Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
31-01-2022 10:38
Static task
static1
General
-
Target
11d9365302786fe34113c070a9e6ed32a7209c8de10eb21ef8d4a8eeb1215d41.exe
-
Size
782KB
-
MD5
076b5c48111ac20de4e6f72cfa3393f1
-
SHA1
06439b289cdfdd08164d4bed0c7f6f2d92d8c769
-
SHA256
11d9365302786fe34113c070a9e6ed32a7209c8de10eb21ef8d4a8eeb1215d41
-
SHA512
a7da7825eb785b0fa31979af5c1bf9010f18cbf7f61b6b0dfc9ef9dae845d345b2df47f53a07dae012d5c33f3f890ece2473477faf33ef59aeeddaba28c18b2b
Malware Config
Extracted
xloader
2.5
nt3f
tricyclee.com
kxsw999.com
wisteria-pavilion.com
bellaclancy.com
promissioskincare.com
hzy001.xyz
checkouthomehd.com
soladere.com
point4sales.com
socalmafia.com
libertadysarmiento.online
nftthirty.com
digitalgoldcryptostock.net
tulekiloscaird.com
austinfishandchicken.com
wlxxch.com
mgav51.xyz
landbanking.global
saprove.com
babyfaces.skin
elainemaxwellcoaching.com
1388xc.com
juveniscloud.com
bsauksjon.com
the-waterkooler.com
comment-changer-sa-vie.com
psmcnd.top
rhodesleadingedge.com
mccuelawfirm.com
skinnscience.club
hype-clicks.com
liaojinc.xyz
okmakers.com
ramblertour.online
wickedhunterworld.com
fit-threads.com
cookidoo.website
magentabin.com
pynch1.com
best-paper-to-know-today.info
allmight.net
monicraftsprintables.com
avataroasis.com
10dian-4.com
cozastore.net
capitalcased.com
spacezanome.xyz
feiyangmi.com
11opus.com
getinteriorsolution.com
tidyhutstore.com
amazingpomskyfamily.com
tfcvintage.com
halfanape.com
rotakb.com
martinasfood.com
the-thanks.com
mithilmehta.com
em-photo.art
primerepro.com
lankasirinspa.com
gtbaibang.com
zealandiatobacco.com
deepikatransportpackers.com
eagle-meter.com
Signatures
-
Xloader Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2032-127-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
11d9365302786fe34113c070a9e6ed32a7209c8de10eb21ef8d4a8eeb1215d41.exedescription pid process target process PID 2500 set thread context of 2032 2500 11d9365302786fe34113c070a9e6ed32a7209c8de10eb21ef8d4a8eeb1215d41.exe 11d9365302786fe34113c070a9e6ed32a7209c8de10eb21ef8d4a8eeb1215d41.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
powershell.exe11d9365302786fe34113c070a9e6ed32a7209c8de10eb21ef8d4a8eeb1215d41.exepid process 3544 powershell.exe 2032 11d9365302786fe34113c070a9e6ed32a7209c8de10eb21ef8d4a8eeb1215d41.exe 2032 11d9365302786fe34113c070a9e6ed32a7209c8de10eb21ef8d4a8eeb1215d41.exe 3544 powershell.exe 3544 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 3544 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
11d9365302786fe34113c070a9e6ed32a7209c8de10eb21ef8d4a8eeb1215d41.exedescription pid process target process PID 2500 wrote to memory of 3544 2500 11d9365302786fe34113c070a9e6ed32a7209c8de10eb21ef8d4a8eeb1215d41.exe powershell.exe PID 2500 wrote to memory of 3544 2500 11d9365302786fe34113c070a9e6ed32a7209c8de10eb21ef8d4a8eeb1215d41.exe powershell.exe PID 2500 wrote to memory of 3544 2500 11d9365302786fe34113c070a9e6ed32a7209c8de10eb21ef8d4a8eeb1215d41.exe powershell.exe PID 2500 wrote to memory of 2920 2500 11d9365302786fe34113c070a9e6ed32a7209c8de10eb21ef8d4a8eeb1215d41.exe schtasks.exe PID 2500 wrote to memory of 2920 2500 11d9365302786fe34113c070a9e6ed32a7209c8de10eb21ef8d4a8eeb1215d41.exe schtasks.exe PID 2500 wrote to memory of 2920 2500 11d9365302786fe34113c070a9e6ed32a7209c8de10eb21ef8d4a8eeb1215d41.exe schtasks.exe PID 2500 wrote to memory of 2032 2500 11d9365302786fe34113c070a9e6ed32a7209c8de10eb21ef8d4a8eeb1215d41.exe 11d9365302786fe34113c070a9e6ed32a7209c8de10eb21ef8d4a8eeb1215d41.exe PID 2500 wrote to memory of 2032 2500 11d9365302786fe34113c070a9e6ed32a7209c8de10eb21ef8d4a8eeb1215d41.exe 11d9365302786fe34113c070a9e6ed32a7209c8de10eb21ef8d4a8eeb1215d41.exe PID 2500 wrote to memory of 2032 2500 11d9365302786fe34113c070a9e6ed32a7209c8de10eb21ef8d4a8eeb1215d41.exe 11d9365302786fe34113c070a9e6ed32a7209c8de10eb21ef8d4a8eeb1215d41.exe PID 2500 wrote to memory of 2032 2500 11d9365302786fe34113c070a9e6ed32a7209c8de10eb21ef8d4a8eeb1215d41.exe 11d9365302786fe34113c070a9e6ed32a7209c8de10eb21ef8d4a8eeb1215d41.exe PID 2500 wrote to memory of 2032 2500 11d9365302786fe34113c070a9e6ed32a7209c8de10eb21ef8d4a8eeb1215d41.exe 11d9365302786fe34113c070a9e6ed32a7209c8de10eb21ef8d4a8eeb1215d41.exe PID 2500 wrote to memory of 2032 2500 11d9365302786fe34113c070a9e6ed32a7209c8de10eb21ef8d4a8eeb1215d41.exe 11d9365302786fe34113c070a9e6ed32a7209c8de10eb21ef8d4a8eeb1215d41.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\11d9365302786fe34113c070a9e6ed32a7209c8de10eb21ef8d4a8eeb1215d41.exe"C:\Users\Admin\AppData\Local\Temp\11d9365302786fe34113c070a9e6ed32a7209c8de10eb21ef8d4a8eeb1215d41.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ubRPPGAHBbheAf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ubRPPGAHBbheAf" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5792.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\11d9365302786fe34113c070a9e6ed32a7209c8de10eb21ef8d4a8eeb1215d41.exe"C:\Users\Admin\AppData\Local\Temp\11d9365302786fe34113c070a9e6ed32a7209c8de10eb21ef8d4a8eeb1215d41.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp5792.tmpMD5
9cce8df4371b5ec3462445dc611fd267
SHA1efef4c5d204328b57457a5a25ba6d74611e6ffc0
SHA2569ee7210d1971f9c247aeb0e4673d5b49a0d8a575fed60c7b981f1de55a91e558
SHA512dce980db7325b72b6e5c37fde031e68a9b97fd85d952d02048f3fae0f5cab0b7c7f25b28be4dd854add40dbb0ededee8f13084b1863b87c2c6ceb1a7df7c7fbd
-
memory/2032-135-0x00000000017D0000-0x0000000001AF0000-memory.dmpFilesize
3.1MB
-
memory/2032-127-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2500-115-0x0000000000230000-0x00000000002FC000-memory.dmpFilesize
816KB
-
memory/2500-116-0x0000000005150000-0x000000000564E000-memory.dmpFilesize
5.0MB
-
memory/2500-117-0x0000000004CF0000-0x0000000004D82000-memory.dmpFilesize
584KB
-
memory/2500-118-0x0000000004BC0000-0x0000000004C30000-memory.dmpFilesize
448KB
-
memory/2500-119-0x0000000004C90000-0x0000000004C9A000-memory.dmpFilesize
40KB
-
memory/2500-120-0x0000000007320000-0x000000000732C000-memory.dmpFilesize
48KB
-
memory/2500-121-0x0000000007650000-0x00000000076EC000-memory.dmpFilesize
624KB
-
memory/2500-122-0x0000000007900000-0x000000000795E000-memory.dmpFilesize
376KB
-
memory/3544-131-0x0000000007780000-0x00000000077A2000-memory.dmpFilesize
136KB
-
memory/3544-137-0x0000000008B40000-0x0000000008B8B000-memory.dmpFilesize
300KB
-
memory/3544-130-0x0000000007252000-0x0000000007253000-memory.dmpFilesize
4KB
-
memory/3544-128-0x0000000007890000-0x0000000007EB8000-memory.dmpFilesize
6.2MB
-
memory/3544-132-0x0000000007F70000-0x0000000007FD6000-memory.dmpFilesize
408KB
-
memory/3544-133-0x0000000007FE0000-0x0000000008046000-memory.dmpFilesize
408KB
-
memory/3544-126-0x0000000004DF0000-0x0000000004E26000-memory.dmpFilesize
216KB
-
memory/3544-134-0x0000000008290000-0x00000000085E0000-memory.dmpFilesize
3.3MB
-
memory/3544-136-0x00000000080B0000-0x00000000080CC000-memory.dmpFilesize
112KB
-
memory/3544-129-0x0000000007250000-0x0000000007251000-memory.dmpFilesize
4KB
-
memory/3544-138-0x0000000008890000-0x0000000008906000-memory.dmpFilesize
472KB
-
memory/3544-147-0x00000000097C0000-0x00000000097F3000-memory.dmpFilesize
204KB
-
memory/3544-148-0x00000000097A0000-0x00000000097BE000-memory.dmpFilesize
120KB
-
memory/3544-153-0x0000000009B00000-0x0000000009BA5000-memory.dmpFilesize
660KB
-
memory/3544-154-0x0000000009CE0000-0x0000000009D74000-memory.dmpFilesize
592KB
-
memory/3544-223-0x000000007ECA0000-0x000000007ECA1000-memory.dmpFilesize
4KB
-
memory/3544-224-0x0000000007253000-0x0000000007254000-memory.dmpFilesize
4KB
-
memory/3544-349-0x0000000009C70000-0x0000000009C8A000-memory.dmpFilesize
104KB
-
memory/3544-354-0x0000000009C60000-0x0000000009C68000-memory.dmpFilesize
32KB