Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
20-01-2022 08:28
Static task
static1
Behavioral task
behavioral1
Sample
MV ULTRASONIC_PDA$62,000.exe
Resource
win7-en-20211208
General
-
Target
MV ULTRASONIC_PDA$62,000.exe
-
Size
287KB
-
MD5
238fa7f1204998f7b13571649e15508a
-
SHA1
e130539aee3a44c1902016476eb9f4304976aa4d
-
SHA256
3f76d69c552a61ab3d1207fb64ac3aecf812e98f99c5413a9472d59859c38077
-
SHA512
53c571454bd46209555718f97cb4b35c4dce038e52ec2a4d6a8c9315bacf569259ee3c511fc8e26c42a15739a91f8988339610c34d322a0c44c38dc92c6c3e41
Malware Config
Extracted
xloader
2.5
igwa
listingswithalex.com
funtabse.com
aydenwalling.com
prochal.net
superfoodsnederland.com
moldluck.com
dianekgordon.store
regionalhomescommercial.com
mysecuritymadesimple.com
malwaremastery.com
kodaikeiko.com
jrzg996.com
agricurve.net
songlingjiu.com
virginianundahfishingclub.com
friendschance.com
pastelpresents.com
answertitles.com
survival-hunter.com
nxfddl.com
traditionnevertrend.com
agrovessel.com
unicorm.digital
cucumboy.com
alemdogarimpo.com
laraful.com
hexwaa.com
hanu21st.com
knoycia.com
qishengxing.com
gopipurespices.com
fdkkrfidkdslsieofkld.info
elephantspublications.online
valeriebeijing.com
xn--42cg2czax6ptae6a.com
2shengman.com
sfcshavedice.com
ragworkhouse.com
stardomfrokch.xyz
exoticcenterfold.com
eventosartifice.com
test-order-noren.com
110bao.com
face-pro.online
freedomoff.com
futuresep.com
tremblock.com
chocolat-gillotte.com
speclove.com
ddflsl.com
goodnewsmbc.net
cloudtotaal.com
goapps-auth.com
ouch247max.com
sabra-sd.com
luxuryneverhurt.art
rxvendorpills.online
ludowinners.online
placemyorder.online
skyrim.company
monsterlecturer.com
controle-fiscal.com
phoenixinjurylawyer.online
nanoheadgames.com
toposales.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/3392-131-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3392-134-0x0000000000510000-0x0000000000D7A000-memory.dmp xloader behavioral2/memory/3392-136-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3260-140-0x0000000002C00000-0x0000000002C29000-memory.dmp xloader behavioral2/memory/3260-141-0x0000000002F90000-0x0000000004EDA000-memory.dmp xloader -
Sets service image path in registry 2 TTPs
-
Loads dropped DLL 1 IoCs
Processes:
MV ULTRASONIC_PDA$62,000.exepid process 2576 MV ULTRASONIC_PDA$62,000.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
MV ULTRASONIC_PDA$62,000.exeMV ULTRASONIC_PDA$62,000.execmmon32.exedescription pid process target process PID 2576 set thread context of 3392 2576 MV ULTRASONIC_PDA$62,000.exe MV ULTRASONIC_PDA$62,000.exe PID 3392 set thread context of 2428 3392 MV ULTRASONIC_PDA$62,000.exe Explorer.EXE PID 3392 set thread context of 2428 3392 MV ULTRASONIC_PDA$62,000.exe Explorer.EXE PID 3260 set thread context of 2428 3260 cmmon32.exe Explorer.EXE -
Drops file in Program Files directory 1 IoCs
Processes:
cmmon32.exedescription ioc process File opened for modification C:\Program Files (x86)\Dqta\8p8pcbart_t.exe cmmon32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 41 IoCs
Processes:
WaaSMedicAgent.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
Processes:
MV ULTRASONIC_PDA$62,000.execmmon32.exepid process 3392 MV ULTRASONIC_PDA$62,000.exe 3392 MV ULTRASONIC_PDA$62,000.exe 3392 MV ULTRASONIC_PDA$62,000.exe 3392 MV ULTRASONIC_PDA$62,000.exe 3392 MV ULTRASONIC_PDA$62,000.exe 3392 MV ULTRASONIC_PDA$62,000.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe 3260 cmmon32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2428 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
MV ULTRASONIC_PDA$62,000.execmmon32.exepid process 3392 MV ULTRASONIC_PDA$62,000.exe 3392 MV ULTRASONIC_PDA$62,000.exe 3392 MV ULTRASONIC_PDA$62,000.exe 3392 MV ULTRASONIC_PDA$62,000.exe 3260 cmmon32.exe 3260 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
MV ULTRASONIC_PDA$62,000.execmmon32.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 3392 MV ULTRASONIC_PDA$62,000.exe Token: SeDebugPrivilege 3260 cmmon32.exe Token: SeShutdownPrivilege 2428 Explorer.EXE Token: SeCreatePagefilePrivilege 2428 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
MV ULTRASONIC_PDA$62,000.exeExplorer.EXEcmmon32.exedescription pid process target process PID 2576 wrote to memory of 3392 2576 MV ULTRASONIC_PDA$62,000.exe MV ULTRASONIC_PDA$62,000.exe PID 2576 wrote to memory of 3392 2576 MV ULTRASONIC_PDA$62,000.exe MV ULTRASONIC_PDA$62,000.exe PID 2576 wrote to memory of 3392 2576 MV ULTRASONIC_PDA$62,000.exe MV ULTRASONIC_PDA$62,000.exe PID 2576 wrote to memory of 3392 2576 MV ULTRASONIC_PDA$62,000.exe MV ULTRASONIC_PDA$62,000.exe PID 2576 wrote to memory of 3392 2576 MV ULTRASONIC_PDA$62,000.exe MV ULTRASONIC_PDA$62,000.exe PID 2576 wrote to memory of 3392 2576 MV ULTRASONIC_PDA$62,000.exe MV ULTRASONIC_PDA$62,000.exe PID 2428 wrote to memory of 3260 2428 Explorer.EXE cmmon32.exe PID 2428 wrote to memory of 3260 2428 Explorer.EXE cmmon32.exe PID 2428 wrote to memory of 3260 2428 Explorer.EXE cmmon32.exe PID 3260 wrote to memory of 2272 3260 cmmon32.exe cmd.exe PID 3260 wrote to memory of 2272 3260 cmmon32.exe cmd.exe PID 3260 wrote to memory of 2272 3260 cmmon32.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MV ULTRASONIC_PDA$62,000.exe"C:\Users\Admin\AppData\Local\Temp\MV ULTRASONIC_PDA$62,000.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\MV ULTRASONIC_PDA$62,000.exe"C:\Users\Admin\AppData\Local\Temp\MV ULTRASONIC_PDA$62,000.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\MV ULTRASONIC_PDA$62,000.exe"3⤵
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 7b714c6aafcaf72bf5172589b98c0161 usKK10gzFUaaKekVHlVCEA.0.1.0.0.01⤵
- Modifies data under HKEY_USERS
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k wusvcs -p1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\nss29D9.tmp\mhvofabkmab.dllMD5
c7ccaa08597a1e093cda3a2f126f75e0
SHA14ded36dbe3b7a87752630c0e496378cf159a7632
SHA2568be78073ef9fdcc6639e9fde21d313ad35de29b3e81e6cdb8e5d1fa2a89a19d8
SHA5129dedc0bf6dd27964a70539782f291d334752eb2fbd386ba31c1e08d08cd7e1861e54d0ea2dfda332dcbcb614062dddd60cdc9b6def1388b8334c9c56faefaa6e
-
memory/2428-138-0x0000000008D90000-0x0000000008EE7000-memory.dmpFilesize
1.3MB
-
memory/2428-143-0x0000000003760000-0x000000000382F000-memory.dmpFilesize
828KB
-
memory/2428-135-0x00000000088A0000-0x0000000008987000-memory.dmpFilesize
924KB
-
memory/3260-139-0x00000000004D0000-0x00000000004DC000-memory.dmpFilesize
48KB
-
memory/3260-140-0x0000000002C00000-0x0000000002C29000-memory.dmpFilesize
164KB
-
memory/3260-141-0x0000000002F90000-0x0000000004EDA000-memory.dmpFilesize
31.3MB
-
memory/3260-142-0x0000000002F90000-0x0000000004EDA000-memory.dmpFilesize
31.3MB
-
memory/3392-136-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3392-137-0x0000000000E90000-0x0000000000EA1000-memory.dmpFilesize
68KB
-
memory/3392-134-0x0000000000510000-0x0000000000D7A000-memory.dmpFilesize
8.4MB
-
memory/3392-133-0x0000000000510000-0x0000000000D7A000-memory.dmpFilesize
8.4MB
-
memory/3392-131-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB