Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
26-01-2022 18:10
Static task
static1
Behavioral task
behavioral1
Sample
INV88272727271_REQUIREMENT_02727272272.exe
Resource
win7-en-20211208
General
-
Target
INV88272727271_REQUIREMENT_02727272272.exe
-
Size
245KB
-
MD5
1a97ab72ef6c22d9508ad78db60ca205
-
SHA1
05122e7544d6eaa53aaf36cc34aff27a17a192d7
-
SHA256
947a0f977737ff7dfa8ae17eb2eff4b0ec4b51479c76f12f60d0b8c40ca9d323
-
SHA512
cb541ef914b7c998913dfe0359a1b42345fc5705f174399c8153cab4e2a6c542d6881ef00d83505c6fbc3b38c1eddf033bc90ca67dcc3050f8d3264caa34ed36
Malware Config
Extracted
xloader
2.5
rmfg
prospectcompounding.com
grand-prix.voyage
solvingpklogc.xyz
eliamhome.com
gamevip88.club
arsels.info
dswlt.com
dchehe.com
lawyerjerusalem.com
pbnseo.xyz
apuryifuid.com
kiukiupoker88.net
leannonimpact.com
kare-furniture.com
mississaugaremax.online
zpyh198.com
dueplay.store
naimi.ltd
greenstepspodiatry.com
cewirtanen.com
stonebyparamount.com
stellenbargains.com
meyerranch.realty
bitcoingrab.com
ifjejijfe.xyz
drjeannerot.com
trgau.com
thailandland.land
satupena.info
coinzillo.com
cloudreveller.digital
wilsoncreekarts.com
hyalucaps.com
dempius.com
onycostopsale.com
54jjpygl.xyz
quick2repair.net
tpyrj.com
cyndeiversondesigns.com
lmandarin.com
bornholm-urlaub.info
rodictibey.quest
saiione.com
flydakhla.com
surveycourses.com
bestnico.space
huvao.com
uptownholding.com
elitesellerstrafficnet.com
zitzies.xyz
supermercadolonuestro.com
laptoppricenepal.com
navyantra.com
myjms315.com
loanswithbrian.net
birbeygrup.xyz
trend-marketing.club
meipassion.com
amtha.com
witlyza.com
boardsandbeamsdecor.com
c2batwpnmu5uvtvnvfk5916.com
yavuzselimorganizasyon.com
4580055.xyz
brimstrategy.com
Signatures
-
Xloader Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/776-56-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Loads dropped DLL 1 IoCs
Processes:
INV88272727271_REQUIREMENT_02727272272.exepid process 1460 INV88272727271_REQUIREMENT_02727272272.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
INV88272727271_REQUIREMENT_02727272272.exedescription pid process target process PID 1460 set thread context of 776 1460 INV88272727271_REQUIREMENT_02727272272.exe INV88272727271_REQUIREMENT_02727272272.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
INV88272727271_REQUIREMENT_02727272272.exepid process 776 INV88272727271_REQUIREMENT_02727272272.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
INV88272727271_REQUIREMENT_02727272272.exedescription pid process target process PID 1460 wrote to memory of 776 1460 INV88272727271_REQUIREMENT_02727272272.exe INV88272727271_REQUIREMENT_02727272272.exe PID 1460 wrote to memory of 776 1460 INV88272727271_REQUIREMENT_02727272272.exe INV88272727271_REQUIREMENT_02727272272.exe PID 1460 wrote to memory of 776 1460 INV88272727271_REQUIREMENT_02727272272.exe INV88272727271_REQUIREMENT_02727272272.exe PID 1460 wrote to memory of 776 1460 INV88272727271_REQUIREMENT_02727272272.exe INV88272727271_REQUIREMENT_02727272272.exe PID 1460 wrote to memory of 776 1460 INV88272727271_REQUIREMENT_02727272272.exe INV88272727271_REQUIREMENT_02727272272.exe PID 1460 wrote to memory of 776 1460 INV88272727271_REQUIREMENT_02727272272.exe INV88272727271_REQUIREMENT_02727272272.exe PID 1460 wrote to memory of 776 1460 INV88272727271_REQUIREMENT_02727272272.exe INV88272727271_REQUIREMENT_02727272272.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\INV88272727271_REQUIREMENT_02727272272.exe"C:\Users\Admin\AppData\Local\Temp\INV88272727271_REQUIREMENT_02727272272.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\INV88272727271_REQUIREMENT_02727272272.exe"C:\Users\Admin\AppData\Local\Temp\INV88272727271_REQUIREMENT_02727272272.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:776
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
2a17c8c8f13a3cde9c7f0da98d7f2c71
SHA1cfb4dc9a82c18285fba188b2556327a7415cd2b5
SHA256811ec72790978744eb3367756a5be669217e6cd8acad47fac733a8c6d094db20
SHA5121499bbd6e947c3cdefd164944a8adedee58321d65e1766a534904e27fb3f5e9245d4e75f0d6915c7c726b3fc28d60220f991f6af19aae2294cc164d542987f96