Analysis
-
max time kernel
4294208s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
23-02-2022 14:15
Static task
static1
Behavioral task
behavioral1
Sample
RECEIPT REF NO 002627262.exe
Resource
win7-20220223-en
General
-
Target
RECEIPT REF NO 002627262.exe
-
Size
302KB
-
MD5
5d333987aafbd8bf8df57e9b9e56b4ac
-
SHA1
c7bc50b60c4b20e1bf40eed679def38e46c0fb13
-
SHA256
3353fe4567105c292bdae27525448f7d7a5d0b174e097355ff04e75057dd63f3
-
SHA512
38eccdd1bd52da95835c8305257aa0b548a7582d04a87f2c06e82365cf00fdd699cb6ecc46b40146a658b9f4efae562141d809ad7b05ddfebc5d694b6417e517
Malware Config
Extracted
xloader
2.5
rmfg
prospectcompounding.com
grand-prix.voyage
solvingpklogc.xyz
eliamhome.com
gamevip88.club
arsels.info
dswlt.com
dchehe.com
lawyerjerusalem.com
pbnseo.xyz
apuryifuid.com
kiukiupoker88.net
leannonimpact.com
kare-furniture.com
mississaugaremax.online
zpyh198.com
dueplay.store
naimi.ltd
greenstepspodiatry.com
cewirtanen.com
stonebyparamount.com
stellenbargains.com
meyerranch.realty
bitcoingrab.com
ifjejijfe.xyz
drjeannerot.com
trgau.com
thailandland.land
satupena.info
coinzillo.com
cloudreveller.digital
wilsoncreekarts.com
hyalucaps.com
dempius.com
onycostopsale.com
54jjpygl.xyz
quick2repair.net
tpyrj.com
cyndeiversondesigns.com
lmandarin.com
bornholm-urlaub.info
rodictibey.quest
saiione.com
flydakhla.com
surveycourses.com
bestnico.space
huvao.com
uptownholding.com
elitesellerstrafficnet.com
zitzies.xyz
supermercadolonuestro.com
laptoppricenepal.com
navyantra.com
myjms315.com
loanswithbrian.net
birbeygrup.xyz
trend-marketing.club
meipassion.com
amtha.com
witlyza.com
boardsandbeamsdecor.com
c2batwpnmu5uvtvnvfk5916.com
yavuzselimorganizasyon.com
4580055.xyz
brimstrategy.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1804-63-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1804-66-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/660-73-0x0000000000100000-0x0000000000129000-memory.dmp xloader -
Executes dropped EXE 2 IoCs
Processes:
wpxizwm.exewpxizwm.exepid process 1868 wpxizwm.exe 1804 wpxizwm.exe -
Loads dropped DLL 2 IoCs
Processes:
RECEIPT REF NO 002627262.exewpxizwm.exepid process 1048 RECEIPT REF NO 002627262.exe 1868 wpxizwm.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
wpxizwm.exewpxizwm.execolorcpl.exedescription pid process target process PID 1868 set thread context of 1804 1868 wpxizwm.exe wpxizwm.exe PID 1804 set thread context of 1220 1804 wpxizwm.exe Explorer.EXE PID 660 set thread context of 1220 660 colorcpl.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
wpxizwm.execolorcpl.exepid process 1804 wpxizwm.exe 1804 wpxizwm.exe 660 colorcpl.exe 660 colorcpl.exe 660 colorcpl.exe 660 colorcpl.exe 660 colorcpl.exe 660 colorcpl.exe 660 colorcpl.exe 660 colorcpl.exe 660 colorcpl.exe 660 colorcpl.exe 660 colorcpl.exe 660 colorcpl.exe 660 colorcpl.exe 660 colorcpl.exe 660 colorcpl.exe 660 colorcpl.exe 660 colorcpl.exe 660 colorcpl.exe 660 colorcpl.exe 660 colorcpl.exe 660 colorcpl.exe 660 colorcpl.exe 660 colorcpl.exe 660 colorcpl.exe 660 colorcpl.exe 660 colorcpl.exe 660 colorcpl.exe 660 colorcpl.exe 660 colorcpl.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1220 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
wpxizwm.execolorcpl.exepid process 1804 wpxizwm.exe 1804 wpxizwm.exe 1804 wpxizwm.exe 660 colorcpl.exe 660 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
wpxizwm.execolorcpl.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 1804 wpxizwm.exe Token: SeDebugPrivilege 660 colorcpl.exe Token: SeShutdownPrivilege 1220 Explorer.EXE Token: SeShutdownPrivilege 1220 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1220 Explorer.EXE 1220 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1220 Explorer.EXE 1220 Explorer.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
RECEIPT REF NO 002627262.exewpxizwm.exeExplorer.EXEcolorcpl.exedescription pid process target process PID 1048 wrote to memory of 1868 1048 RECEIPT REF NO 002627262.exe wpxizwm.exe PID 1048 wrote to memory of 1868 1048 RECEIPT REF NO 002627262.exe wpxizwm.exe PID 1048 wrote to memory of 1868 1048 RECEIPT REF NO 002627262.exe wpxizwm.exe PID 1048 wrote to memory of 1868 1048 RECEIPT REF NO 002627262.exe wpxizwm.exe PID 1868 wrote to memory of 1804 1868 wpxizwm.exe wpxizwm.exe PID 1868 wrote to memory of 1804 1868 wpxizwm.exe wpxizwm.exe PID 1868 wrote to memory of 1804 1868 wpxizwm.exe wpxizwm.exe PID 1868 wrote to memory of 1804 1868 wpxizwm.exe wpxizwm.exe PID 1868 wrote to memory of 1804 1868 wpxizwm.exe wpxizwm.exe PID 1868 wrote to memory of 1804 1868 wpxizwm.exe wpxizwm.exe PID 1868 wrote to memory of 1804 1868 wpxizwm.exe wpxizwm.exe PID 1220 wrote to memory of 660 1220 Explorer.EXE colorcpl.exe PID 1220 wrote to memory of 660 1220 Explorer.EXE colorcpl.exe PID 1220 wrote to memory of 660 1220 Explorer.EXE colorcpl.exe PID 1220 wrote to memory of 660 1220 Explorer.EXE colorcpl.exe PID 660 wrote to memory of 972 660 colorcpl.exe cmd.exe PID 660 wrote to memory of 972 660 colorcpl.exe cmd.exe PID 660 wrote to memory of 972 660 colorcpl.exe cmd.exe PID 660 wrote to memory of 972 660 colorcpl.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RECEIPT REF NO 002627262.exe"C:\Users\Admin\AppData\Local\Temp\RECEIPT REF NO 002627262.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\wpxizwm.exeC:\Users\Admin\AppData\Local\Temp\wpxizwm.exe C:\Users\Admin\AppData\Local\Temp\vdean3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\wpxizwm.exeC:\Users\Admin\AppData\Local\Temp\wpxizwm.exe C:\Users\Admin\AppData\Local\Temp\vdean4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\wpxizwm.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\vdeanMD5
a04faf63da2fbfb5679e41d04140939e
SHA1b8d6dbb0f2fafdeeead79c0cd62326cda95a8785
SHA256c6144a6b0af2eaaa5b1226448b012740bcad08bc401a4f697d755b571c066a7c
SHA512cd98d5fc8708992769cd7d792c3bd09624983e548e949a9844677f58ddf51c5f2cd479b2e05ae734054d8633f6cddf0127165c54903fec897a86bdef1ce7a866
-
C:\Users\Admin\AppData\Local\Temp\wpxizwm.exeMD5
05f07e533e418df0521a64d9af400daf
SHA143408653ea6d815bc7acb11a1328982c5e61aff8
SHA2569371dfe491756a047f8617103536db01dfcf8a4dfac1530f598b0a6cb5981abd
SHA51254ed026848c0b96a5c6a62629990bf0a6661502bf12e8b3a5fdd68a8678d956bb49bbccc5abc47a722043ff79d7db15844236e28d7a5ad2b150fb479eb4e974f
-
C:\Users\Admin\AppData\Local\Temp\wpxizwm.exeMD5
05f07e533e418df0521a64d9af400daf
SHA143408653ea6d815bc7acb11a1328982c5e61aff8
SHA2569371dfe491756a047f8617103536db01dfcf8a4dfac1530f598b0a6cb5981abd
SHA51254ed026848c0b96a5c6a62629990bf0a6661502bf12e8b3a5fdd68a8678d956bb49bbccc5abc47a722043ff79d7db15844236e28d7a5ad2b150fb479eb4e974f
-
C:\Users\Admin\AppData\Local\Temp\wpxizwm.exeMD5
05f07e533e418df0521a64d9af400daf
SHA143408653ea6d815bc7acb11a1328982c5e61aff8
SHA2569371dfe491756a047f8617103536db01dfcf8a4dfac1530f598b0a6cb5981abd
SHA51254ed026848c0b96a5c6a62629990bf0a6661502bf12e8b3a5fdd68a8678d956bb49bbccc5abc47a722043ff79d7db15844236e28d7a5ad2b150fb479eb4e974f
-
C:\Users\Admin\AppData\Local\Temp\xsyco49pmc4lMD5
945121f49321875af38fe7f12dd2343e
SHA1f2cf4c6a504815e362a18cce671b6c0b371629e1
SHA256ff66241def80707fe029fefa54441de9eb88028c5cc33f20ef080cf2e04254e5
SHA5121ca2a7f9c3e1c535514ebc9a5861c4f632a39354351e63a074081b864cd9592636781fe5714dad8472148ba1b5f0f41b104075556960aec73b3510f6ff3d6634
-
\Users\Admin\AppData\Local\Temp\wpxizwm.exeMD5
05f07e533e418df0521a64d9af400daf
SHA143408653ea6d815bc7acb11a1328982c5e61aff8
SHA2569371dfe491756a047f8617103536db01dfcf8a4dfac1530f598b0a6cb5981abd
SHA51254ed026848c0b96a5c6a62629990bf0a6661502bf12e8b3a5fdd68a8678d956bb49bbccc5abc47a722043ff79d7db15844236e28d7a5ad2b150fb479eb4e974f
-
\Users\Admin\AppData\Local\Temp\wpxizwm.exeMD5
05f07e533e418df0521a64d9af400daf
SHA143408653ea6d815bc7acb11a1328982c5e61aff8
SHA2569371dfe491756a047f8617103536db01dfcf8a4dfac1530f598b0a6cb5981abd
SHA51254ed026848c0b96a5c6a62629990bf0a6661502bf12e8b3a5fdd68a8678d956bb49bbccc5abc47a722043ff79d7db15844236e28d7a5ad2b150fb479eb4e974f
-
memory/660-75-0x00000000008B0000-0x0000000000940000-memory.dmpFilesize
576KB
-
memory/660-74-0x0000000000A00000-0x0000000000D03000-memory.dmpFilesize
3.0MB
-
memory/660-73-0x0000000000100000-0x0000000000129000-memory.dmpFilesize
164KB
-
memory/660-72-0x0000000000F30000-0x0000000000F48000-memory.dmpFilesize
96KB
-
memory/1048-54-0x0000000074E61000-0x0000000074E63000-memory.dmpFilesize
8KB
-
memory/1220-76-0x0000000006380000-0x0000000006473000-memory.dmpFilesize
972KB
-
memory/1220-70-0x0000000005E70000-0x0000000005FEC000-memory.dmpFilesize
1.5MB
-
memory/1804-66-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1804-69-0x0000000000360000-0x0000000000371000-memory.dmpFilesize
68KB
-
memory/1804-68-0x000000000041D000-0x000000000041E000-memory.dmpFilesize
4KB
-
memory/1804-67-0x0000000000920000-0x0000000000C23000-memory.dmpFilesize
3.0MB
-
memory/1804-63-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1868-62-0x0000000000240000-0x0000000000242000-memory.dmpFilesize
8KB