Analysis
-
max time kernel
121s -
max time network
134s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
22-01-2022 07:13
Static task
static1
Behavioral task
behavioral1
Sample
Originalgoodsorder2022_196532012.exe
Resource
win7-en-20211208
General
-
Target
Originalgoodsorder2022_196532012.exe
-
Size
310KB
-
MD5
e1c16d90f07bc1d1540256db01ee6be1
-
SHA1
0e3295b972ea3a2fb9f47e997f3aa694ece200bc
-
SHA256
57db8a6dc112c8d4b4202ba07774edf9bf54fdafd6fe11bd8d0e7ae328fcc369
-
SHA512
53b941e1348270d57d72bae84f0a23868e8e0b9c82a4d7209f62eb02b34ea14e9caf6da2171558f0d3464a4704eb9288a0bbbff4a62a90d9df74eaa59623f42b
Malware Config
Extracted
xloader
2.5
ssac
beautybybrin.com
oregemo.com
prospectoriq.com
blazermid.com
cloudnineloans.com
myyntisofta.com
filoupoils.com
web-solutiontnpasumo3.xyz
becbares.com
lines-hikkoshi.com
ohayouwww.com
writingdadsobituarywithdad.com
bridalbaes.com
jamshir.com
rangertots.com
dankbrobeans.com
titan111.com
uplearns.info
maxicashprokil.xyz
evc24.com
mingshan888.com
thehomefurnishings.com
jjyive.space
vtkk.info
state-attorney.online
zoho.systems
nd300.com
ivermectinforanimals.ca
gruppobenedetto.com
planet99angka.xyz
astrotiq.com
fangshensj.com
ocean.limited
zalaridumpf.quest
cursolibreonline.com
lifein.art
identspactures.com
nfltvgo.com
chronicfit.store
mariajosereina.com
hebbz764776341.com
anpxlmmspix.mobi
mydevhub.tech
nobelrealm.com
dentalteamny.com
patinerd.com
socratisbey.xyz
hnylcwfs.com
yujieqin.com
midorato.com
sunglowdragon.com
americaplr.com
cxqdscape.com
situsgacor.xyz
sattlerei-dortmund.com
life120lospaccio.com
riddleme.one
perpustakaan-geominerba.online
renatafaceandbodyskincare.com
allkoreas.com
myvisitiq.com
candlesallday.com
poleador.com
4hsp116.com
homesbyvw.com
Signatures
-
Xloader Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3760-116-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Loads dropped DLL 1 IoCs
Processes:
Originalgoodsorder2022_196532012.exepid process 3516 Originalgoodsorder2022_196532012.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
Originalgoodsorder2022_196532012.exedescription pid process target process PID 3516 set thread context of 3760 3516 Originalgoodsorder2022_196532012.exe Originalgoodsorder2022_196532012.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Originalgoodsorder2022_196532012.exepid process 3760 Originalgoodsorder2022_196532012.exe 3760 Originalgoodsorder2022_196532012.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
Originalgoodsorder2022_196532012.exedescription pid process target process PID 3516 wrote to memory of 3760 3516 Originalgoodsorder2022_196532012.exe Originalgoodsorder2022_196532012.exe PID 3516 wrote to memory of 3760 3516 Originalgoodsorder2022_196532012.exe Originalgoodsorder2022_196532012.exe PID 3516 wrote to memory of 3760 3516 Originalgoodsorder2022_196532012.exe Originalgoodsorder2022_196532012.exe PID 3516 wrote to memory of 3760 3516 Originalgoodsorder2022_196532012.exe Originalgoodsorder2022_196532012.exe PID 3516 wrote to memory of 3760 3516 Originalgoodsorder2022_196532012.exe Originalgoodsorder2022_196532012.exe PID 3516 wrote to memory of 3760 3516 Originalgoodsorder2022_196532012.exe Originalgoodsorder2022_196532012.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Originalgoodsorder2022_196532012.exe"C:\Users\Admin\AppData\Local\Temp\Originalgoodsorder2022_196532012.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Originalgoodsorder2022_196532012.exe"C:\Users\Admin\AppData\Local\Temp\Originalgoodsorder2022_196532012.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nsoA720.tmp\tbpstexz.dllMD5
c079aa3b2f303eb957e92dba04b52248
SHA182ca7c55f6facfb1fd2abd24ebf382bae6fe2b43
SHA256b0345a47cd68f91827d7b4eb8ab3c12cc73fa13690ceb78bb6912ead6c9062ed
SHA512190988fa3d0167a4d6b24a6121594c3ac3119585be02b438260c960692c8b9d02a56ddd9319357fb3e4c47e212d0faa024d400a83b67c711a850b50a4996f7df
-
memory/3760-116-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3760-117-0x00000000009F0000-0x0000000000D10000-memory.dmpFilesize
3.1MB