Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
06-12-2021 11:54
Static task
static1
Behavioral task
behavioral1
Sample
5d10c77689e0c3bea850fa3c9ef40e8c.exe
Resource
win7-en-20211104
General
-
Target
5d10c77689e0c3bea850fa3c9ef40e8c.exe
-
Size
516KB
-
MD5
5d10c77689e0c3bea850fa3c9ef40e8c
-
SHA1
35dca95d10a31fe0b1832f43005c0a79a6854604
-
SHA256
8a0fb297baf6f3affb73e0c20116dec0bbbae0292fcbffc3948051555df5099d
-
SHA512
920b5f4c55db41e225bb760a2d26b4aec8fed0d3d66392bbe8acf91cec35097e0934a2559661dd45eaa5b2303c102eedb4c88aef91e024c05b78d6cf289f795a
Malware Config
Extracted
xloader
2.5
ea0r
http://www.asiapubz-hk.com/ea0r/
lionheartcreativestudios.com
konzertmanagement.com
blackpanther.online
broychim-int.com
takut18.com
txstarsolar.com
herdsherpa.com
igorshestakov.com
shinesbox.com
reflectpkljlt.xyz
oiltoolshub.com
viralmoneychallenge.com
changingalphastrategies.com
mecitiris.com
rdadmin.online
miniambiente.com
kominarcine.com
pino-almond.com
heihit.xyz
junqi888.com
metalumber.com
sclvfu.com
macanostore.online
projecturs.com
ahcprp.com
gztyfnrj.com
lospacenos.com
tak-etranger.com
dingermail.com
skiin.club
ystops.com
tnboxes.com
ccafgz.com
info1337.xyz
platinum24.top
hothess.com
novelfinancewhite.xyz
theselectdifference.com
flufca.com
giftcodefreefirevns.com
kgv-lachswehr.com
report-alfarabilabs.com
skeetones.com
4bcinc.com
americamr.com
wewonacademy.com
evrazavto.store
true-fanbox.com
greencofiji.com
threecommaspartners.com
hgtradingcoltd.com
xihe1919.com
241mk.com
helplockedout.com
wefundprojects.com
neosecure.store
purenewsworldwide.com
luckylottovip999.com
lottidobler.com
proyectohaciendohistoria.com
raintm.com
theproducerformula.com
trademarkitforyourself.com
ottaweed.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3128-116-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3128-117-0x000000000041D410-mapping.dmp xloader -
Loads dropped DLL 1 IoCs
Processes:
5d10c77689e0c3bea850fa3c9ef40e8c.exepid process 2648 5d10c77689e0c3bea850fa3c9ef40e8c.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5d10c77689e0c3bea850fa3c9ef40e8c.exedescription pid process target process PID 2648 set thread context of 3128 2648 5d10c77689e0c3bea850fa3c9ef40e8c.exe 5d10c77689e0c3bea850fa3c9ef40e8c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
5d10c77689e0c3bea850fa3c9ef40e8c.exepid process 3128 5d10c77689e0c3bea850fa3c9ef40e8c.exe 3128 5d10c77689e0c3bea850fa3c9ef40e8c.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
5d10c77689e0c3bea850fa3c9ef40e8c.exedescription pid process target process PID 2648 wrote to memory of 3128 2648 5d10c77689e0c3bea850fa3c9ef40e8c.exe 5d10c77689e0c3bea850fa3c9ef40e8c.exe PID 2648 wrote to memory of 3128 2648 5d10c77689e0c3bea850fa3c9ef40e8c.exe 5d10c77689e0c3bea850fa3c9ef40e8c.exe PID 2648 wrote to memory of 3128 2648 5d10c77689e0c3bea850fa3c9ef40e8c.exe 5d10c77689e0c3bea850fa3c9ef40e8c.exe PID 2648 wrote to memory of 3128 2648 5d10c77689e0c3bea850fa3c9ef40e8c.exe 5d10c77689e0c3bea850fa3c9ef40e8c.exe PID 2648 wrote to memory of 3128 2648 5d10c77689e0c3bea850fa3c9ef40e8c.exe 5d10c77689e0c3bea850fa3c9ef40e8c.exe PID 2648 wrote to memory of 3128 2648 5d10c77689e0c3bea850fa3c9ef40e8c.exe 5d10c77689e0c3bea850fa3c9ef40e8c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d10c77689e0c3bea850fa3c9ef40e8c.exe"C:\Users\Admin\AppData\Local\Temp\5d10c77689e0c3bea850fa3c9ef40e8c.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\5d10c77689e0c3bea850fa3c9ef40e8c.exe"C:\Users\Admin\AppData\Local\Temp\5d10c77689e0c3bea850fa3c9ef40e8c.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nssBDF3.tmp\mpsjizjnb.dllMD5
0815108791c7713f3a2d231a0a1f47fc
SHA10ee9fb0ce287805b0219b37767ce778c5ed2f482
SHA25613a86e1868a200ce896a613f5fb0f61e548edbe7e31597e356c248f490ddaffd
SHA51276ba98646074ca7258f083891d2e94105062ba0233a7c0ed3c46cb027a71696fd21ec811d4aad973c48105eab47fda5ad08911e6b1aef79131ee65bf8ebc093e
-
memory/3128-116-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3128-117-0x000000000041D410-mapping.dmp
-
memory/3128-118-0x0000000000AF0000-0x0000000000E10000-memory.dmpFilesize
3.1MB