Analysis
-
max time kernel
154s -
max time network
152s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
28-01-2022 12:38
Static task
static1
Behavioral task
behavioral1
Sample
HIRE SOA FOR DEC_2021.exe
Resource
win7-en-20211208
General
-
Target
HIRE SOA FOR DEC_2021.exe
-
Size
247KB
-
MD5
d8af2363d5a46336733b6121c0b4cf0e
-
SHA1
fcb0ee44436230d924b2550fc9935ee76f2498fe
-
SHA256
2a4415721925c12ce8a80719697ffbda5daf88fe34804b0549bc5d5605790cdb
-
SHA512
e34f724dc4a7837ff86ed5d5214e1ed22e5643bbd45f881066b05b4ae4766a6330a48db8e4ef8dcee9ca8bf5ace43d987a667f62ea086992d2ff1ee24875889d
Malware Config
Extracted
xloader
2.5
cxep
estateglobal.info
loransstore.com
loginofy.com
fjallravenz.online
cefseguranca-app.com
safontadiestramiento.com
bubbleteapro.com
morethanmummies.com
serviciopersonalizadoweb.com
headerbidder.info
skworkforce.com
heightsorthodontics.com
chulavistapd.com
southjerseyautobody.net
chargedbygratitude.com
meltingpotspot.com
gdjiachen.com
luckdrawprogram.com
vintagepaseo.com
bequestslojyh.xyz
layeredrofbes.xyz
com-weekly.email
suddisaddu.com
jnlord.com
outerverse.ventures
terraroyale.com
hairclub.info
rent2owninusa.com
pmaonline.xyz
wearecampo.com
multiplezonesplit.com
angry-mandala.com
ikigaiofficial.store
princewoodwork.store
moviesaver24.com
btec-solutions.com
valurgrayenterprises.com
homesofsilverspur.com
leysy-y-nazareno.com
grade8.tech
ammarus.com
researchjournal.net
nicolaslacasse.com
khukhuantainha.com
resultlv.com
toraportal.com
wickedhunterworld.com
clickspromolp.com
b148tlrnd09ustnnaku2721.com
high-low-ga.info
norcalfirewoodllc.com
fatima2021.com
aaronsmathquest.com
decal-mania.com
spitfiredefenceindustries.com
mireyita.com
simonhaidomous.com
roofingcontractorhickory.com
mgav69.xyz
spacebymeghan.com
hot144.com
mmfirewood.net
akshayaasri.com
bilgisayarimnekadar.com
littlesportsacademy.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1196-58-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1196-63-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/988-70-0x00000000000F0000-0x0000000000119000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1920 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
HIRE SOA FOR DEC_2021.exepid process 1956 HIRE SOA FOR DEC_2021.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
msiexec.exedescription ioc process Key created \Registry\Machine\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run msiexec.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
HIRE SOA FOR DEC_2021.exeHIRE SOA FOR DEC_2021.exemsiexec.exedescription pid process target process PID 1956 set thread context of 1196 1956 HIRE SOA FOR DEC_2021.exe HIRE SOA FOR DEC_2021.exe PID 1196 set thread context of 1424 1196 HIRE SOA FOR DEC_2021.exe Explorer.EXE PID 1196 set thread context of 1424 1196 HIRE SOA FOR DEC_2021.exe Explorer.EXE PID 988 set thread context of 1424 988 msiexec.exe Explorer.EXE -
Drops file in Program Files directory 1 IoCs
Processes:
msiexec.exedescription ioc process File opened for modification C:\Program Files (x86)\P4hl\updatekpx0m.exe msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 64 IoCs
Processes:
Explorer.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{C4D98F09-6124-4FE0-9942-826416082DA9}\Mode = "6" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "0" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 74003100000000008853287a1100557365727300600008000400efbeee3a851a8853287a2a000000e601000000000100000000000000000036000000000055007300650072007300000040007300680065006c006c00330032002e0064006c006c002c002d0032003100380031003300000014000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\ShowCmd = "1" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = 00000000ffffffff Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{C4D98F09-6124-4FE0-9942-826416082DA9}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0 = 4c003100000000008853547c10204c6f63616c00380008000400efbe8853287a8853547c2a000000000200000000020000000000000000000000000000004c006f00630061006c00000014000000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 = 4a003100000000003c54cf64102054656d700000360008000400efbe8853287a3c54cf642a00000001020000000002000000000000000000000000000000540065006d007000000014000000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\MRUListEx = 00000000ffffffff Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{C4D98F09-6124-4FE0-9942-826416082DA9}\LogicalViewMode = "2" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 19002f433a5c000000000000000000000000000000000000000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4c003100000000008853c880100041646d696e00380008000400efbe8853287a8853c8802a00000033000000000003000000000000000000000000000000410064006d0069006e00000014000000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\NodeSlot = "2" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{C4D98F09-6124-4FE0-9942-826416082DA9}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "16" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\MRUListEx = 00000000ffffffff Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{57807898-8C4F-4462-BB63-71042380B109}" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{C4D98F09-6124-4FE0-9942-826416082DA9} Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{C4D98F09-6124-4FE0-9942-826416082DA9}\Rev = "0" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\HotKey = "0" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\MRUListEx = ffffffff Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{C4D98F09-6124-4FE0-9942-826416082DA9}\GroupByKey:PID = "0" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1 = 14001f4225481e03947bc34db131e946b44c8dd50000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{C4D98F09-6124-4FE0-9942-826416082DA9}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac0e0000007800000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_Classes\Local Settings Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616193" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "1" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0 = 52003100000000008853287a122041707044617461003c0008000400efbe8853287a8853287a2a000000ed0100000000020000000000000000000000000000004100700070004400610074006100000016000000 Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\1\MRUListEx = ffffffff Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{C4D98F09-6124-4FE0-9942-826416082DA9}\Vid = "{65F125E5-7BE1-4810-BA9D-D271C8432CE3}" Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Rev = "0" Explorer.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Vid = "{137E7700-3573-11CF-AE69-08002B2E1262}" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0\NodeSlot = "1" Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\0\0\0 Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{C4D98F09-6124-4FE0-9942-826416082DA9}\GroupView = "0" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\Shell\{C4D98F09-6124-4FE0-9942-826416082DA9}\IconSize = "48" Explorer.EXE Set value (data) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 0000000001000000ffffffff Explorer.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3846991908-3261386348-1409841751-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\WFlags = "0" Explorer.EXE -
Opens file in notepad (likely ransom note) 2 IoCs
Processes:
NOTEPAD.EXENOTEPAD.EXEpid process 1744 NOTEPAD.EXE 1432 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
HIRE SOA FOR DEC_2021.exemsiexec.exepid process 1196 HIRE SOA FOR DEC_2021.exe 1196 HIRE SOA FOR DEC_2021.exe 1196 HIRE SOA FOR DEC_2021.exe 988 msiexec.exe 988 msiexec.exe 988 msiexec.exe 988 msiexec.exe 988 msiexec.exe 988 msiexec.exe 988 msiexec.exe 988 msiexec.exe 988 msiexec.exe 988 msiexec.exe 988 msiexec.exe 988 msiexec.exe 988 msiexec.exe 988 msiexec.exe 988 msiexec.exe 988 msiexec.exe 988 msiexec.exe 988 msiexec.exe 988 msiexec.exe 988 msiexec.exe 988 msiexec.exe 988 msiexec.exe 988 msiexec.exe 988 msiexec.exe 988 msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1424 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
HIRE SOA FOR DEC_2021.exemsiexec.exepid process 1196 HIRE SOA FOR DEC_2021.exe 1196 HIRE SOA FOR DEC_2021.exe 1196 HIRE SOA FOR DEC_2021.exe 1196 HIRE SOA FOR DEC_2021.exe 988 msiexec.exe 988 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
HIRE SOA FOR DEC_2021.exemsiexec.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 1196 HIRE SOA FOR DEC_2021.exe Token: SeDebugPrivilege 988 msiexec.exe Token: SeShutdownPrivilege 1424 Explorer.EXE Token: SeShutdownPrivilege 1424 Explorer.EXE Token: SeShutdownPrivilege 1424 Explorer.EXE Token: SeShutdownPrivilege 1424 Explorer.EXE Token: SeShutdownPrivilege 1424 Explorer.EXE Token: SeShutdownPrivilege 1424 Explorer.EXE Token: SeShutdownPrivilege 1424 Explorer.EXE Token: SeShutdownPrivilege 1424 Explorer.EXE Token: SeShutdownPrivilege 1424 Explorer.EXE Token: SeShutdownPrivilege 1424 Explorer.EXE Token: SeShutdownPrivilege 1424 Explorer.EXE Token: SeShutdownPrivilege 1424 Explorer.EXE Token: SeShutdownPrivilege 1424 Explorer.EXE -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1424 Explorer.EXE 1424 Explorer.EXE 1424 Explorer.EXE 1424 Explorer.EXE -
Suspicious use of SendNotifyMessage 10 IoCs
Processes:
Explorer.EXEpid process 1424 Explorer.EXE 1424 Explorer.EXE 1424 Explorer.EXE 1424 Explorer.EXE 1424 Explorer.EXE 1424 Explorer.EXE 1424 Explorer.EXE 1424 Explorer.EXE 1424 Explorer.EXE 1424 Explorer.EXE -
Suspicious use of SetWindowsHookEx 9 IoCs
Processes:
Explorer.EXEpid process 1424 Explorer.EXE 1424 Explorer.EXE 1424 Explorer.EXE 1424 Explorer.EXE 1424 Explorer.EXE 1424 Explorer.EXE 1424 Explorer.EXE 1424 Explorer.EXE 1424 Explorer.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
HIRE SOA FOR DEC_2021.exeExplorer.EXEmsiexec.exedescription pid process target process PID 1956 wrote to memory of 1196 1956 HIRE SOA FOR DEC_2021.exe HIRE SOA FOR DEC_2021.exe PID 1956 wrote to memory of 1196 1956 HIRE SOA FOR DEC_2021.exe HIRE SOA FOR DEC_2021.exe PID 1956 wrote to memory of 1196 1956 HIRE SOA FOR DEC_2021.exe HIRE SOA FOR DEC_2021.exe PID 1956 wrote to memory of 1196 1956 HIRE SOA FOR DEC_2021.exe HIRE SOA FOR DEC_2021.exe PID 1956 wrote to memory of 1196 1956 HIRE SOA FOR DEC_2021.exe HIRE SOA FOR DEC_2021.exe PID 1956 wrote to memory of 1196 1956 HIRE SOA FOR DEC_2021.exe HIRE SOA FOR DEC_2021.exe PID 1956 wrote to memory of 1196 1956 HIRE SOA FOR DEC_2021.exe HIRE SOA FOR DEC_2021.exe PID 1424 wrote to memory of 988 1424 Explorer.EXE msiexec.exe PID 1424 wrote to memory of 988 1424 Explorer.EXE msiexec.exe PID 1424 wrote to memory of 988 1424 Explorer.EXE msiexec.exe PID 1424 wrote to memory of 988 1424 Explorer.EXE msiexec.exe PID 1424 wrote to memory of 988 1424 Explorer.EXE msiexec.exe PID 1424 wrote to memory of 988 1424 Explorer.EXE msiexec.exe PID 1424 wrote to memory of 988 1424 Explorer.EXE msiexec.exe PID 988 wrote to memory of 1920 988 msiexec.exe cmd.exe PID 988 wrote to memory of 1920 988 msiexec.exe cmd.exe PID 988 wrote to memory of 1920 988 msiexec.exe cmd.exe PID 988 wrote to memory of 1920 988 msiexec.exe cmd.exe PID 1424 wrote to memory of 1744 1424 Explorer.EXE NOTEPAD.EXE PID 1424 wrote to memory of 1744 1424 Explorer.EXE NOTEPAD.EXE PID 1424 wrote to memory of 1744 1424 Explorer.EXE NOTEPAD.EXE PID 1424 wrote to memory of 1432 1424 Explorer.EXE NOTEPAD.EXE PID 1424 wrote to memory of 1432 1424 Explorer.EXE NOTEPAD.EXE PID 1424 wrote to memory of 1432 1424 Explorer.EXE NOTEPAD.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\HIRE SOA FOR DEC_2021.exe"C:\Users\Admin\AppData\Local\Temp\HIRE SOA FOR DEC_2021.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\HIRE SOA FOR DEC_2021.exe"C:\Users\Admin\AppData\Local\Temp\HIRE SOA FOR DEC_2021.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"2⤵
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\HIRE SOA FOR DEC_2021.exe"3⤵
- Deletes itself
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\nmdcx8dorpuxth4.txt2⤵
- Opens file in notepad (likely ransom note)
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\ab.txt2⤵
- Opens file in notepad (likely ransom note)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\ab.txtMD5
e66b15aa06214e6d88ecf31208bf636b
SHA14ecd3fbcd14c48bbee63d8b73de26ce2c5c4fc42
SHA256cb56d5562dfc52d2a9c672b2000e434d9b4ba5b63e679fc76018c86d4328e68a
SHA512555bda57ea973ba918337d61ee159fc64b7528708309a4a8130c90eca9a92d418fdfbd1ab7f7927daf8bfb2a56ae14318da351a63d1b85d7df1a1017ec5d04b7
-
C:\Users\Admin\AppData\Local\Temp\nmdcx8dorpuxth4MD5
19a6d15c584c7ced29c4be7b6e5c8310
SHA1cbe7a6a76aa53eb978275231e80552b9c7150d6d
SHA25626d815e0d2f66777dd1ed59fac4fda402951e67b530183ef7f16e0a87e440607
SHA51293ad0baf26dc907821cc3df6eab9b0293213efb9a9c8646dcba80c2aebb06a70d0a4e175fb907a8cae38707e96fc6552805b33f8766124c74595896e85813912
-
C:\Users\Admin\AppData\Local\Temp\nmdcx8dorpuxth4.txtMD5
19a6d15c584c7ced29c4be7b6e5c8310
SHA1cbe7a6a76aa53eb978275231e80552b9c7150d6d
SHA25626d815e0d2f66777dd1ed59fac4fda402951e67b530183ef7f16e0a87e440607
SHA51293ad0baf26dc907821cc3df6eab9b0293213efb9a9c8646dcba80c2aebb06a70d0a4e175fb907a8cae38707e96fc6552805b33f8766124c74595896e85813912
-
C:\Users\Admin\AppData\Local\Temp\yyyvokmbMD5
e66b15aa06214e6d88ecf31208bf636b
SHA14ecd3fbcd14c48bbee63d8b73de26ce2c5c4fc42
SHA256cb56d5562dfc52d2a9c672b2000e434d9b4ba5b63e679fc76018c86d4328e68a
SHA512555bda57ea973ba918337d61ee159fc64b7528708309a4a8130c90eca9a92d418fdfbd1ab7f7927daf8bfb2a56ae14318da351a63d1b85d7df1a1017ec5d04b7
-
\Users\Admin\AppData\Local\Temp\nsd5BD.tmp\sdxajjgxerh.dllMD5
0bccdbf53def482e16174cd6488e0ced
SHA1b33612410abdbc5644292052c943ef5cc21f73a2
SHA256da9cdfe0680a235bc1ef297eaa6cf5723f34b95a043700e8ace1bd8c24ce974c
SHA51268b4d0fe21b58486fc07b53f57b75fe509e858fafdd79b300dfb93e521cb2400693a3f18ae8ad941bfddca88fa6941abf0b83d373ca7da8c530254d8e9905846
-
memory/676-56-0x000007FEFBE11000-0x000007FEFBE13000-memory.dmpFilesize
8KB
-
memory/988-71-0x00000000023A0000-0x00000000026A3000-memory.dmpFilesize
3.0MB
-
memory/988-72-0x0000000000C20000-0x0000000000CB0000-memory.dmpFilesize
576KB
-
memory/988-70-0x00000000000F0000-0x0000000000119000-memory.dmpFilesize
164KB
-
memory/988-69-0x0000000000F80000-0x0000000000F94000-memory.dmpFilesize
80KB
-
memory/1196-60-0x00000000008B0000-0x0000000000BB3000-memory.dmpFilesize
3.0MB
-
memory/1196-66-0x00000000004C0000-0x00000000004D1000-memory.dmpFilesize
68KB
-
memory/1196-61-0x0000000000480000-0x0000000000491000-memory.dmpFilesize
68KB
-
memory/1196-63-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1196-58-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1424-67-0x0000000007DB0000-0x0000000007EBE000-memory.dmpFilesize
1.1MB
-
memory/1424-62-0x0000000007B00000-0x0000000007C31000-memory.dmpFilesize
1.2MB
-
memory/1424-73-0x0000000007DB0000-0x0000000009106000-memory.dmpFilesize
19.3MB
-
memory/1956-54-0x0000000075431000-0x0000000075433000-memory.dmpFilesize
8KB
-
memory/1956-57-0x00000000003E0000-0x00000000003E2000-memory.dmpFilesize
8KB