Analysis
-
max time kernel
110s -
max time network
125s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
12-01-2022 13:35
Static task
static1
General
-
Target
8ad6a7b3eabe8b13dac49c87671807b8185f42e9c3bd6ac94c33f4ab3435bd60.exe
-
Size
404KB
-
MD5
bab6e1a8f9654f390192b69e25418de5
-
SHA1
0740a5161c3a065a84b4caf0bc194f1736ba79df
-
SHA256
8ad6a7b3eabe8b13dac49c87671807b8185f42e9c3bd6ac94c33f4ab3435bd60
-
SHA512
1143cc6133e3e6731e15e71cbe87398c90cb2e80fcfff6fb3ee115b2f543b677c48e907fde940898b3ffd0ded89cd21239cbfdd5e72e2555a7f03be4e09b23a8
Malware Config
Extracted
xloader
2.5
nt3f
tricyclee.com
kxsw999.com
wisteria-pavilion.com
bellaclancy.com
promissioskincare.com
hzy001.xyz
checkouthomehd.com
soladere.com
point4sales.com
socalmafia.com
libertadysarmiento.online
nftthirty.com
digitalgoldcryptostock.net
tulekiloscaird.com
austinfishandchicken.com
wlxxch.com
mgav51.xyz
landbanking.global
saprove.com
babyfaces.skin
elainemaxwellcoaching.com
1388xc.com
juveniscloud.com
bsauksjon.com
the-waterkooler.com
comment-changer-sa-vie.com
psmcnd.top
rhodesleadingedge.com
mccuelawfirm.com
skinnscience.club
hype-clicks.com
liaojinc.xyz
okmakers.com
ramblertour.online
wickedhunterworld.com
fit-threads.com
cookidoo.website
magentabin.com
pynch1.com
best-paper-to-know-today.info
allmight.net
monicraftsprintables.com
avataroasis.com
10dian-4.com
cozastore.net
capitalcased.com
spacezanome.xyz
feiyangmi.com
11opus.com
getinteriorsolution.com
tidyhutstore.com
amazingpomskyfamily.com
tfcvintage.com
halfanape.com
rotakb.com
martinasfood.com
the-thanks.com
mithilmehta.com
em-photo.art
primerepro.com
lankasirinspa.com
gtbaibang.com
zealandiatobacco.com
deepikatransportpackers.com
eagle-meter.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/588-131-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/588-132-0x000000000041D460-mapping.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
8ad6a7b3eabe8b13dac49c87671807b8185f42e9c3bd6ac94c33f4ab3435bd60.exedescription pid process target process PID 3584 set thread context of 588 3584 8ad6a7b3eabe8b13dac49c87671807b8185f42e9c3bd6ac94c33f4ab3435bd60.exe 8ad6a7b3eabe8b13dac49c87671807b8185f42e9c3bd6ac94c33f4ab3435bd60.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
powershell.exe8ad6a7b3eabe8b13dac49c87671807b8185f42e9c3bd6ac94c33f4ab3435bd60.exepid process 392 powershell.exe 588 8ad6a7b3eabe8b13dac49c87671807b8185f42e9c3bd6ac94c33f4ab3435bd60.exe 588 8ad6a7b3eabe8b13dac49c87671807b8185f42e9c3bd6ac94c33f4ab3435bd60.exe 392 powershell.exe 392 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 392 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
8ad6a7b3eabe8b13dac49c87671807b8185f42e9c3bd6ac94c33f4ab3435bd60.exedescription pid process target process PID 3584 wrote to memory of 392 3584 8ad6a7b3eabe8b13dac49c87671807b8185f42e9c3bd6ac94c33f4ab3435bd60.exe powershell.exe PID 3584 wrote to memory of 392 3584 8ad6a7b3eabe8b13dac49c87671807b8185f42e9c3bd6ac94c33f4ab3435bd60.exe powershell.exe PID 3584 wrote to memory of 392 3584 8ad6a7b3eabe8b13dac49c87671807b8185f42e9c3bd6ac94c33f4ab3435bd60.exe powershell.exe PID 3584 wrote to memory of 3352 3584 8ad6a7b3eabe8b13dac49c87671807b8185f42e9c3bd6ac94c33f4ab3435bd60.exe schtasks.exe PID 3584 wrote to memory of 3352 3584 8ad6a7b3eabe8b13dac49c87671807b8185f42e9c3bd6ac94c33f4ab3435bd60.exe schtasks.exe PID 3584 wrote to memory of 3352 3584 8ad6a7b3eabe8b13dac49c87671807b8185f42e9c3bd6ac94c33f4ab3435bd60.exe schtasks.exe PID 3584 wrote to memory of 588 3584 8ad6a7b3eabe8b13dac49c87671807b8185f42e9c3bd6ac94c33f4ab3435bd60.exe 8ad6a7b3eabe8b13dac49c87671807b8185f42e9c3bd6ac94c33f4ab3435bd60.exe PID 3584 wrote to memory of 588 3584 8ad6a7b3eabe8b13dac49c87671807b8185f42e9c3bd6ac94c33f4ab3435bd60.exe 8ad6a7b3eabe8b13dac49c87671807b8185f42e9c3bd6ac94c33f4ab3435bd60.exe PID 3584 wrote to memory of 588 3584 8ad6a7b3eabe8b13dac49c87671807b8185f42e9c3bd6ac94c33f4ab3435bd60.exe 8ad6a7b3eabe8b13dac49c87671807b8185f42e9c3bd6ac94c33f4ab3435bd60.exe PID 3584 wrote to memory of 588 3584 8ad6a7b3eabe8b13dac49c87671807b8185f42e9c3bd6ac94c33f4ab3435bd60.exe 8ad6a7b3eabe8b13dac49c87671807b8185f42e9c3bd6ac94c33f4ab3435bd60.exe PID 3584 wrote to memory of 588 3584 8ad6a7b3eabe8b13dac49c87671807b8185f42e9c3bd6ac94c33f4ab3435bd60.exe 8ad6a7b3eabe8b13dac49c87671807b8185f42e9c3bd6ac94c33f4ab3435bd60.exe PID 3584 wrote to memory of 588 3584 8ad6a7b3eabe8b13dac49c87671807b8185f42e9c3bd6ac94c33f4ab3435bd60.exe 8ad6a7b3eabe8b13dac49c87671807b8185f42e9c3bd6ac94c33f4ab3435bd60.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ad6a7b3eabe8b13dac49c87671807b8185f42e9c3bd6ac94c33f4ab3435bd60.exe"C:\Users\Admin\AppData\Local\Temp\8ad6a7b3eabe8b13dac49c87671807b8185f42e9c3bd6ac94c33f4ab3435bd60.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\UVfsWG.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\UVfsWG" /XML "C:\Users\Admin\AppData\Local\Temp\tmp44D5.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\8ad6a7b3eabe8b13dac49c87671807b8185f42e9c3bd6ac94c33f4ab3435bd60.exe"C:\Users\Admin\AppData\Local\Temp\8ad6a7b3eabe8b13dac49c87671807b8185f42e9c3bd6ac94c33f4ab3435bd60.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp44D5.tmpMD5
e8d906703e09e9ac12d29a1dfe54dda2
SHA16f279132fb73936caf48ed42c0dcf9514450bcd4
SHA25645778db0347c6f618a36a4127b9bc67a05e95fcf690588cde1e1d673219a7c46
SHA51255f4bc6c68f1a29ef1b25ee3f3b709096d854c1a2c7d6f63d1b4a032b678c74bb271e7be94cb141608313a91085c9585b192a2bffd45764aaef1d21cbda57485
-
memory/392-156-0x0000000007F40000-0x0000000007FA6000-memory.dmpFilesize
408KB
-
memory/392-367-0x0000000009C80000-0x0000000009C88000-memory.dmpFilesize
32KB
-
memory/392-372-0x0000000009C80000-0x0000000009C88000-memory.dmpFilesize
32KB
-
memory/392-139-0x00000000081A0000-0x00000000084F0000-memory.dmpFilesize
3.3MB
-
memory/392-366-0x0000000009C90000-0x0000000009CAA000-memory.dmpFilesize
104KB
-
memory/392-361-0x0000000009C90000-0x0000000009CAA000-memory.dmpFilesize
104KB
-
memory/392-236-0x0000000004F73000-0x0000000004F74000-memory.dmpFilesize
4KB
-
memory/392-167-0x0000000009D00000-0x0000000009D94000-memory.dmpFilesize
592KB
-
memory/392-166-0x0000000009B30000-0x0000000009BD5000-memory.dmpFilesize
660KB
-
memory/392-125-0x0000000000000000-mapping.dmp
-
memory/392-161-0x000000007F5F0000-0x000000007F5F1000-memory.dmpFilesize
4KB
-
memory/392-127-0x0000000003530000-0x0000000003531000-memory.dmpFilesize
4KB
-
memory/392-128-0x0000000003530000-0x0000000003531000-memory.dmpFilesize
4KB
-
memory/392-160-0x00000000097B0000-0x00000000097CE000-memory.dmpFilesize
120KB
-
memory/392-130-0x0000000004E10000-0x0000000004E46000-memory.dmpFilesize
216KB
-
memory/392-158-0x0000000008630000-0x000000000867B000-memory.dmpFilesize
300KB
-
memory/392-138-0x0000000004F72000-0x0000000004F73000-memory.dmpFilesize
4KB
-
memory/392-133-0x0000000007910000-0x0000000007F38000-memory.dmpFilesize
6.2MB
-
memory/392-134-0x0000000007870000-0x0000000007892000-memory.dmpFilesize
136KB
-
memory/392-135-0x0000000007F40000-0x0000000007FA6000-memory.dmpFilesize
408KB
-
memory/392-136-0x0000000008020000-0x0000000008086000-memory.dmpFilesize
408KB
-
memory/392-137-0x0000000004F70000-0x0000000004F71000-memory.dmpFilesize
4KB
-
memory/392-140-0x0000000008510000-0x000000000852C000-memory.dmpFilesize
112KB
-
memory/392-159-0x00000000089A0000-0x0000000008A16000-memory.dmpFilesize
472KB
-
memory/392-157-0x0000000008020000-0x0000000008086000-memory.dmpFilesize
408KB
-
memory/392-141-0x0000000008630000-0x000000000867B000-memory.dmpFilesize
300KB
-
memory/392-155-0x0000000007870000-0x0000000007892000-memory.dmpFilesize
136KB
-
memory/392-143-0x00000000089A0000-0x0000000008A16000-memory.dmpFilesize
472KB
-
memory/392-144-0x0000000003530000-0x0000000003531000-memory.dmpFilesize
4KB
-
memory/392-152-0x0000000007910000-0x0000000007F38000-memory.dmpFilesize
6.2MB
-
memory/392-153-0x0000000009A00000-0x0000000009A33000-memory.dmpFilesize
204KB
-
memory/392-154-0x0000000009A00000-0x0000000009A33000-memory.dmpFilesize
204KB
-
memory/588-131-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/588-142-0x0000000001300000-0x0000000001620000-memory.dmpFilesize
3.1MB
-
memory/588-132-0x000000000041D460-mapping.dmp
-
memory/3352-126-0x0000000000000000-mapping.dmp
-
memory/3584-124-0x0000000008B90000-0x0000000008BEE000-memory.dmpFilesize
376KB
-
memory/3584-115-0x0000000000730000-0x000000000079C000-memory.dmpFilesize
432KB
-
memory/3584-117-0x0000000005620000-0x0000000005B1E000-memory.dmpFilesize
5.0MB
-
memory/3584-116-0x0000000000730000-0x000000000079C000-memory.dmpFilesize
432KB
-
memory/3584-123-0x00000000089F0000-0x0000000008A8C000-memory.dmpFilesize
624KB
-
memory/3584-122-0x0000000008670000-0x00000000086BB000-memory.dmpFilesize
300KB
-
memory/3584-121-0x0000000005610000-0x000000000561E000-memory.dmpFilesize
56KB
-
memory/3584-120-0x0000000005100000-0x000000000510A000-memory.dmpFilesize
40KB
-
memory/3584-119-0x0000000005120000-0x000000000561E000-memory.dmpFilesize
5.0MB
-
memory/3584-118-0x0000000005120000-0x00000000051B2000-memory.dmpFilesize
584KB