Analysis
-
max time kernel
120s -
max time network
123s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
11-02-2022 18:54
Static task
static1
Behavioral task
behavioral1
Sample
80e8a8b687288ebb5907d23754a2237c337a1b5f9c30f275190663f0462919b1.exe
Resource
win7-en-20211208
General
-
Target
80e8a8b687288ebb5907d23754a2237c337a1b5f9c30f275190663f0462919b1.exe
-
Size
275KB
-
MD5
8f4585f525382c4ff0fd67d9eea7cff8
-
SHA1
9365f326bfc24cba9347ed0b7935e3100c6ddce3
-
SHA256
80e8a8b687288ebb5907d23754a2237c337a1b5f9c30f275190663f0462919b1
-
SHA512
3cc5e703c18019a472097724fab2979ff727fe2dfc705df48aff00fd227b510a35285003784b8538b116234868853c5dbbfafc2263001b1d1135d4820b3e8a8c
Malware Config
Extracted
xloader
2.5
gab7
mbb11.xyz
taishancable.com
karaoke-sega.com
mana-space.com
danielandkaela.com
ancorasports.com
magentaclass.com
tenloe045.xyz
colorbold.com
5starrentertainment.com
candgconstructiontx.com
664cqi.com
alexeykazakov.com
umrashed.space
thepowerof10.club
scotchwoodofficeworks.com
anelis.digital
label34.group
karimico.com
dogsforsaleinkenya.com
optamiaads.com
gobgamon.com
cfphin.com
parsian-shetab.com
lumensoycandles.com
rakyatnews.online
tiendasu.com
244.house
thecrazyfarm.com
ibotvideos.com
foxyreal.website
egeolabs.com
becu84ts.com
investorsank.com
sagekimgray.com
eco1tnpasumo5.xyz
jingtailan-china.com
covapa2.com
yijiaclcs.com
uni-mia.com
english-sports.info
thinkercleaningservice.com
doislot.xyz
studiosagesalon.com
xn--z4qv1cr56dk0k.group
greencrvn.com
kabloomevents.com
backgammondestinations.net
exploitporbrl.xyz
twoindividuals.com
innisfailcleaning.com
kontrolnb.com
pinaldrywall.com
boettcherlaw.com
nano-shred.com
arinatechnology.com
mfkplatinum.info
ddfddpistol.quest
scarpatostudiolegale.com
scatfilms.biz
investmentcomp.com
xemphimlatmat5.com
phsenterprises.com
accutitleagency.biz
i8news-be.website
Signatures
-
Xloader Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/648-56-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Loads dropped DLL 1 IoCs
Processes:
80e8a8b687288ebb5907d23754a2237c337a1b5f9c30f275190663f0462919b1.exepid process 1880 80e8a8b687288ebb5907d23754a2237c337a1b5f9c30f275190663f0462919b1.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
80e8a8b687288ebb5907d23754a2237c337a1b5f9c30f275190663f0462919b1.exedescription pid process target process PID 1880 set thread context of 648 1880 80e8a8b687288ebb5907d23754a2237c337a1b5f9c30f275190663f0462919b1.exe 80e8a8b687288ebb5907d23754a2237c337a1b5f9c30f275190663f0462919b1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
80e8a8b687288ebb5907d23754a2237c337a1b5f9c30f275190663f0462919b1.exepid process 648 80e8a8b687288ebb5907d23754a2237c337a1b5f9c30f275190663f0462919b1.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
80e8a8b687288ebb5907d23754a2237c337a1b5f9c30f275190663f0462919b1.exedescription pid process target process PID 1880 wrote to memory of 648 1880 80e8a8b687288ebb5907d23754a2237c337a1b5f9c30f275190663f0462919b1.exe 80e8a8b687288ebb5907d23754a2237c337a1b5f9c30f275190663f0462919b1.exe PID 1880 wrote to memory of 648 1880 80e8a8b687288ebb5907d23754a2237c337a1b5f9c30f275190663f0462919b1.exe 80e8a8b687288ebb5907d23754a2237c337a1b5f9c30f275190663f0462919b1.exe PID 1880 wrote to memory of 648 1880 80e8a8b687288ebb5907d23754a2237c337a1b5f9c30f275190663f0462919b1.exe 80e8a8b687288ebb5907d23754a2237c337a1b5f9c30f275190663f0462919b1.exe PID 1880 wrote to memory of 648 1880 80e8a8b687288ebb5907d23754a2237c337a1b5f9c30f275190663f0462919b1.exe 80e8a8b687288ebb5907d23754a2237c337a1b5f9c30f275190663f0462919b1.exe PID 1880 wrote to memory of 648 1880 80e8a8b687288ebb5907d23754a2237c337a1b5f9c30f275190663f0462919b1.exe 80e8a8b687288ebb5907d23754a2237c337a1b5f9c30f275190663f0462919b1.exe PID 1880 wrote to memory of 648 1880 80e8a8b687288ebb5907d23754a2237c337a1b5f9c30f275190663f0462919b1.exe 80e8a8b687288ebb5907d23754a2237c337a1b5f9c30f275190663f0462919b1.exe PID 1880 wrote to memory of 648 1880 80e8a8b687288ebb5907d23754a2237c337a1b5f9c30f275190663f0462919b1.exe 80e8a8b687288ebb5907d23754a2237c337a1b5f9c30f275190663f0462919b1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\80e8a8b687288ebb5907d23754a2237c337a1b5f9c30f275190663f0462919b1.exe"C:\Users\Admin\AppData\Local\Temp\80e8a8b687288ebb5907d23754a2237c337a1b5f9c30f275190663f0462919b1.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\80e8a8b687288ebb5907d23754a2237c337a1b5f9c30f275190663f0462919b1.exe"C:\Users\Admin\AppData\Local\Temp\80e8a8b687288ebb5907d23754a2237c337a1b5f9c30f275190663f0462919b1.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\nsyC998.tmp\pmwikjp.dllMD5
9989f6fd8fd15efc976e382b1b944d8e
SHA190e4a6bc3f826fa3ea704d3fce8fde145acef8b0
SHA2569ff95a61f7ce75673e231d756078303dd3ae8bae1b1119a9b6418c0ccc83b54a
SHA512c40f5734c2da461733b173d7ab57fee1b68c34d440aa84a5a24d63ac98bcd03e5bd47c70e621fdfa32aeb9958664d764c49766fced31845f28ca18d52883a880
-
memory/648-56-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/648-57-0x0000000000910000-0x0000000000C13000-memory.dmpFilesize
3.0MB
-
memory/1880-54-0x0000000075AB1000-0x0000000075AB3000-memory.dmpFilesize
8KB