Analysis
-
max time kernel
123s -
max time network
140s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
26-01-2022 15:35
Static task
static1
Behavioral task
behavioral1
Sample
f328a43f0ed25b23d8e5eddcd3d4e96a.exe
Resource
win7-en-20211208
General
-
Target
f328a43f0ed25b23d8e5eddcd3d4e96a.exe
-
Size
463KB
-
MD5
f328a43f0ed25b23d8e5eddcd3d4e96a
-
SHA1
f2774f50aabd73d03ac45447fa1aac4563348af9
-
SHA256
41e0f6ad541e5253c451b3d51976df257813e85c443ab1b863b3acf6c078b38c
-
SHA512
a31b377c5e92616a1d0f14b613402813ae92565a999a6a9e8fa63d39a5535651357f96772928b3869e6322a861bd281e37b6dafe3b1f8aa29e8be40728c44b26
Malware Config
Extracted
xloader
2.5
pnug
natureate.com
ita-pots.website
sucohansmushroom.com
produrielrosen.com
gosystemupdatenow.online
jiskra.art
janwiench.com
norfolkfoodhall.com
iloveaddictss.com
pogozip.com
buyinstapva.com
teardirectionfreedom.xyz
0205168.com
apaixonadosporpugs.online
jawscoinc.com
crafter.quest
wikipedianow.com
radiopuls.net
kendama-co.com
goodstudycanada.com
huzhoucs.com
asinment.com
fuchsundrudolph.com
arthurenathalia.com
globalcosmeticsstudios.com
brandrackley.com
freemanhub.one
utserver.online
fullspecter.com
wshowcase.com
airjordanshoes-retro.com
linguimatics.com
app-verlengen.icu
singpost.red
j4.claims
inoteapp.net
jrdautomotivellc.com
xn--beaupre-6xa.com
mypolicyportal.net
wdgjdhpg.com
anshulindla.com
m981070.com
vertentebike.com
claim-available.com
buyfudgybombs.com
adfnapoli.com
blackfuid.com
clambakedelivered.info
marketingworksonhold.com
xvyj.top
richardsonsfinest.com
gurimix.com
dorhop.com
mauigrowngreencoffee.net
juzytuu.xyz
pokorny.industries
floridapermitsolutions.com
right-on-target-store.com
ynaire.com
nextpar.com
disdrone.com
fruitfulvinebirth.com
africanfairytale.com
leisuresabah.com
safetyeats.asia
Signatures
-
Xloader Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/528-119-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Loads dropped DLL 1 IoCs
Processes:
f328a43f0ed25b23d8e5eddcd3d4e96a.exepid process 2556 f328a43f0ed25b23d8e5eddcd3d4e96a.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
f328a43f0ed25b23d8e5eddcd3d4e96a.exedescription pid process target process PID 2556 set thread context of 528 2556 f328a43f0ed25b23d8e5eddcd3d4e96a.exe f328a43f0ed25b23d8e5eddcd3d4e96a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
f328a43f0ed25b23d8e5eddcd3d4e96a.exepid process 528 f328a43f0ed25b23d8e5eddcd3d4e96a.exe 528 f328a43f0ed25b23d8e5eddcd3d4e96a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
f328a43f0ed25b23d8e5eddcd3d4e96a.exedescription pid process target process PID 2556 wrote to memory of 528 2556 f328a43f0ed25b23d8e5eddcd3d4e96a.exe f328a43f0ed25b23d8e5eddcd3d4e96a.exe PID 2556 wrote to memory of 528 2556 f328a43f0ed25b23d8e5eddcd3d4e96a.exe f328a43f0ed25b23d8e5eddcd3d4e96a.exe PID 2556 wrote to memory of 528 2556 f328a43f0ed25b23d8e5eddcd3d4e96a.exe f328a43f0ed25b23d8e5eddcd3d4e96a.exe PID 2556 wrote to memory of 528 2556 f328a43f0ed25b23d8e5eddcd3d4e96a.exe f328a43f0ed25b23d8e5eddcd3d4e96a.exe PID 2556 wrote to memory of 528 2556 f328a43f0ed25b23d8e5eddcd3d4e96a.exe f328a43f0ed25b23d8e5eddcd3d4e96a.exe PID 2556 wrote to memory of 528 2556 f328a43f0ed25b23d8e5eddcd3d4e96a.exe f328a43f0ed25b23d8e5eddcd3d4e96a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f328a43f0ed25b23d8e5eddcd3d4e96a.exe"C:\Users\Admin\AppData\Local\Temp\f328a43f0ed25b23d8e5eddcd3d4e96a.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f328a43f0ed25b23d8e5eddcd3d4e96a.exe"C:\Users\Admin\AppData\Local\Temp\f328a43f0ed25b23d8e5eddcd3d4e96a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nsnBA6.tmp\koxsnjp.dllMD5
df346e3a880b6e1cad15024844bc140b
SHA14fa69b1a80af84d85d0709b50a11924a954c904d
SHA256c744a4435d81489ef625898e53053f42e20ed3636aa379608b9f5f3553183e05
SHA5128965e7d7200682df8a93b8d90be17b8ce455af510a156dec47ec0bec807c9ef5053b25d1c1f3159a034171d3d5e836a6997f3cba19e54ec92e6031343c0f96fd
-
memory/528-119-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/528-121-0x0000000000990000-0x0000000000CB0000-memory.dmpFilesize
3.1MB
-
memory/2556-120-0x0000000002370000-0x0000000002372000-memory.dmpFilesize
8KB