Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
16-12-2021 08:39
Static task
static1
Behavioral task
behavioral1
Sample
790d2773e6a7ab6c925661e008dc57d5.exe
Resource
win7-en-20211208
General
-
Target
790d2773e6a7ab6c925661e008dc57d5.exe
-
Size
556KB
-
MD5
790d2773e6a7ab6c925661e008dc57d5
-
SHA1
96056d53acef34d5f75d93c86fe38a4027923443
-
SHA256
528a540044eb5dfab9ecbd301a63c69c930eea01e090eddd57a38e2cccb325ac
-
SHA512
4ca8fbbd20674a7cd8d6a8cd54ddbff8510c5802030f1c9086f8bd939523e8b6a0bdc148711184c28c60771de059e51bef22a6167963577f0d060e397580e46b
Malware Config
Extracted
xloader
2.5
ea0r
lionheartcreativestudios.com
konzertmanagement.com
blackpanther.online
broychim-int.com
takut18.com
txstarsolar.com
herdsherpa.com
igorshestakov.com
shinesbox.com
reflectpkljlt.xyz
oiltoolshub.com
viralmoneychallenge.com
changingalphastrategies.com
mecitiris.com
rdadmin.online
miniambiente.com
kominarcine.com
pino-almond.com
heihit.xyz
junqi888.com
metalumber.com
sclvfu.com
macanostore.online
projecturs.com
ahcprp.com
gztyfnrj.com
lospacenos.com
tak-etranger.com
dingermail.com
skiin.club
ystops.com
tnboxes.com
ccafgz.com
info1337.xyz
platinum24.top
hothess.com
novelfinancewhite.xyz
theselectdifference.com
flufca.com
giftcodefreefirevns.com
kgv-lachswehr.com
report-alfarabilabs.com
skeetones.com
4bcinc.com
americamr.com
wewonacademy.com
evrazavto.store
true-fanbox.com
greencofiji.com
threecommaspartners.com
hgtradingcoltd.com
xihe1919.com
241mk.com
helplockedout.com
wefundprojects.com
neosecure.store
purenewsworldwide.com
luckylottovip999.com
lottidobler.com
proyectohaciendohistoria.com
raintm.com
theproducerformula.com
trademarkitforyourself.com
ottaweed.com
asiapubz-hk.com
Signatures
-
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
790d2773e6a7ab6c925661e008dc57d5.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 790d2773e6a7ab6c925661e008dc57d5.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/564-62-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/564-63-0x000000000041D410-mapping.dmp xloader -
Executes dropped EXE 2 IoCs
Processes:
790d2773e6a7ab6c925661e008dc57d5.exe790d2773e6a7ab6c925661e008dc57d5.exepid process 1876 790d2773e6a7ab6c925661e008dc57d5.exe 564 790d2773e6a7ab6c925661e008dc57d5.exe -
Loads dropped DLL 4 IoCs
Processes:
790d2773e6a7ab6c925661e008dc57d5.exe790d2773e6a7ab6c925661e008dc57d5.exepid process 1700 790d2773e6a7ab6c925661e008dc57d5.exe 1876 790d2773e6a7ab6c925661e008dc57d5.exe 1876 790d2773e6a7ab6c925661e008dc57d5.exe 1700 790d2773e6a7ab6c925661e008dc57d5.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
790d2773e6a7ab6c925661e008dc57d5.exedescription pid process target process PID 1876 set thread context of 564 1876 790d2773e6a7ab6c925661e008dc57d5.exe 790d2773e6a7ab6c925661e008dc57d5.exe -
Drops file in Program Files directory 64 IoCs
Processes:
790d2773e6a7ab6c925661e008dc57d5.exedescription ioc process File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~3\PACKAG~1\{F4220~1\VC_RED~1.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe 790d2773e6a7ab6c925661e008dc57d5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE 790d2773e6a7ab6c925661e008dc57d5.exe -
Drops file in Windows directory 1 IoCs
Processes:
790d2773e6a7ab6c925661e008dc57d5.exedescription ioc process File opened for modification C:\Windows\svchost.com 790d2773e6a7ab6c925661e008dc57d5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 10 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\3582-490\790d2773e6a7ab6c925661e008dc57d5.exe nsis_installer_1 \Users\Admin\AppData\Local\Temp\3582-490\790d2773e6a7ab6c925661e008dc57d5.exe nsis_installer_2 C:\Users\Admin\AppData\Local\Temp\3582-490\790d2773e6a7ab6c925661e008dc57d5.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\3582-490\790d2773e6a7ab6c925661e008dc57d5.exe nsis_installer_2 C:\Users\Admin\AppData\Local\Temp\3582-490\790d2773e6a7ab6c925661e008dc57d5.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\3582-490\790d2773e6a7ab6c925661e008dc57d5.exe nsis_installer_2 \Users\Admin\AppData\Local\Temp\3582-490\790d2773e6a7ab6c925661e008dc57d5.exe nsis_installer_1 \Users\Admin\AppData\Local\Temp\3582-490\790d2773e6a7ab6c925661e008dc57d5.exe nsis_installer_2 C:\Users\Admin\AppData\Local\Temp\3582-490\790d2773e6a7ab6c925661e008dc57d5.exe nsis_installer_1 C:\Users\Admin\AppData\Local\Temp\3582-490\790d2773e6a7ab6c925661e008dc57d5.exe nsis_installer_2 -
Modifies registry class 1 IoCs
Processes:
790d2773e6a7ab6c925661e008dc57d5.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 790d2773e6a7ab6c925661e008dc57d5.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
790d2773e6a7ab6c925661e008dc57d5.exepid process 564 790d2773e6a7ab6c925661e008dc57d5.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
790d2773e6a7ab6c925661e008dc57d5.exe790d2773e6a7ab6c925661e008dc57d5.exedescription pid process target process PID 1700 wrote to memory of 1876 1700 790d2773e6a7ab6c925661e008dc57d5.exe 790d2773e6a7ab6c925661e008dc57d5.exe PID 1700 wrote to memory of 1876 1700 790d2773e6a7ab6c925661e008dc57d5.exe 790d2773e6a7ab6c925661e008dc57d5.exe PID 1700 wrote to memory of 1876 1700 790d2773e6a7ab6c925661e008dc57d5.exe 790d2773e6a7ab6c925661e008dc57d5.exe PID 1700 wrote to memory of 1876 1700 790d2773e6a7ab6c925661e008dc57d5.exe 790d2773e6a7ab6c925661e008dc57d5.exe PID 1876 wrote to memory of 564 1876 790d2773e6a7ab6c925661e008dc57d5.exe 790d2773e6a7ab6c925661e008dc57d5.exe PID 1876 wrote to memory of 564 1876 790d2773e6a7ab6c925661e008dc57d5.exe 790d2773e6a7ab6c925661e008dc57d5.exe PID 1876 wrote to memory of 564 1876 790d2773e6a7ab6c925661e008dc57d5.exe 790d2773e6a7ab6c925661e008dc57d5.exe PID 1876 wrote to memory of 564 1876 790d2773e6a7ab6c925661e008dc57d5.exe 790d2773e6a7ab6c925661e008dc57d5.exe PID 1876 wrote to memory of 564 1876 790d2773e6a7ab6c925661e008dc57d5.exe 790d2773e6a7ab6c925661e008dc57d5.exe PID 1876 wrote to memory of 564 1876 790d2773e6a7ab6c925661e008dc57d5.exe 790d2773e6a7ab6c925661e008dc57d5.exe PID 1876 wrote to memory of 564 1876 790d2773e6a7ab6c925661e008dc57d5.exe 790d2773e6a7ab6c925661e008dc57d5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\790d2773e6a7ab6c925661e008dc57d5.exe"C:\Users\Admin\AppData\Local\Temp\790d2773e6a7ab6c925661e008dc57d5.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\3582-490\790d2773e6a7ab6c925661e008dc57d5.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\790d2773e6a7ab6c925661e008dc57d5.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\3582-490\790d2773e6a7ab6c925661e008dc57d5.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\790d2773e6a7ab6c925661e008dc57d5.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:564
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
a8538dba14e963ac7894257f7466bc06
SHA1d5de28b9a2f41519f8ae6fc2be6f9ee75569e192
SHA2567bfabb3e53f70e2ad39155a8af8d7e27a07ec01b0ba8faed52cb569e4f78142f
SHA51204da55fb7dcd87538e284a929b79427bf72241fea7a291f3650853442f889cf21de0352f7a381bae316df852f3b0ea87e5eb9ce8e3e509a27ab34da0b78030ba
-
MD5
a8538dba14e963ac7894257f7466bc06
SHA1d5de28b9a2f41519f8ae6fc2be6f9ee75569e192
SHA2567bfabb3e53f70e2ad39155a8af8d7e27a07ec01b0ba8faed52cb569e4f78142f
SHA51204da55fb7dcd87538e284a929b79427bf72241fea7a291f3650853442f889cf21de0352f7a381bae316df852f3b0ea87e5eb9ce8e3e509a27ab34da0b78030ba
-
MD5
a8538dba14e963ac7894257f7466bc06
SHA1d5de28b9a2f41519f8ae6fc2be6f9ee75569e192
SHA2567bfabb3e53f70e2ad39155a8af8d7e27a07ec01b0ba8faed52cb569e4f78142f
SHA51204da55fb7dcd87538e284a929b79427bf72241fea7a291f3650853442f889cf21de0352f7a381bae316df852f3b0ea87e5eb9ce8e3e509a27ab34da0b78030ba
-
MD5
9e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
MD5
a8538dba14e963ac7894257f7466bc06
SHA1d5de28b9a2f41519f8ae6fc2be6f9ee75569e192
SHA2567bfabb3e53f70e2ad39155a8af8d7e27a07ec01b0ba8faed52cb569e4f78142f
SHA51204da55fb7dcd87538e284a929b79427bf72241fea7a291f3650853442f889cf21de0352f7a381bae316df852f3b0ea87e5eb9ce8e3e509a27ab34da0b78030ba
-
MD5
a8538dba14e963ac7894257f7466bc06
SHA1d5de28b9a2f41519f8ae6fc2be6f9ee75569e192
SHA2567bfabb3e53f70e2ad39155a8af8d7e27a07ec01b0ba8faed52cb569e4f78142f
SHA51204da55fb7dcd87538e284a929b79427bf72241fea7a291f3650853442f889cf21de0352f7a381bae316df852f3b0ea87e5eb9ce8e3e509a27ab34da0b78030ba
-
MD5
0dce769f700f91a640a0ac88b9f52cc0
SHA1593939ad9b4c96d84fb8649bd81a670e8036db19
SHA2568ea5809102a56af3cbe2dead5d07c4a740afac59ae44f908dd73dbd2314a6018
SHA512b1546a0ec312e6f4cf50b01c15fd37d911a39eea6e465be113c9e38f87af4f5cde649bdf8939496a7aaceec05988de1bc9249fce8ddc0fce3d1c2f94ead33a52