Analysis
-
max time kernel
77s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
28-01-2022 06:26
Static task
static1
Behavioral task
behavioral1
Sample
9af4d9ef8b2a850854ae23411d44d3603147c26898bca1010fd2f9b16f6d456e.exe
Resource
win10v2004-en-20220112
General
-
Target
9af4d9ef8b2a850854ae23411d44d3603147c26898bca1010fd2f9b16f6d456e.exe
-
Size
248KB
-
MD5
c2ca2ba9c38eb02217588662717ba6c3
-
SHA1
8a897f24d2e564af2c2fcc272ab0cfbef10611b5
-
SHA256
9af4d9ef8b2a850854ae23411d44d3603147c26898bca1010fd2f9b16f6d456e
-
SHA512
7c7a80f37013b8b5fe27e0c9c3144884abde6ca49484c3e8c6cc78daa9f3b6ac890577247223e7d4875b865244e8732840c6a47170fbe2c7f27406ba4c8f52a6
Malware Config
Extracted
xloader
2.5
b80i
yixuan5.com
jiazheng369.com
danielleefelipe.net
micorgas.com
uvywah.com
nbjcgl.com
streets4suites.com
hempgotas.com
postmoon.xyz
gaboshoes.com
pastodwes.com
libes.asia
damusalama.com
youngliving1.com
mollyagee.com
branchwallet.com
seebuehnegoerlitz.com
inventors.community
teentykarm.quest
927291.com
wohn-union.info
rvmservices.com
cuanquotex.online
buysubarus.com
360e.group
markham.condos
carriewilliamsinc.com
ennitec.com
wildberryhair.com
trulyrun.com
pinkandgrey.info
mnselfservice.com
gabtomenice.com
2thpolis.com
standardcrypro.com
58lif.com
ir-hasnol.com
ggsega.xyz
tipslowclever.rest
atlasgrpltdgh.com
4338agnes.com
hillsncreeks.com
pentest.ink
cevichiles.com
evodoge.com
gooooooo.xyz
ehaszthecarpetbagger.com
finanes.xyz
zoharfine.com
viperiastudios.com
sjljtzsls.com
frentags.art
mediafyagency.com
faydergayremezdayener.net
freelance-rse.com
quickmovecourierservices.com
lexingtonprochoice.com
farmacymerchants.com
inkland-tattoo.com
aloebiotics.com
rampi6.com
bookinggroningen.com
wilkinsutotint.com
inslidr.com
dreamschools.online
Signatures
-
Xloader Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/3296-131-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Sets service image path in registry 2 TTPs
-
Loads dropped DLL 1 IoCs
Processes:
9af4d9ef8b2a850854ae23411d44d3603147c26898bca1010fd2f9b16f6d456e.exepid process 2436 9af4d9ef8b2a850854ae23411d44d3603147c26898bca1010fd2f9b16f6d456e.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
9af4d9ef8b2a850854ae23411d44d3603147c26898bca1010fd2f9b16f6d456e.exedescription pid process target process PID 2436 set thread context of 3296 2436 9af4d9ef8b2a850854ae23411d44d3603147c26898bca1010fd2f9b16f6d456e.exe 9af4d9ef8b2a850854ae23411d44d3603147c26898bca1010fd2f9b16f6d456e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies data under HKEY_USERS 41 IoCs
Processes:
WaaSMedicAgent.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates WaaSMedicAgent.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs WaaSMedicAgent.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
9af4d9ef8b2a850854ae23411d44d3603147c26898bca1010fd2f9b16f6d456e.exepid process 3296 9af4d9ef8b2a850854ae23411d44d3603147c26898bca1010fd2f9b16f6d456e.exe 3296 9af4d9ef8b2a850854ae23411d44d3603147c26898bca1010fd2f9b16f6d456e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
9af4d9ef8b2a850854ae23411d44d3603147c26898bca1010fd2f9b16f6d456e.exedescription pid process target process PID 2436 wrote to memory of 3296 2436 9af4d9ef8b2a850854ae23411d44d3603147c26898bca1010fd2f9b16f6d456e.exe 9af4d9ef8b2a850854ae23411d44d3603147c26898bca1010fd2f9b16f6d456e.exe PID 2436 wrote to memory of 3296 2436 9af4d9ef8b2a850854ae23411d44d3603147c26898bca1010fd2f9b16f6d456e.exe 9af4d9ef8b2a850854ae23411d44d3603147c26898bca1010fd2f9b16f6d456e.exe PID 2436 wrote to memory of 3296 2436 9af4d9ef8b2a850854ae23411d44d3603147c26898bca1010fd2f9b16f6d456e.exe 9af4d9ef8b2a850854ae23411d44d3603147c26898bca1010fd2f9b16f6d456e.exe PID 2436 wrote to memory of 3296 2436 9af4d9ef8b2a850854ae23411d44d3603147c26898bca1010fd2f9b16f6d456e.exe 9af4d9ef8b2a850854ae23411d44d3603147c26898bca1010fd2f9b16f6d456e.exe PID 2436 wrote to memory of 3296 2436 9af4d9ef8b2a850854ae23411d44d3603147c26898bca1010fd2f9b16f6d456e.exe 9af4d9ef8b2a850854ae23411d44d3603147c26898bca1010fd2f9b16f6d456e.exe PID 2436 wrote to memory of 3296 2436 9af4d9ef8b2a850854ae23411d44d3603147c26898bca1010fd2f9b16f6d456e.exe 9af4d9ef8b2a850854ae23411d44d3603147c26898bca1010fd2f9b16f6d456e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9af4d9ef8b2a850854ae23411d44d3603147c26898bca1010fd2f9b16f6d456e.exe"C:\Users\Admin\AppData\Local\Temp\9af4d9ef8b2a850854ae23411d44d3603147c26898bca1010fd2f9b16f6d456e.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\9af4d9ef8b2a850854ae23411d44d3603147c26898bca1010fd2f9b16f6d456e.exe"C:\Users\Admin\AppData\Local\Temp\9af4d9ef8b2a850854ae23411d44d3603147c26898bca1010fd2f9b16f6d456e.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 2fa5c967f1ce28aacf419a7d1978af73 omc2//L2GE+ip2xL58nQkA.0.1.0.0.01⤵
- Modifies data under HKEY_USERS
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\nsvA6FD.tmp\npsx.dllMD5
ff94ac3a49e4c0bcdf0c1fe9730293d9
SHA12f81d5b8ec6515fbdfa099eabb0babf9d6c40b97
SHA2564d2a5f508e4d6a54d71af82fcea978527cdd216423fb050457dfeb4db581178f
SHA51201f8bc3ac735473c60e842d76d282f4859fd9fecada580bffc629a8127a821a0839ed832143c7034b3a1e3dfca9561841626f0b8fbe582cb6a0e7dab453a5a16
-
memory/2436-132-0x0000000002280000-0x0000000002284000-memory.dmpFilesize
16KB
-
memory/3296-131-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB