Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
15-02-2022 17:16
Static task
static1
Behavioral task
behavioral1
Sample
SC221420.exe
Resource
win7-en-20211208
General
-
Target
SC221420.exe
-
Size
456KB
-
MD5
376f50bcc33f115ff257d0c05ac4ba1b
-
SHA1
6a81172d13f238b8ca60850870070ce8f3b20488
-
SHA256
0fcfde1ee285a35c722bfdd0b33f08771a26503d4bfc20541726456cf9351af1
-
SHA512
9bcce9e9dd2f2326f11b8a94867808404af9741e8e0dec59cf073a6eec666acfbb3eaaa26b6bb155060679937ee991048bf4ba3398bc53354c50dd9b61dae81c
Malware Config
Extracted
xloader
2.5
ahc8
192451.com
wwwripostes.net
sirikhalsalaw.com
bitterbaybay.com
stella-scrubs.com
almanecermezcal.com
goodgood.online
translate-now.online
sincerefilm.com
quadrantforensics.com
johnfrenchart.com
plick-click.com
alnileen.com
tghi.xyz
172711.com
maymakita.com
punnyaseva.com
ukash-online.com
sho-yururi-blog.com
hebergement-solidaire.com
civicinfluencers.net
gzhf8888.com
kuleallstar.com
palisadeslodgecondos.com
holyhirschsprungs.com
azalearoseuk.com
jaggllc.com
italianrofrow.xyz
ioewur.xyz
3a5hlv.icu
kitcycle.com
estate.xyz
ankaraescortvip.xyz
richclubsite2001.xyz
kastore.website
515pleasantvalleyway.com
sittlermd.com
mytemple.group
tiny-wagen.com
sharaleesvintageflames.com
mentalesteem.com
sport-newss.online
fbve.space
lovingtruebloodindallas.com
eaglehospitality.biz
roofrepairnow.info
mcrosfts-updata.digital
cimpactinc.com
greatnotleyeast.com
lovely-tics.com
douglas-enterprise.com
dayannalima.online
ksodl.com
rainbowlampro.com
theinteriorsfurniture.com
eidmueller.email
cg020.online
gta6fuzhu.com
cinemaocity.com
hopeitivity.com
savageequipment.biz
groceriesbazaar.com
hempgotas.com
casino-pharaon-play.xyz
ralfrassendnk-login.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1696-63-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1696-67-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/840-76-0x00000000000E0000-0x0000000000109000-memory.dmp xloader -
Executes dropped EXE 2 IoCs
Processes:
phlnztizg.exephlnztizg.exepid process 1312 phlnztizg.exe 1696 phlnztizg.exe -
Loads dropped DLL 3 IoCs
Processes:
SC221420.exephlnztizg.exepid process 1628 SC221420.exe 1628 SC221420.exe 1312 phlnztizg.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
phlnztizg.exephlnztizg.exechkdsk.exedescription pid process target process PID 1312 set thread context of 1696 1312 phlnztizg.exe phlnztizg.exe PID 1696 set thread context of 1384 1696 phlnztizg.exe Explorer.EXE PID 1696 set thread context of 1384 1696 phlnztizg.exe Explorer.EXE PID 840 set thread context of 1384 840 chkdsk.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
chkdsk.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
phlnztizg.exechkdsk.exepid process 1696 phlnztizg.exe 1696 phlnztizg.exe 1696 phlnztizg.exe 840 chkdsk.exe 840 chkdsk.exe 840 chkdsk.exe 840 chkdsk.exe 840 chkdsk.exe 840 chkdsk.exe 840 chkdsk.exe 840 chkdsk.exe 840 chkdsk.exe 840 chkdsk.exe 840 chkdsk.exe 840 chkdsk.exe 840 chkdsk.exe 840 chkdsk.exe 840 chkdsk.exe 840 chkdsk.exe 840 chkdsk.exe 840 chkdsk.exe 840 chkdsk.exe 840 chkdsk.exe 840 chkdsk.exe 840 chkdsk.exe 840 chkdsk.exe 840 chkdsk.exe 840 chkdsk.exe 840 chkdsk.exe 840 chkdsk.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1384 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
phlnztizg.exechkdsk.exepid process 1696 phlnztizg.exe 1696 phlnztizg.exe 1696 phlnztizg.exe 1696 phlnztizg.exe 840 chkdsk.exe 840 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
phlnztizg.exechkdsk.exedescription pid process Token: SeDebugPrivilege 1696 phlnztizg.exe Token: SeDebugPrivilege 840 chkdsk.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1384 Explorer.EXE 1384 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1384 Explorer.EXE 1384 Explorer.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
SC221420.exephlnztizg.exephlnztizg.exechkdsk.exedescription pid process target process PID 1628 wrote to memory of 1312 1628 SC221420.exe phlnztizg.exe PID 1628 wrote to memory of 1312 1628 SC221420.exe phlnztizg.exe PID 1628 wrote to memory of 1312 1628 SC221420.exe phlnztizg.exe PID 1628 wrote to memory of 1312 1628 SC221420.exe phlnztizg.exe PID 1312 wrote to memory of 1696 1312 phlnztizg.exe phlnztizg.exe PID 1312 wrote to memory of 1696 1312 phlnztizg.exe phlnztizg.exe PID 1312 wrote to memory of 1696 1312 phlnztizg.exe phlnztizg.exe PID 1312 wrote to memory of 1696 1312 phlnztizg.exe phlnztizg.exe PID 1312 wrote to memory of 1696 1312 phlnztizg.exe phlnztizg.exe PID 1312 wrote to memory of 1696 1312 phlnztizg.exe phlnztizg.exe PID 1312 wrote to memory of 1696 1312 phlnztizg.exe phlnztizg.exe PID 1696 wrote to memory of 840 1696 phlnztizg.exe chkdsk.exe PID 1696 wrote to memory of 840 1696 phlnztizg.exe chkdsk.exe PID 1696 wrote to memory of 840 1696 phlnztizg.exe chkdsk.exe PID 1696 wrote to memory of 840 1696 phlnztizg.exe chkdsk.exe PID 840 wrote to memory of 1092 840 chkdsk.exe cmd.exe PID 840 wrote to memory of 1092 840 chkdsk.exe cmd.exe PID 840 wrote to memory of 1092 840 chkdsk.exe cmd.exe PID 840 wrote to memory of 1092 840 chkdsk.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\SC221420.exe"C:\Users\Admin\AppData\Local\Temp\SC221420.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\phlnztizg.exeC:\Users\Admin\AppData\Local\Temp\phlnztizg.exe C:\Users\Admin\AppData\Local\Temp\bxqlkx3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\phlnztizg.exeC:\Users\Admin\AppData\Local\Temp\phlnztizg.exe C:\Users\Admin\AppData\Local\Temp\bxqlkx4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"5⤵
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\phlnztizg.exe"6⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\5i7piex8bs4jMD5
a52498c2a045ff0a0065ef878e1ffdfe
SHA123abc7ebc00bf80780a11dca2d25c46123046088
SHA25652a72dec9b196122f3008e8f314ca83546448cf48e47ce485398d52edc7c0861
SHA51225af0ff1d48e4c5d15f22f8d4770ff846dd711ea00a40255db094ebc7340df4ccd760e0654ca021c34d2f85e55b6770a720a01a0affcaa31530bdb28efb01dd7
-
C:\Users\Admin\AppData\Local\Temp\bxqlkxMD5
30efdc42eda73cb1c555eaf1484814f9
SHA14263d4d980c3e262615f9577d262d96dab3160bc
SHA25695fc7ef3394623fa4142d220c0b13d62d7e03f0ad23917167dc578eef688f848
SHA512a67b30b0a9c7660c973b02bb054a43dd113cba575519ed89c054215407f4f8e9c4326f3734a6af4a831b04f3c2ce8907aec6e5aae2f857218f84fc2920fc2459
-
C:\Users\Admin\AppData\Local\Temp\phlnztizg.exeMD5
f9082eb743fa0bf57bf91d97f5251a44
SHA10c58960df67a771c5a780ea0bf1adcbb3296710c
SHA256c9a316691f8285991d3baad24b188e103c7b9ded0744f91e9c636633f88dbb20
SHA51230ea6e7257b307c865ecfc0b823270c1c2ed1a6805bf97f0edd54a3d9ac8686764fd4fe3f1ce9c31aeef66ecaf913953e3c89c32cf25efe7c2cfc12b39724d62
-
C:\Users\Admin\AppData\Local\Temp\phlnztizg.exeMD5
f9082eb743fa0bf57bf91d97f5251a44
SHA10c58960df67a771c5a780ea0bf1adcbb3296710c
SHA256c9a316691f8285991d3baad24b188e103c7b9ded0744f91e9c636633f88dbb20
SHA51230ea6e7257b307c865ecfc0b823270c1c2ed1a6805bf97f0edd54a3d9ac8686764fd4fe3f1ce9c31aeef66ecaf913953e3c89c32cf25efe7c2cfc12b39724d62
-
C:\Users\Admin\AppData\Local\Temp\phlnztizg.exeMD5
f9082eb743fa0bf57bf91d97f5251a44
SHA10c58960df67a771c5a780ea0bf1adcbb3296710c
SHA256c9a316691f8285991d3baad24b188e103c7b9ded0744f91e9c636633f88dbb20
SHA51230ea6e7257b307c865ecfc0b823270c1c2ed1a6805bf97f0edd54a3d9ac8686764fd4fe3f1ce9c31aeef66ecaf913953e3c89c32cf25efe7c2cfc12b39724d62
-
\Users\Admin\AppData\Local\Temp\phlnztizg.exeMD5
f9082eb743fa0bf57bf91d97f5251a44
SHA10c58960df67a771c5a780ea0bf1adcbb3296710c
SHA256c9a316691f8285991d3baad24b188e103c7b9ded0744f91e9c636633f88dbb20
SHA51230ea6e7257b307c865ecfc0b823270c1c2ed1a6805bf97f0edd54a3d9ac8686764fd4fe3f1ce9c31aeef66ecaf913953e3c89c32cf25efe7c2cfc12b39724d62
-
\Users\Admin\AppData\Local\Temp\phlnztizg.exeMD5
f9082eb743fa0bf57bf91d97f5251a44
SHA10c58960df67a771c5a780ea0bf1adcbb3296710c
SHA256c9a316691f8285991d3baad24b188e103c7b9ded0744f91e9c636633f88dbb20
SHA51230ea6e7257b307c865ecfc0b823270c1c2ed1a6805bf97f0edd54a3d9ac8686764fd4fe3f1ce9c31aeef66ecaf913953e3c89c32cf25efe7c2cfc12b39724d62
-
\Users\Admin\AppData\Local\Temp\phlnztizg.exeMD5
f9082eb743fa0bf57bf91d97f5251a44
SHA10c58960df67a771c5a780ea0bf1adcbb3296710c
SHA256c9a316691f8285991d3baad24b188e103c7b9ded0744f91e9c636633f88dbb20
SHA51230ea6e7257b307c865ecfc0b823270c1c2ed1a6805bf97f0edd54a3d9ac8686764fd4fe3f1ce9c31aeef66ecaf913953e3c89c32cf25efe7c2cfc12b39724d62
-
memory/840-77-0x0000000002080000-0x0000000002383000-memory.dmpFilesize
3.0MB
-
memory/840-78-0x00000000005C0000-0x0000000000650000-memory.dmpFilesize
576KB
-
memory/840-76-0x00000000000E0000-0x0000000000109000-memory.dmpFilesize
164KB
-
memory/840-75-0x0000000000680000-0x0000000000687000-memory.dmpFilesize
28KB
-
memory/1384-79-0x00000000025C0000-0x0000000002682000-memory.dmpFilesize
776KB
-
memory/1384-74-0x0000000005090000-0x0000000005201000-memory.dmpFilesize
1.4MB
-
memory/1384-70-0x0000000006CE0000-0x0000000006E67000-memory.dmpFilesize
1.5MB
-
memory/1628-55-0x0000000075801000-0x0000000075803000-memory.dmpFilesize
8KB
-
memory/1696-67-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1696-73-0x0000000000380000-0x0000000000391000-memory.dmpFilesize
68KB
-
memory/1696-72-0x000000000041D000-0x000000000041E000-memory.dmpFilesize
4KB
-
memory/1696-69-0x0000000000340000-0x0000000000351000-memory.dmpFilesize
68KB
-
memory/1696-68-0x000000000041D000-0x000000000041E000-memory.dmpFilesize
4KB
-
memory/1696-66-0x0000000000740000-0x0000000000A43000-memory.dmpFilesize
3.0MB
-
memory/1696-63-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB