Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
19-11-2021 07:59
Static task
static1
Behavioral task
behavioral1
Sample
QUOTE REQUEST FOB_Medlited Trading Co.exe
Resource
win7-en-20211014
General
-
Target
QUOTE REQUEST FOB_Medlited Trading Co.exe
-
Size
611KB
-
MD5
8ddcaa0954d47bcb1e6b18de42fbfd6c
-
SHA1
8de0ab3b4e57d551f4783b6a1410d429c8b62c38
-
SHA256
c50fdcefdf51c648404eb54eebcb81012e2c736252e232759c7eef5fac1d5174
-
SHA512
31dc38d1d45893c6f00e28d2cf192e1451a5c4e84af701fe76c04b1175a7c528f7f95d1d3ec3edb30448b2465e127c66c64904e07da9a762663e9b29c8c4c80d
Malware Config
Extracted
xloader
2.5
46uq
http://www.liberia-infos.net/46uq/
beardeddentguy.com
envirobombs.com
mintbox.pro
xiangpusun.com
pyjama-france.com
mendocinocountylive.com
innovativepropsolutions.com
hpsaddlerock.com
qrmaindonesia.com
liphelp.com
archaeaenergy.info
18446744073709551615.com
littlecreekacresri.com
elderlycareacademy.com
drshivanieyecare.com
ashibumi.com
stevenalexandergolf.com
adoratv.net
visitnewrichmond.com
fxbvanpool.com
aarondecker.online
environmentalkivul.com
cardsncrepes.com
hopdongdientu-viettel.com
thebroughtguarantee.com
howtofindahotniche.com
1678600.win
pityana.com
akconsultoria.com
markazkreasindo.com
ronniecapitol.com
tailsontour.com
abros88.com
laboratoriodentaltj.com
fuckingmom86.xyz
5pz59.com
centralmadu.com
ispecwar.com
otetransportanddispatching.com
cartaovirtual.net
hsadmin.xyz
xn--12c2bed4dxay5cxdh1s.online
oki-net.com
scenekidfancams.com
preciousmugs.com
754711.com
helpigservices.com
blueharepress.com
xmshzs.com
lovelycharlestonhomes.com
wamhsh.com
burlesquercize.com
oppoexch.com
ditjai.tech
the-hausd-group.com
loosebland.website
syntheticloot.net
gzfusco.com
www-by.com
farraztravel.com
beheld3d.art
douyababy.space
elcuerpohumano.xyz
3soap.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1376-68-0x000000000041D4B0-mapping.dmp xloader behavioral1/memory/1376-67-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1320-78-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
QUOTE REQUEST FOB_Medlited Trading Co.exeQUOTE REQUEST FOB_Medlited Trading Co.exechkdsk.exedescription pid process target process PID 1820 set thread context of 1376 1820 QUOTE REQUEST FOB_Medlited Trading Co.exe QUOTE REQUEST FOB_Medlited Trading Co.exe PID 1376 set thread context of 1212 1376 QUOTE REQUEST FOB_Medlited Trading Co.exe Explorer.EXE PID 1320 set thread context of 1212 1320 chkdsk.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
chkdsk.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
QUOTE REQUEST FOB_Medlited Trading Co.exeQUOTE REQUEST FOB_Medlited Trading Co.exepowershell.exechkdsk.exepid process 1820 QUOTE REQUEST FOB_Medlited Trading Co.exe 1820 QUOTE REQUEST FOB_Medlited Trading Co.exe 1376 QUOTE REQUEST FOB_Medlited Trading Co.exe 1376 QUOTE REQUEST FOB_Medlited Trading Co.exe 980 powershell.exe 1320 chkdsk.exe 1320 chkdsk.exe 1320 chkdsk.exe 1320 chkdsk.exe 1320 chkdsk.exe 1320 chkdsk.exe 1320 chkdsk.exe 1320 chkdsk.exe 1320 chkdsk.exe 1320 chkdsk.exe 1320 chkdsk.exe 1320 chkdsk.exe 1320 chkdsk.exe 1320 chkdsk.exe 1320 chkdsk.exe 1320 chkdsk.exe 1320 chkdsk.exe 1320 chkdsk.exe 1320 chkdsk.exe 1320 chkdsk.exe 1320 chkdsk.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
QUOTE REQUEST FOB_Medlited Trading Co.exechkdsk.exepid process 1376 QUOTE REQUEST FOB_Medlited Trading Co.exe 1376 QUOTE REQUEST FOB_Medlited Trading Co.exe 1376 QUOTE REQUEST FOB_Medlited Trading Co.exe 1320 chkdsk.exe 1320 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
QUOTE REQUEST FOB_Medlited Trading Co.exeQUOTE REQUEST FOB_Medlited Trading Co.exepowershell.exechkdsk.exedescription pid process Token: SeDebugPrivilege 1820 QUOTE REQUEST FOB_Medlited Trading Co.exe Token: SeDebugPrivilege 1376 QUOTE REQUEST FOB_Medlited Trading Co.exe Token: SeDebugPrivilege 980 powershell.exe Token: SeDebugPrivilege 1320 chkdsk.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1212 Explorer.EXE 1212 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1212 Explorer.EXE 1212 Explorer.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
QUOTE REQUEST FOB_Medlited Trading Co.exeExplorer.EXEdescription pid process target process PID 1820 wrote to memory of 980 1820 QUOTE REQUEST FOB_Medlited Trading Co.exe powershell.exe PID 1820 wrote to memory of 980 1820 QUOTE REQUEST FOB_Medlited Trading Co.exe powershell.exe PID 1820 wrote to memory of 980 1820 QUOTE REQUEST FOB_Medlited Trading Co.exe powershell.exe PID 1820 wrote to memory of 980 1820 QUOTE REQUEST FOB_Medlited Trading Co.exe powershell.exe PID 1820 wrote to memory of 960 1820 QUOTE REQUEST FOB_Medlited Trading Co.exe schtasks.exe PID 1820 wrote to memory of 960 1820 QUOTE REQUEST FOB_Medlited Trading Co.exe schtasks.exe PID 1820 wrote to memory of 960 1820 QUOTE REQUEST FOB_Medlited Trading Co.exe schtasks.exe PID 1820 wrote to memory of 960 1820 QUOTE REQUEST FOB_Medlited Trading Co.exe schtasks.exe PID 1820 wrote to memory of 1376 1820 QUOTE REQUEST FOB_Medlited Trading Co.exe QUOTE REQUEST FOB_Medlited Trading Co.exe PID 1820 wrote to memory of 1376 1820 QUOTE REQUEST FOB_Medlited Trading Co.exe QUOTE REQUEST FOB_Medlited Trading Co.exe PID 1820 wrote to memory of 1376 1820 QUOTE REQUEST FOB_Medlited Trading Co.exe QUOTE REQUEST FOB_Medlited Trading Co.exe PID 1820 wrote to memory of 1376 1820 QUOTE REQUEST FOB_Medlited Trading Co.exe QUOTE REQUEST FOB_Medlited Trading Co.exe PID 1820 wrote to memory of 1376 1820 QUOTE REQUEST FOB_Medlited Trading Co.exe QUOTE REQUEST FOB_Medlited Trading Co.exe PID 1820 wrote to memory of 1376 1820 QUOTE REQUEST FOB_Medlited Trading Co.exe QUOTE REQUEST FOB_Medlited Trading Co.exe PID 1820 wrote to memory of 1376 1820 QUOTE REQUEST FOB_Medlited Trading Co.exe QUOTE REQUEST FOB_Medlited Trading Co.exe PID 1820 wrote to memory of 1376 1820 QUOTE REQUEST FOB_Medlited Trading Co.exe QUOTE REQUEST FOB_Medlited Trading Co.exe PID 1820 wrote to memory of 1376 1820 QUOTE REQUEST FOB_Medlited Trading Co.exe QUOTE REQUEST FOB_Medlited Trading Co.exe PID 1820 wrote to memory of 1376 1820 QUOTE REQUEST FOB_Medlited Trading Co.exe QUOTE REQUEST FOB_Medlited Trading Co.exe PID 1212 wrote to memory of 1320 1212 Explorer.EXE chkdsk.exe PID 1212 wrote to memory of 1320 1212 Explorer.EXE chkdsk.exe PID 1212 wrote to memory of 1320 1212 Explorer.EXE chkdsk.exe PID 1212 wrote to memory of 1320 1212 Explorer.EXE chkdsk.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\QUOTE REQUEST FOB_Medlited Trading Co.exe"C:\Users\Admin\AppData\Local\Temp\QUOTE REQUEST FOB_Medlited Trading Co.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\dpzpuc.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\dpzpuc" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5D5C.tmp"3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\QUOTE REQUEST FOB_Medlited Trading Co.exe"C:\Users\Admin\AppData\Local\Temp\QUOTE REQUEST FOB_Medlited Trading Co.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp5D5C.tmpMD5
245cec850ea4264fed957d0d9d782c12
SHA1434f946d073fcf685445d124c1ece3dda5f5efb6
SHA2566dc29bf7ab16992087daed2fddc15ca64039fb3cb15918c459f6db804ce1a73f
SHA512cc6cb48749b403f0b6e49286bb3fd070ad25dd2b60488b54ddd520108fb4868a5da8e90b25e6816a060069cdd1af9f5d46d576c997ed9faa1ffb452a49e43746
-
memory/960-63-0x0000000000000000-mapping.dmp
-
memory/980-70-0x0000000002260000-0x0000000002EAA000-memory.dmpFilesize
12.3MB
-
memory/980-61-0x0000000000000000-mapping.dmp
-
memory/980-74-0x0000000002260000-0x0000000002EAA000-memory.dmpFilesize
12.3MB
-
memory/980-75-0x0000000002260000-0x0000000002EAA000-memory.dmpFilesize
12.3MB
-
memory/1212-73-0x0000000003CB0000-0x0000000003D5F000-memory.dmpFilesize
700KB
-
memory/1212-81-0x0000000006880000-0x0000000006976000-memory.dmpFilesize
984KB
-
memory/1320-80-0x0000000001F30000-0x0000000001FC0000-memory.dmpFilesize
576KB
-
memory/1320-79-0x0000000002070000-0x0000000002373000-memory.dmpFilesize
3.0MB
-
memory/1320-78-0x0000000000080000-0x00000000000A9000-memory.dmpFilesize
164KB
-
memory/1320-77-0x0000000000990000-0x0000000000997000-memory.dmpFilesize
28KB
-
memory/1320-76-0x0000000000000000-mapping.dmp
-
memory/1376-65-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1376-68-0x000000000041D4B0-mapping.dmp
-
memory/1376-67-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1376-72-0x0000000000290000-0x00000000002A1000-memory.dmpFilesize
68KB
-
memory/1376-66-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1376-71-0x0000000000950000-0x0000000000C53000-memory.dmpFilesize
3.0MB
-
memory/1820-60-0x0000000005240000-0x000000000529C000-memory.dmpFilesize
368KB
-
memory/1820-59-0x0000000000360000-0x0000000000366000-memory.dmpFilesize
24KB
-
memory/1820-57-0x00000000757E1000-0x00000000757E3000-memory.dmpFilesize
8KB
-
memory/1820-58-0x0000000004D50000-0x0000000004D51000-memory.dmpFilesize
4KB
-
memory/1820-55-0x0000000000E10000-0x0000000000E11000-memory.dmpFilesize
4KB