Analysis
-
max time kernel
116s -
max time network
140s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
17-12-2021 16:02
Static task
static1
General
-
Target
a1b040465bd651704642deeb02ab2aa060f2f64183b297062c011e10456279a9.exe
-
Size
456KB
-
MD5
840e01d333583e11b123c378fc7741e4
-
SHA1
8b9e42afa53aedfbe89964ce50ab2dd15f7cb725
-
SHA256
a1b040465bd651704642deeb02ab2aa060f2f64183b297062c011e10456279a9
-
SHA512
b39014a8ea82150672fe19a9d8082f85c156b925beba308207ae08d8bdd5d8ff1bdb52a04e93aa044ddf1bad7e70607c0095ced6b624c01d32ba6db67479166f
Malware Config
Extracted
xloader
2.5
fqiq
driventow.com
ipatchwork.today
bolder.equipment
seal-brother.com
mountlaketerraceapartments.com
weeden.xyz
sanlifalan.com
athafood.com
isshinn1.com
creationslazzaroni.com
eclecticrenaissancewoman.com
satellitephonstore.com
cotchildcare.com
yamacorp.digital
ff4cuno43.xyz
quicksticks.community
govindfinance.com
farmersfirstseed.com
megacinema.club
tablescaperendezvous4two.com
ecarehomes.com
floaterslaser.com
benisano.com
saint444.com
thedusi.com
avafxtrade.online
hanenosuke.com
suntioil4u.com
healthyweekendtips.com
24000words.com
ofbchina.net
begukiu0.info
wolmoda.com
mask60.com
4bellemaison.com
mambacustomboats.com
sedsn.com
doggycc.com
kangrungao.com
pharmacistcharisma.com
passiverewardssystems.com
qywyfeo8.xyz
shenjiclass.com
rdoi.top
lavishbynovell.com
fleetton.com
hillcresthomegroup.com
hartfulcleaning.com
srofkansas.com
applebroog.industries
phillytrainers.com
dmc--llc.com
sosoon.store
daysyou.com
controldatasa.com
markarge.com
hirayaawards.com
clinicscluster.com
sophiagunterman.art
kirtansangeet.com
residential.insure
ribbonofficial.com
qianhaijcc.com
fytvankin.quest
esyscoloradosprings.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2276-116-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2276-117-0x000000000041D4B0-mapping.dmp xloader -
Loads dropped DLL 1 IoCs
Processes:
a1b040465bd651704642deeb02ab2aa060f2f64183b297062c011e10456279a9.exepid process 2768 a1b040465bd651704642deeb02ab2aa060f2f64183b297062c011e10456279a9.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
a1b040465bd651704642deeb02ab2aa060f2f64183b297062c011e10456279a9.exedescription pid process target process PID 2768 set thread context of 2276 2768 a1b040465bd651704642deeb02ab2aa060f2f64183b297062c011e10456279a9.exe a1b040465bd651704642deeb02ab2aa060f2f64183b297062c011e10456279a9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a1b040465bd651704642deeb02ab2aa060f2f64183b297062c011e10456279a9.exepid process 2276 a1b040465bd651704642deeb02ab2aa060f2f64183b297062c011e10456279a9.exe 2276 a1b040465bd651704642deeb02ab2aa060f2f64183b297062c011e10456279a9.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
a1b040465bd651704642deeb02ab2aa060f2f64183b297062c011e10456279a9.exedescription pid process target process PID 2768 wrote to memory of 2276 2768 a1b040465bd651704642deeb02ab2aa060f2f64183b297062c011e10456279a9.exe a1b040465bd651704642deeb02ab2aa060f2f64183b297062c011e10456279a9.exe PID 2768 wrote to memory of 2276 2768 a1b040465bd651704642deeb02ab2aa060f2f64183b297062c011e10456279a9.exe a1b040465bd651704642deeb02ab2aa060f2f64183b297062c011e10456279a9.exe PID 2768 wrote to memory of 2276 2768 a1b040465bd651704642deeb02ab2aa060f2f64183b297062c011e10456279a9.exe a1b040465bd651704642deeb02ab2aa060f2f64183b297062c011e10456279a9.exe PID 2768 wrote to memory of 2276 2768 a1b040465bd651704642deeb02ab2aa060f2f64183b297062c011e10456279a9.exe a1b040465bd651704642deeb02ab2aa060f2f64183b297062c011e10456279a9.exe PID 2768 wrote to memory of 2276 2768 a1b040465bd651704642deeb02ab2aa060f2f64183b297062c011e10456279a9.exe a1b040465bd651704642deeb02ab2aa060f2f64183b297062c011e10456279a9.exe PID 2768 wrote to memory of 2276 2768 a1b040465bd651704642deeb02ab2aa060f2f64183b297062c011e10456279a9.exe a1b040465bd651704642deeb02ab2aa060f2f64183b297062c011e10456279a9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1b040465bd651704642deeb02ab2aa060f2f64183b297062c011e10456279a9.exe"C:\Users\Admin\AppData\Local\Temp\a1b040465bd651704642deeb02ab2aa060f2f64183b297062c011e10456279a9.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a1b040465bd651704642deeb02ab2aa060f2f64183b297062c011e10456279a9.exe"C:\Users\Admin\AppData\Local\Temp\a1b040465bd651704642deeb02ab2aa060f2f64183b297062c011e10456279a9.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nsvD1AA.tmp\hzjmhbnx.dllMD5
bfbb483d15bf9f4317a7a90705420d37
SHA1882a372e8a6e3b1919575d4a6c0b272a70d1e25b
SHA256e28343ba0653927426e44d68768b74ea19c4a3862b9c488a2d7537ccfd4dfe93
SHA51278d4e07f8661b160fe22948ad3aa71a218e8db4a4e67bfc0f99e7c9096156019537af4a8626e8d26a40f35c23ce61be2fa66eaf92b11a78551cc21b5b509fe5c
-
memory/2276-116-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2276-117-0x000000000041D4B0-mapping.dmp
-
memory/2276-118-0x0000000000A90000-0x0000000000DB0000-memory.dmpFilesize
3.1MB