exe PID 656 wrote to memory of 2092 656 PO_No.202201EYL-01_ABW.exe PO_No.202201EYL-01_ABW.exe PID 656 wrote to memory of 2092 656 PO_No.202201EYL-01_ABW.exe PO_No.202201EYL-01_ABW.exe PID 656 wrote to memory of 2092 656 PO_No.202201EYL-01_ABW.exe PO_No.202201EYL-01_ABW.exe PID 656 wrote to memory of 2092 656 PO_No.202201EYL-01_ABW.exe PO_No.202201EYL-01_ABW.exe PID 656 wrote to memory of 2092 656 PO_No.202201EYL-01_ABW.exe PO_No.202201EYL-01_ABW.exe PID 656 wrote to memory of 2092 656 PO_No.202201EYL-01_ABW.exe PO_No.202201EYL-01_ABW.exe PID 3020 wrote to memory of 1816 3020 Explorer.EXE msdt.exe PID 3020 wrote to memory of 1816 3020 Explorer.EXE msdt.exe PID 3020 wrote to memory of 1816 3020 Explorer.EXE msdt.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\PO_No.202201EYL-01_ABW.exe"C:\Users\Admin\AppData\Local\Temp\PO_No.202201EYL-01_ABW.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\PO_No.202201EYL-01_ABW.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\BcQECCNDawY.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\BcQECCNDawY" /XML "C:\Users\Admin\AppData\Local\Temp\tmp392D.tmp"3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\PO_No.202201EYL-01_ABW.exe"C:\Users\Admin\AppData\Local\Temp\PO_No.202201EYL-01_ABW.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
1c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
42b05edb7a4620e187aa5dc4fd0c7610
SHA13a58e789855e9e57be76d287e05c3cfe7c5f43eb
SHA2561d605427f145bcaceedf5a0a77f9c7a211037012ec9a6a4fb660e766e90e5656
SHA512a515e4dfd5e94ed712b69f710c4b8b31ea4dfbc7018eeb90481b7217b826e77fde8a7290c0ec1cdc413fb74a408feb720eb426ef32a47a6096a3017dbd682b54
-
C:\Users\Admin\AppData\Local\Temp\tmp392D.tmpMD5
d6f352331bf88a278113d6277ccb544a
SHA1fb084cf5bf38c00664de6737d82f877a3dede5e1
SHA25637f23e3a7f6a6b8c7ab7e55acd12d31a542d55cf33c623fc6145e5c254d6814b
SHA5123e92e730c0ac665f398cc5ca6d7791b5a50f0fc45d5b05e4aa06c5a20ae7e7c4379d285a5ed3f3bd8f4004578c04b7f2d5817ef5ff617612f792778abf018223
-
memory/656-125-0x00000000071F0000-0x00000000071F1000-memory.dmpFilesize
4KB
-
memory/656-118-0x00000000003F0000-0x00000000003F1000-memory.dmpFilesize
4KB
-
memory/656-124-0x0000000004FE0000-0x0000000004FE7000-memory.dmpFilesize
28KB
-
memory/656-120-0x00000000052A0000-0x00000000052A1000-memory.dmpFilesize
4KB
-
memory/656-126-0x00000000072E0000-0x000000000732E000-memory.dmpFilesize
312KB
-
memory/656-127-0x0000000007330000-0x000000000735C000-memory.dmpFilesize
176KB
-
memory/656-122-0x0000000004D20000-0x0000000004D21000-memory.dmpFilesize
4KB
-
memory/656-121-0x0000000004DA0000-0x0000000004DA1000-memory.dmpFilesize
4KB
-
memory/656-123-0x0000000004DA0000-0x000000000529E000-memory.dmpFilesize
5.0MB
-
memory/1816-562-0x0000000004400000-0x0000000004490000-memory.dmpFilesize
576KB
-
memory/1816-242-0x0000000004590000-0x00000000048B0000-memory.dmpFilesize
3.1MB
-
memory/1816-240-0x0000000000580000-0x00000000005A9000-memory.dmpFilesize
164KB
-
memory/1816-237-0x0000000000810000-0x0000000000983000-memory.dmpFilesize
1.4MB
-
memory/1816-206-0x0000000000000000-mapping.dmp
-
memory/1964-130-0x0000000000000000-mapping.dmp
-
memory/2092-145-0x000000000041D4B0-mapping.dmp
-
memory/2092-162-0x00000000011E0000-0x00000000011F1000-memory.dmpFilesize
68KB
-
memory/2092-154-0x0000000001280000-0x00000000015A0000-memory.dmpFilesize
3.1MB
-
memory/2092-144-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3020-586-0x0000000006BD0000-0x0000000006D19000-memory.dmpFilesize
1.3MB
-
memory/3020-163-0x0000000006940000-0x0000000006A97000-memory.dmpFilesize
1.3MB
-
memory/3148-129-0x0000000000000000-mapping.dmp
-
memory/3148-234-0x0000000004743000-0x0000000004744000-memory.dmpFilesize
4KB
-
memory/3148-135-0x0000000004480000-0x0000000004481000-memory.dmpFilesize
4KB
-
memory/3148-136-0x0000000004480000-0x0000000004481000-memory.dmpFilesize
4KB
-
memory/3148-146-0x0000000006F60000-0x0000000006F61000-memory.dmpFilesize
4KB
-
memory/3148-143-0x0000000004742000-0x0000000004743000-memory.dmpFilesize
4KB
-
memory/3148-205-0x000000007E6E0000-0x000000007E6E1000-memory.dmpFilesize
4KB
-
memory/3148-179-0x0000000008EA0000-0x0000000008ED3000-memory.dmpFilesize
204KB
-
memory/3148-166-0x0000000004480000-0x0000000004481000-memory.dmpFilesize
4KB
-
memory/3148-142-0x0000000004740000-0x0000000004741000-memory.dmpFilesize
4KB
-
memory/3672-231-0x0000000006663000-0x0000000006664000-memory.dmpFilesize
4KB
-
memory/3672-192-0x0000000008A40000-0x0000000008A41000-memory.dmpFilesize
4KB
-
memory/3672-141-0x0000000006662000-0x0000000006663000-memory.dmpFilesize
4KB
-
memory/3672-158-0x00000000079C0000-0x00000000079C1000-memory.dmpFilesize
4KB
-
memory/3672-152-0x00000000074B0000-0x00000000074B1000-memory.dmpFilesize
4KB
-
memory/3672-204-0x000000007E420000-0x000000007E421000-memory.dmpFilesize
4KB
-
memory/3672-156-0x0000000007390000-0x0000000007391000-memory.dmpFilesize
4KB
-
memory/3672-150-0x0000000006C20000-0x0000000006C21000-memory.dmpFilesize
4KB
-
memory/3672-160-0x0000000007CA0000-0x0000000007CA1000-memory.dmpFilesize
4KB
-
memory/3672-164-0x0000000004080000-0x0000000004081000-memory.dmpFilesize
4KB
-
memory/3672-140-0x0000000006660000-0x0000000006661000-memory.dmpFilesize
4KB
-
memory/3672-148-0x0000000006BB0000-0x0000000006BB1000-memory.dmpFilesize
4KB
-
memory/3672-134-0x0000000006CA0000-0x0000000006CA1000-memory.dmpFilesize
4KB
-
memory/3672-133-0x0000000006500000-0x0000000006501000-memory.dmpFilesize
4KB
-
memory/3672-132-0x0000000004080000-0x0000000004081000-memory.dmpFilesize
4KB
-
memory/3672-131-0x0000000004080000-0x0000000004081000-memory.dmpFilesize
4KB
-
memory/3672-128-0x0000000000000000-mapping.dmp