Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
10-01-2022 15:48
Static task
static1
Behavioral task
behavioral1
Sample
97ccf6ebd6abe7786677f0e6e6b8aef0.exe
Resource
win7-en-20211208
General
-
Target
97ccf6ebd6abe7786677f0e6e6b8aef0.exe
-
Size
882KB
-
MD5
97ccf6ebd6abe7786677f0e6e6b8aef0
-
SHA1
be06f330c04450b80848d8c5ed680dd8fce61c21
-
SHA256
44ed69358c6ef98ffc0e4da5aee0692f74fd03b8a7ea7c5c3b08f427f32a45e5
-
SHA512
0f4d549a3798ba0e9e10bc2e7f680290f5fc5b11c39e3f784cf04c1c0969739d906bd556f5c7f722c4a6d4d2d1ed2ab3246d2e668f03149fa1a033eeff17e761
Malware Config
Extracted
xloader
2.5
nt3f
tricyclee.com
kxsw999.com
wisteria-pavilion.com
bellaclancy.com
promissioskincare.com
hzy001.xyz
checkouthomehd.com
soladere.com
point4sales.com
socalmafia.com
libertadysarmiento.online
nftthirty.com
digitalgoldcryptostock.net
tulekiloscaird.com
austinfishandchicken.com
wlxxch.com
mgav51.xyz
landbanking.global
saprove.com
babyfaces.skin
elainemaxwellcoaching.com
1388xc.com
juveniscloud.com
bsauksjon.com
the-waterkooler.com
comment-changer-sa-vie.com
psmcnd.top
rhodesleadingedge.com
mccuelawfirm.com
skinnscience.club
hype-clicks.com
liaojinc.xyz
okmakers.com
ramblertour.online
wickedhunterworld.com
fit-threads.com
cookidoo.website
magentabin.com
pynch1.com
best-paper-to-know-today.info
allmight.net
monicraftsprintables.com
avataroasis.com
10dian-4.com
cozastore.net
capitalcased.com
spacezanome.xyz
feiyangmi.com
11opus.com
getinteriorsolution.com
tidyhutstore.com
amazingpomskyfamily.com
tfcvintage.com
halfanape.com
rotakb.com
martinasfood.com
the-thanks.com
mithilmehta.com
em-photo.art
primerepro.com
lankasirinspa.com
gtbaibang.com
zealandiatobacco.com
deepikatransportpackers.com
eagle-meter.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3124-132-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3124-133-0x000000000041D460-mapping.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
97ccf6ebd6abe7786677f0e6e6b8aef0.exedescription pid process target process PID 2760 set thread context of 3124 2760 97ccf6ebd6abe7786677f0e6e6b8aef0.exe 97ccf6ebd6abe7786677f0e6e6b8aef0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
97ccf6ebd6abe7786677f0e6e6b8aef0.exepowershell.exepid process 3124 97ccf6ebd6abe7786677f0e6e6b8aef0.exe 3124 97ccf6ebd6abe7786677f0e6e6b8aef0.exe 1632 powershell.exe 1632 powershell.exe 1632 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 1632 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
97ccf6ebd6abe7786677f0e6e6b8aef0.exedescription pid process target process PID 2760 wrote to memory of 1632 2760 97ccf6ebd6abe7786677f0e6e6b8aef0.exe powershell.exe PID 2760 wrote to memory of 1632 2760 97ccf6ebd6abe7786677f0e6e6b8aef0.exe powershell.exe PID 2760 wrote to memory of 1632 2760 97ccf6ebd6abe7786677f0e6e6b8aef0.exe powershell.exe PID 2760 wrote to memory of 2840 2760 97ccf6ebd6abe7786677f0e6e6b8aef0.exe schtasks.exe PID 2760 wrote to memory of 2840 2760 97ccf6ebd6abe7786677f0e6e6b8aef0.exe schtasks.exe PID 2760 wrote to memory of 2840 2760 97ccf6ebd6abe7786677f0e6e6b8aef0.exe schtasks.exe PID 2760 wrote to memory of 3124 2760 97ccf6ebd6abe7786677f0e6e6b8aef0.exe 97ccf6ebd6abe7786677f0e6e6b8aef0.exe PID 2760 wrote to memory of 3124 2760 97ccf6ebd6abe7786677f0e6e6b8aef0.exe 97ccf6ebd6abe7786677f0e6e6b8aef0.exe PID 2760 wrote to memory of 3124 2760 97ccf6ebd6abe7786677f0e6e6b8aef0.exe 97ccf6ebd6abe7786677f0e6e6b8aef0.exe PID 2760 wrote to memory of 3124 2760 97ccf6ebd6abe7786677f0e6e6b8aef0.exe 97ccf6ebd6abe7786677f0e6e6b8aef0.exe PID 2760 wrote to memory of 3124 2760 97ccf6ebd6abe7786677f0e6e6b8aef0.exe 97ccf6ebd6abe7786677f0e6e6b8aef0.exe PID 2760 wrote to memory of 3124 2760 97ccf6ebd6abe7786677f0e6e6b8aef0.exe 97ccf6ebd6abe7786677f0e6e6b8aef0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\97ccf6ebd6abe7786677f0e6e6b8aef0.exe"C:\Users\Admin\AppData\Local\Temp\97ccf6ebd6abe7786677f0e6e6b8aef0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\wLPRsknlyKFXuL.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wLPRsknlyKFXuL" /XML "C:\Users\Admin\AppData\Local\Temp\tmpEA5C.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\97ccf6ebd6abe7786677f0e6e6b8aef0.exe"C:\Users\Admin\AppData\Local\Temp\97ccf6ebd6abe7786677f0e6e6b8aef0.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpEA5C.tmpMD5
01f28a89a3d659e55bca8afddff29dcc
SHA1e465f7b6eae10a562d885701ee8b629c8acf28f7
SHA256ddd0b0870a3017805e40a541445f6239b367552d97da7da90e04bb4a7519936f
SHA512642b89b395be3e50cca4608eb41b4a36000ffe07053908eae50fd7691de4207208a853fe82ad62192c856bcef46ed8c3289c4e7ee1438e9ccd270dcfe3201bec
-
memory/1632-158-0x0000000007CD0000-0x0000000007D36000-memory.dmpFilesize
408KB
-
memory/1632-168-0x0000000009A60000-0x0000000009AF4000-memory.dmpFilesize
592KB
-
memory/1632-373-0x00000000099F0000-0x00000000099F8000-memory.dmpFilesize
32KB
-
memory/1632-138-0x0000000007CD0000-0x0000000007D36000-memory.dmpFilesize
408KB
-
memory/1632-367-0x0000000009A00000-0x0000000009A1A000-memory.dmpFilesize
104KB
-
memory/1632-362-0x0000000009A00000-0x0000000009A1A000-memory.dmpFilesize
104KB
-
memory/1632-171-0x0000000004A53000-0x0000000004A54000-memory.dmpFilesize
4KB
-
memory/1632-139-0x0000000007D40000-0x0000000007DA6000-memory.dmpFilesize
408KB
-
memory/1632-167-0x0000000009880000-0x0000000009925000-memory.dmpFilesize
660KB
-
memory/1632-162-0x0000000009720000-0x000000000973E000-memory.dmpFilesize
120KB
-
memory/1632-126-0x0000000000000000-mapping.dmp
-
memory/1632-161-0x00000000086F0000-0x0000000008766000-memory.dmpFilesize
472KB
-
memory/1632-128-0x00000000049C0000-0x00000000049C1000-memory.dmpFilesize
4KB
-
memory/1632-129-0x00000000049C0000-0x00000000049C1000-memory.dmpFilesize
4KB
-
memory/1632-160-0x00000000083A0000-0x00000000083EB000-memory.dmpFilesize
300KB
-
memory/1632-131-0x0000000006F00000-0x0000000006F36000-memory.dmpFilesize
216KB
-
memory/1632-159-0x0000000007D40000-0x0000000007DA6000-memory.dmpFilesize
408KB
-
memory/1632-157-0x000000007E7E0000-0x000000007E7E1000-memory.dmpFilesize
4KB
-
memory/1632-134-0x0000000007570000-0x0000000007B98000-memory.dmpFilesize
6.2MB
-
memory/1632-135-0x0000000004A50000-0x0000000004A51000-memory.dmpFilesize
4KB
-
memory/1632-136-0x0000000004A52000-0x0000000004A53000-memory.dmpFilesize
4KB
-
memory/1632-137-0x00000000074F0000-0x0000000007512000-memory.dmpFilesize
136KB
-
memory/1632-368-0x00000000099F0000-0x00000000099F8000-memory.dmpFilesize
32KB
-
memory/1632-154-0x0000000009740000-0x0000000009773000-memory.dmpFilesize
204KB
-
memory/1632-143-0x00000000083A0000-0x00000000083EB000-memory.dmpFilesize
300KB
-
memory/1632-156-0x00000000074F0000-0x0000000007512000-memory.dmpFilesize
136KB
-
memory/1632-142-0x0000000007E10000-0x0000000007E2C000-memory.dmpFilesize
112KB
-
memory/1632-140-0x0000000007F90000-0x00000000082E0000-memory.dmpFilesize
3.3MB
-
memory/1632-144-0x00000000086F0000-0x0000000008766000-memory.dmpFilesize
472KB
-
memory/1632-145-0x00000000049C0000-0x00000000049C1000-memory.dmpFilesize
4KB
-
memory/1632-153-0x0000000007570000-0x0000000007B98000-memory.dmpFilesize
6.2MB
-
memory/1632-155-0x0000000009740000-0x0000000009773000-memory.dmpFilesize
204KB
-
memory/2760-116-0x00000000008B0000-0x0000000000994000-memory.dmpFilesize
912KB
-
memory/2760-122-0x0000000008D70000-0x0000000008D7E000-memory.dmpFilesize
56KB
-
memory/2760-118-0x0000000005380000-0x0000000005412000-memory.dmpFilesize
584KB
-
memory/2760-125-0x0000000009190000-0x00000000091EE000-memory.dmpFilesize
376KB
-
memory/2760-119-0x0000000005580000-0x00000000058D0000-memory.dmpFilesize
3.3MB
-
memory/2760-120-0x0000000002E10000-0x0000000002E1A000-memory.dmpFilesize
40KB
-
memory/2760-117-0x0000000005A80000-0x0000000005F7E000-memory.dmpFilesize
5.0MB
-
memory/2760-124-0x00000000090F0000-0x000000000918C000-memory.dmpFilesize
624KB
-
memory/2760-121-0x0000000002D40000-0x0000000002D41000-memory.dmpFilesize
4KB
-
memory/2760-123-0x0000000008D80000-0x0000000008DCB000-memory.dmpFilesize
300KB
-
memory/2760-115-0x00000000008B0000-0x0000000000994000-memory.dmpFilesize
912KB
-
memory/2840-127-0x0000000000000000-mapping.dmp
-
memory/3124-141-0x00000000015A0000-0x00000000018C0000-memory.dmpFilesize
3.1MB
-
memory/3124-132-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3124-133-0x000000000041D460-mapping.dmp