Analysis
-
max time kernel
156s -
max time network
158s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
28-01-2022 20:58
Static task
static1
Behavioral task
behavioral1
Sample
Halkbank_Ekstre_20220128_081138_756957 (1).exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Halkbank_Ekstre_20220128_081138_756957 (1).exe
Resource
win10-en-20211208
General
-
Target
Halkbank_Ekstre_20220128_081138_756957 (1).exe
-
Size
17KB
-
MD5
749aaf49615aa07edc9755541b213a4a
-
SHA1
8e856cae4e8d14c7d37f5d8342fc2d30acfede64
-
SHA256
d47bd2ff5d90d64d18485203e59a952e485a39f98e3d54258a578b13d9136ae7
-
SHA512
a3b731a35b418ab43efc8d09e2373bb659dc78fa8408fa6edc6da66d13e03f13228b6db22eab4a47be96a99c162c09d01565182e3684e61a0fa017e9c7b4f7b7
Malware Config
Extracted
xloader
2.5
po6r
jnhuichuangxin.com
mubashir.art
extol.design
doyyindh.xyz
milanoautoexperts.com
4thefringe.com
453511.com
sellathonautocredit.com
velgian.com
6672pk.com
wodeluzhou.com
sumiyoshiku-hizaita.xyz
imoveldeprimeira.com
dgjssp.com
endokc.com
side-clicks.com
cashndashfinancial.com
vanhemelryck.info
agamitrading.com
woofgang.xyz
atnetworkinc.com
malleshtekumatla.com
com-home.xyz
buildyourmtg.com
viairazur.xyz
drproteaches.com
amaznsavings.com
karencharlestonrealtor.com
bootstrategy.com
mimtgexpert.com
sebzvault.com
brtaclub.com
gicarellc.com
annehonorato.com
rafalgar.com
bergenyouthorchestra.com
entrevistasesenciales.com
thekneedoctors.com
grosseilemireal.estate
celestialdrone.art
bouwdrogerhurenvlaanderen.com
koppakart.com
irishykater.quest
blinglj.com
editorparmindersingh.com
klnhanced.quest
divinebehaviorsolutions.com
amprope.com
futuracart.com
ditrhub.com
eaoeducationprogramme.com
smartplumbing.services
revelandlaceevents.com
bikedh.xyz
pacificdevelopmentstudio.com
palisadesskivacation.com
happy-pets.xyz
killyourselfnigger.com
sonicdrillinginstitute.com
alibabascientific.com
sh-leming.com
aseelrealestate.com
lohmueller.gmbh
ngoccompany.com
healthonline.store
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
Halkbank_Ekstre_20220128_081138_756957 (1).exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe,\"C:\\Users\\Admin\\AppData\\Local\\verify.exe\"," Halkbank_Ekstre_20220128_081138_756957 (1).exe -
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/920-68-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1768-74-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Halkbank_Ekstre_20220128_081138_756957 (1).exeHalkbank_Ekstre_20220128_081138_756957 (1).execmmon32.exedescription pid process target process PID 828 set thread context of 920 828 Halkbank_Ekstre_20220128_081138_756957 (1).exe Halkbank_Ekstre_20220128_081138_756957 (1).exe PID 920 set thread context of 1380 920 Halkbank_Ekstre_20220128_081138_756957 (1).exe Explorer.EXE PID 1768 set thread context of 1380 1768 cmmon32.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
powershell.exeHalkbank_Ekstre_20220128_081138_756957 (1).exeHalkbank_Ekstre_20220128_081138_756957 (1).execmmon32.exepid process 708 powershell.exe 828 Halkbank_Ekstre_20220128_081138_756957 (1).exe 828 Halkbank_Ekstre_20220128_081138_756957 (1).exe 828 Halkbank_Ekstre_20220128_081138_756957 (1).exe 920 Halkbank_Ekstre_20220128_081138_756957 (1).exe 920 Halkbank_Ekstre_20220128_081138_756957 (1).exe 1768 cmmon32.exe 1768 cmmon32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Halkbank_Ekstre_20220128_081138_756957 (1).execmmon32.exepid process 920 Halkbank_Ekstre_20220128_081138_756957 (1).exe 920 Halkbank_Ekstre_20220128_081138_756957 (1).exe 920 Halkbank_Ekstre_20220128_081138_756957 (1).exe 1768 cmmon32.exe 1768 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
powershell.exeHalkbank_Ekstre_20220128_081138_756957 (1).exeHalkbank_Ekstre_20220128_081138_756957 (1).execmmon32.exedescription pid process Token: SeDebugPrivilege 708 powershell.exe Token: SeDebugPrivilege 828 Halkbank_Ekstre_20220128_081138_756957 (1).exe Token: SeDebugPrivilege 920 Halkbank_Ekstre_20220128_081138_756957 (1).exe Token: SeDebugPrivilege 1768 cmmon32.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
Halkbank_Ekstre_20220128_081138_756957 (1).exeExplorer.EXEdescription pid process target process PID 828 wrote to memory of 708 828 Halkbank_Ekstre_20220128_081138_756957 (1).exe powershell.exe PID 828 wrote to memory of 708 828 Halkbank_Ekstre_20220128_081138_756957 (1).exe powershell.exe PID 828 wrote to memory of 708 828 Halkbank_Ekstre_20220128_081138_756957 (1).exe powershell.exe PID 828 wrote to memory of 708 828 Halkbank_Ekstre_20220128_081138_756957 (1).exe powershell.exe PID 828 wrote to memory of 1828 828 Halkbank_Ekstre_20220128_081138_756957 (1).exe Halkbank_Ekstre_20220128_081138_756957 (1).exe PID 828 wrote to memory of 1828 828 Halkbank_Ekstre_20220128_081138_756957 (1).exe Halkbank_Ekstre_20220128_081138_756957 (1).exe PID 828 wrote to memory of 1828 828 Halkbank_Ekstre_20220128_081138_756957 (1).exe Halkbank_Ekstre_20220128_081138_756957 (1).exe PID 828 wrote to memory of 1828 828 Halkbank_Ekstre_20220128_081138_756957 (1).exe Halkbank_Ekstre_20220128_081138_756957 (1).exe PID 828 wrote to memory of 920 828 Halkbank_Ekstre_20220128_081138_756957 (1).exe Halkbank_Ekstre_20220128_081138_756957 (1).exe PID 828 wrote to memory of 920 828 Halkbank_Ekstre_20220128_081138_756957 (1).exe Halkbank_Ekstre_20220128_081138_756957 (1).exe PID 828 wrote to memory of 920 828 Halkbank_Ekstre_20220128_081138_756957 (1).exe Halkbank_Ekstre_20220128_081138_756957 (1).exe PID 828 wrote to memory of 920 828 Halkbank_Ekstre_20220128_081138_756957 (1).exe Halkbank_Ekstre_20220128_081138_756957 (1).exe PID 828 wrote to memory of 920 828 Halkbank_Ekstre_20220128_081138_756957 (1).exe Halkbank_Ekstre_20220128_081138_756957 (1).exe PID 828 wrote to memory of 920 828 Halkbank_Ekstre_20220128_081138_756957 (1).exe Halkbank_Ekstre_20220128_081138_756957 (1).exe PID 828 wrote to memory of 920 828 Halkbank_Ekstre_20220128_081138_756957 (1).exe Halkbank_Ekstre_20220128_081138_756957 (1).exe PID 1380 wrote to memory of 1768 1380 Explorer.EXE cmmon32.exe PID 1380 wrote to memory of 1768 1380 Explorer.EXE cmmon32.exe PID 1380 wrote to memory of 1768 1380 Explorer.EXE cmmon32.exe PID 1380 wrote to memory of 1768 1380 Explorer.EXE cmmon32.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Halkbank_Ekstre_20220128_081138_756957 (1).exe"C:\Users\Admin\AppData\Local\Temp\Halkbank_Ekstre_20220128_081138_756957 (1).exe"2⤵
- Modifies WinLogon for persistence
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc WwBUAGgAcgBlAGEAZABpAG4AZwAuAFQAaAByAGUAYQBkAF0AOgA6AFMAbABlAGUAcAAoADIAMAAwADAAMAApAA==3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\Halkbank_Ekstre_20220128_081138_756957 (1).exe"C:\Users\Admin\AppData\Local\Temp\Halkbank_Ekstre_20220128_081138_756957 (1).exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\Halkbank_Ekstre_20220128_081138_756957 (1).exe"C:\Users\Admin\AppData\Local\Temp\Halkbank_Ekstre_20220128_081138_756957 (1).exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/708-60-0x0000000002410000-0x000000000305A000-memory.dmpFilesize
12.3MB
-
memory/708-61-0x0000000002410000-0x000000000305A000-memory.dmpFilesize
12.3MB
-
memory/828-55-0x0000000000DD0000-0x0000000000DDA000-memory.dmpFilesize
40KB
-
memory/828-56-0x0000000075D61000-0x0000000075D63000-memory.dmpFilesize
8KB
-
memory/828-62-0x00000000022B0000-0x00000000022B1000-memory.dmpFilesize
4KB
-
memory/828-63-0x00000000055B0000-0x000000000563E000-memory.dmpFilesize
568KB
-
memory/828-64-0x0000000004A50000-0x0000000004A98000-memory.dmpFilesize
288KB
-
memory/828-65-0x0000000004C50000-0x0000000004C9C000-memory.dmpFilesize
304KB
-
memory/920-66-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/920-67-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/920-68-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/920-70-0x00000000009C0000-0x0000000000CC3000-memory.dmpFilesize
3.0MB
-
memory/920-71-0x0000000000180000-0x0000000000191000-memory.dmpFilesize
68KB
-
memory/1380-72-0x0000000007370000-0x00000000074CA000-memory.dmpFilesize
1.4MB
-
memory/1380-77-0x0000000004170000-0x000000000421A000-memory.dmpFilesize
680KB
-
memory/1768-73-0x00000000008F0000-0x00000000008FD000-memory.dmpFilesize
52KB
-
memory/1768-74-0x0000000000080000-0x00000000000A9000-memory.dmpFilesize
164KB
-
memory/1768-75-0x0000000002020000-0x0000000002323000-memory.dmpFilesize
3.0MB
-
memory/1768-76-0x0000000000560000-0x00000000005F0000-memory.dmpFilesize
576KB