Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
10-01-2022 15:48
Static task
static1
Behavioral task
behavioral1
Sample
97ccf6ebd6abe7786677f0e6e6b8aef0.exe
Resource
win7-en-20211208
General
-
Target
97ccf6ebd6abe7786677f0e6e6b8aef0.exe
-
Size
882KB
-
MD5
97ccf6ebd6abe7786677f0e6e6b8aef0
-
SHA1
be06f330c04450b80848d8c5ed680dd8fce61c21
-
SHA256
44ed69358c6ef98ffc0e4da5aee0692f74fd03b8a7ea7c5c3b08f427f32a45e5
-
SHA512
0f4d549a3798ba0e9e10bc2e7f680290f5fc5b11c39e3f784cf04c1c0969739d906bd556f5c7f722c4a6d4d2d1ed2ab3246d2e668f03149fa1a033eeff17e761
Malware Config
Extracted
xloader
2.5
nt3f
tricyclee.com
kxsw999.com
wisteria-pavilion.com
bellaclancy.com
promissioskincare.com
hzy001.xyz
checkouthomehd.com
soladere.com
point4sales.com
socalmafia.com
libertadysarmiento.online
nftthirty.com
digitalgoldcryptostock.net
tulekiloscaird.com
austinfishandchicken.com
wlxxch.com
mgav51.xyz
landbanking.global
saprove.com
babyfaces.skin
elainemaxwellcoaching.com
1388xc.com
juveniscloud.com
bsauksjon.com
the-waterkooler.com
comment-changer-sa-vie.com
psmcnd.top
rhodesleadingedge.com
mccuelawfirm.com
skinnscience.club
hype-clicks.com
liaojinc.xyz
okmakers.com
ramblertour.online
wickedhunterworld.com
fit-threads.com
cookidoo.website
magentabin.com
pynch1.com
best-paper-to-know-today.info
allmight.net
monicraftsprintables.com
avataroasis.com
10dian-4.com
cozastore.net
capitalcased.com
spacezanome.xyz
feiyangmi.com
11opus.com
getinteriorsolution.com
tidyhutstore.com
amazingpomskyfamily.com
tfcvintage.com
halfanape.com
rotakb.com
martinasfood.com
the-thanks.com
mithilmehta.com
em-photo.art
primerepro.com
lankasirinspa.com
gtbaibang.com
zealandiatobacco.com
deepikatransportpackers.com
eagle-meter.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1852-65-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1852-66-0x000000000041D460-mapping.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
97ccf6ebd6abe7786677f0e6e6b8aef0.exedescription pid process target process PID 1688 set thread context of 1852 1688 97ccf6ebd6abe7786677f0e6e6b8aef0.exe 97ccf6ebd6abe7786677f0e6e6b8aef0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
97ccf6ebd6abe7786677f0e6e6b8aef0.exepowershell.exepid process 1852 97ccf6ebd6abe7786677f0e6e6b8aef0.exe 1528 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1528 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
97ccf6ebd6abe7786677f0e6e6b8aef0.exedescription pid process target process PID 1688 wrote to memory of 1528 1688 97ccf6ebd6abe7786677f0e6e6b8aef0.exe powershell.exe PID 1688 wrote to memory of 1528 1688 97ccf6ebd6abe7786677f0e6e6b8aef0.exe powershell.exe PID 1688 wrote to memory of 1528 1688 97ccf6ebd6abe7786677f0e6e6b8aef0.exe powershell.exe PID 1688 wrote to memory of 1528 1688 97ccf6ebd6abe7786677f0e6e6b8aef0.exe powershell.exe PID 1688 wrote to memory of 852 1688 97ccf6ebd6abe7786677f0e6e6b8aef0.exe schtasks.exe PID 1688 wrote to memory of 852 1688 97ccf6ebd6abe7786677f0e6e6b8aef0.exe schtasks.exe PID 1688 wrote to memory of 852 1688 97ccf6ebd6abe7786677f0e6e6b8aef0.exe schtasks.exe PID 1688 wrote to memory of 852 1688 97ccf6ebd6abe7786677f0e6e6b8aef0.exe schtasks.exe PID 1688 wrote to memory of 1852 1688 97ccf6ebd6abe7786677f0e6e6b8aef0.exe 97ccf6ebd6abe7786677f0e6e6b8aef0.exe PID 1688 wrote to memory of 1852 1688 97ccf6ebd6abe7786677f0e6e6b8aef0.exe 97ccf6ebd6abe7786677f0e6e6b8aef0.exe PID 1688 wrote to memory of 1852 1688 97ccf6ebd6abe7786677f0e6e6b8aef0.exe 97ccf6ebd6abe7786677f0e6e6b8aef0.exe PID 1688 wrote to memory of 1852 1688 97ccf6ebd6abe7786677f0e6e6b8aef0.exe 97ccf6ebd6abe7786677f0e6e6b8aef0.exe PID 1688 wrote to memory of 1852 1688 97ccf6ebd6abe7786677f0e6e6b8aef0.exe 97ccf6ebd6abe7786677f0e6e6b8aef0.exe PID 1688 wrote to memory of 1852 1688 97ccf6ebd6abe7786677f0e6e6b8aef0.exe 97ccf6ebd6abe7786677f0e6e6b8aef0.exe PID 1688 wrote to memory of 1852 1688 97ccf6ebd6abe7786677f0e6e6b8aef0.exe 97ccf6ebd6abe7786677f0e6e6b8aef0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\97ccf6ebd6abe7786677f0e6e6b8aef0.exe"C:\Users\Admin\AppData\Local\Temp\97ccf6ebd6abe7786677f0e6e6b8aef0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\wLPRsknlyKFXuL.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wLPRsknlyKFXuL" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9147.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\97ccf6ebd6abe7786677f0e6e6b8aef0.exe"C:\Users\Admin\AppData\Local\Temp\97ccf6ebd6abe7786677f0e6e6b8aef0.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp9147.tmpMD5
0d87e4baec25a048c6b40293736cd63d
SHA1578d487657ad2fc3925d0ea89c027a8093aca712
SHA256e18b150d09817366a8ca43716bb15490b7085a5e6a089eab55d4e1d06289ad3a
SHA5126f1d2b531a2ff7bab5848ba56d98b72d5f082e5ec764c1bfda60e73faf7bc6a2794e23b950928bfca78236150ad2a0c65432839fc0f3a2a1e9e63638e638eac1
-
memory/852-60-0x0000000000000000-mapping.dmp
-
memory/1528-59-0x0000000000000000-mapping.dmp
-
memory/1528-68-0x00000000024C0000-0x000000000310A000-memory.dmpFilesize
12.3MB
-
memory/1528-61-0x0000000076151000-0x0000000076153000-memory.dmpFilesize
8KB
-
memory/1688-57-0x0000000000360000-0x000000000036E000-memory.dmpFilesize
56KB
-
memory/1688-58-0x0000000005270000-0x00000000052CE000-memory.dmpFilesize
376KB
-
memory/1688-54-0x0000000000CC0000-0x0000000000DA4000-memory.dmpFilesize
912KB
-
memory/1688-56-0x0000000004F50000-0x0000000004F51000-memory.dmpFilesize
4KB
-
memory/1688-55-0x0000000000CC0000-0x0000000000DA4000-memory.dmpFilesize
912KB
-
memory/1852-63-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1852-64-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1852-65-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1852-66-0x000000000041D460-mapping.dmp
-
memory/1852-67-0x00000000008A0000-0x0000000000BA3000-memory.dmpFilesize
3.0MB