Analysis
-
max time kernel
4294208s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
25-02-2022 08:03
Static task
static1
Behavioral task
behavioral1
Sample
INV21029.exe
Resource
win7-20220223-en
General
-
Target
INV21029.exe
-
Size
577KB
-
MD5
740dd9c14dea0b98df6ad434abfe789e
-
SHA1
cbec4d898e68c12fb7dcaddb17d0aca16e8e0e7b
-
SHA256
35295675b2fbd8ff9900336325e3324270f083705fd0cf51f4ef28763430cdd6
-
SHA512
66041e42091e83889a6da93c4242a01a0a3122774dc2db8baf909fb0ec6b0d6e847183ac92a24f2ca99f99de7dd4abddddda4a908887f354e3a333202bc0a66e
Malware Config
Extracted
xloader
2.5
ahc8
192451.com
wwwripostes.net
sirikhalsalaw.com
bitterbaybay.com
stella-scrubs.com
almanecermezcal.com
goodgood.online
translate-now.online
sincerefilm.com
quadrantforensics.com
johnfrenchart.com
plick-click.com
alnileen.com
tghi.xyz
172711.com
maymakita.com
punnyaseva.com
ukash-online.com
sho-yururi-blog.com
hebergement-solidaire.com
civicinfluencers.net
gzhf8888.com
kuleallstar.com
palisadeslodgecondos.com
holyhirschsprungs.com
azalearoseuk.com
jaggllc.com
italianrofrow.xyz
ioewur.xyz
3a5hlv.icu
kitcycle.com
estate.xyz
ankaraescortvip.xyz
richclubsite2001.xyz
kastore.website
515pleasantvalleyway.com
sittlermd.com
mytemple.group
tiny-wagen.com
sharaleesvintageflames.com
mentalesteem.com
sport-newss.online
fbve.space
lovingtruebloodindallas.com
eaglehospitality.biz
roofrepairnow.info
mcrosfts-updata.digital
cimpactinc.com
greatnotleyeast.com
lovely-tics.com
douglas-enterprise.com
dayannalima.online
ksodl.com
rainbowlampro.com
theinteriorsfurniture.com
eidmueller.email
cg020.online
gta6fuzhu.com
cinemaocity.com
hopeitivity.com
savageequipment.biz
groceriesbazaar.com
hempgotas.com
casino-pharaon-play.xyz
ralfrassendnk-login.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/268-62-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/780-70-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Executes dropped EXE 2 IoCs
Processes:
reqbqonire.exereqbqonire.exepid process 952 reqbqonire.exe 268 reqbqonire.exe -
Loads dropped DLL 2 IoCs
Processes:
INV21029.exereqbqonire.exepid process 1144 INV21029.exe 952 reqbqonire.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
reqbqonire.exereqbqonire.exewlanext.exedescription pid process target process PID 952 set thread context of 268 952 reqbqonire.exe reqbqonire.exe PID 268 set thread context of 1368 268 reqbqonire.exe Explorer.EXE PID 780 set thread context of 1368 780 wlanext.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
reqbqonire.exewlanext.exepid process 268 reqbqonire.exe 268 reqbqonire.exe 780 wlanext.exe 780 wlanext.exe 780 wlanext.exe 780 wlanext.exe 780 wlanext.exe 780 wlanext.exe 780 wlanext.exe 780 wlanext.exe 780 wlanext.exe 780 wlanext.exe 780 wlanext.exe 780 wlanext.exe 780 wlanext.exe 780 wlanext.exe 780 wlanext.exe 780 wlanext.exe 780 wlanext.exe 780 wlanext.exe 780 wlanext.exe 780 wlanext.exe 780 wlanext.exe 780 wlanext.exe 780 wlanext.exe 780 wlanext.exe 780 wlanext.exe 780 wlanext.exe 780 wlanext.exe 780 wlanext.exe 780 wlanext.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1368 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
reqbqonire.exewlanext.exepid process 268 reqbqonire.exe 268 reqbqonire.exe 268 reqbqonire.exe 780 wlanext.exe 780 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
reqbqonire.exewlanext.exedescription pid process Token: SeDebugPrivilege 268 reqbqonire.exe Token: SeDebugPrivilege 780 wlanext.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
INV21029.exereqbqonire.exeExplorer.EXEwlanext.exedescription pid process target process PID 1144 wrote to memory of 952 1144 INV21029.exe reqbqonire.exe PID 1144 wrote to memory of 952 1144 INV21029.exe reqbqonire.exe PID 1144 wrote to memory of 952 1144 INV21029.exe reqbqonire.exe PID 1144 wrote to memory of 952 1144 INV21029.exe reqbqonire.exe PID 952 wrote to memory of 268 952 reqbqonire.exe reqbqonire.exe PID 952 wrote to memory of 268 952 reqbqonire.exe reqbqonire.exe PID 952 wrote to memory of 268 952 reqbqonire.exe reqbqonire.exe PID 952 wrote to memory of 268 952 reqbqonire.exe reqbqonire.exe PID 952 wrote to memory of 268 952 reqbqonire.exe reqbqonire.exe PID 952 wrote to memory of 268 952 reqbqonire.exe reqbqonire.exe PID 952 wrote to memory of 268 952 reqbqonire.exe reqbqonire.exe PID 1368 wrote to memory of 780 1368 Explorer.EXE wlanext.exe PID 1368 wrote to memory of 780 1368 Explorer.EXE wlanext.exe PID 1368 wrote to memory of 780 1368 Explorer.EXE wlanext.exe PID 1368 wrote to memory of 780 1368 Explorer.EXE wlanext.exe PID 780 wrote to memory of 1384 780 wlanext.exe cmd.exe PID 780 wrote to memory of 1384 780 wlanext.exe cmd.exe PID 780 wrote to memory of 1384 780 wlanext.exe cmd.exe PID 780 wrote to memory of 1384 780 wlanext.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\INV21029.exe"C:\Users\Admin\AppData\Local\Temp\INV21029.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\reqbqonire.exeC:\Users\Admin\AppData\Local\Temp\reqbqonire.exe C:\Users\Admin\AppData\Local\Temp\truuumm3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\AppData\Local\Temp\reqbqonire.exeC:\Users\Admin\AppData\Local\Temp\reqbqonire.exe C:\Users\Admin\AppData\Local\Temp\truuumm4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:268
-
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\reqbqonire.exe"3⤵PID:1384
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
199f72b6103b1ad570f3a810d06c332a
SHA143b9341301394deec3c674cf98fc3c6cc629ee2b
SHA256a61bbd1659ba2338fe6e4df411d709834285b54991c403ba07bc9459af5320fc
SHA5120ce6be58193b0bcdccd003218597ce8f6bd0de35563c32d28c2e111903445f12ece5fa0a536dd2b79153b9c265c10a6ec17f8ef67b11edb95d155c0f502adeb5
-
MD5
b83e207b80ad38dccaf5b38b9a64cf97
SHA1a28cba27c256021902f8150d47ced82565bb8558
SHA25697658ad1a093a80ac9f16949b1971079bbdddc8cdd3515bb681b821203794741
SHA512190ee397a064ca8caf6e0625a79ab764d7bae84007790b2157804f9ae2f16454d430c17402b4d7df76ce5cdea24b3f56d2298c56a5a38215fd9a65fb8e68e0a6
-
MD5
b83e207b80ad38dccaf5b38b9a64cf97
SHA1a28cba27c256021902f8150d47ced82565bb8558
SHA25697658ad1a093a80ac9f16949b1971079bbdddc8cdd3515bb681b821203794741
SHA512190ee397a064ca8caf6e0625a79ab764d7bae84007790b2157804f9ae2f16454d430c17402b4d7df76ce5cdea24b3f56d2298c56a5a38215fd9a65fb8e68e0a6
-
MD5
b83e207b80ad38dccaf5b38b9a64cf97
SHA1a28cba27c256021902f8150d47ced82565bb8558
SHA25697658ad1a093a80ac9f16949b1971079bbdddc8cdd3515bb681b821203794741
SHA512190ee397a064ca8caf6e0625a79ab764d7bae84007790b2157804f9ae2f16454d430c17402b4d7df76ce5cdea24b3f56d2298c56a5a38215fd9a65fb8e68e0a6
-
MD5
0a99632c69bc8d3fe6231d0a50bff785
SHA1ad875f4428f17d0474be5ee8667158bd14d10f22
SHA2560a11eae20268581b0ad9c67defaf1a4dc4bf183ede922eca10c5da698eec8078
SHA51293905216a40975163edfcc94cf3c55c40a27e4cf7143d028ef6c5caead6ceaaa1504bd4c5a05d043d61be3df08991ea7e1e8c98cdfafd9d8744ccacdc5d7de2f
-
MD5
b83e207b80ad38dccaf5b38b9a64cf97
SHA1a28cba27c256021902f8150d47ced82565bb8558
SHA25697658ad1a093a80ac9f16949b1971079bbdddc8cdd3515bb681b821203794741
SHA512190ee397a064ca8caf6e0625a79ab764d7bae84007790b2157804f9ae2f16454d430c17402b4d7df76ce5cdea24b3f56d2298c56a5a38215fd9a65fb8e68e0a6
-
MD5
b83e207b80ad38dccaf5b38b9a64cf97
SHA1a28cba27c256021902f8150d47ced82565bb8558
SHA25697658ad1a093a80ac9f16949b1971079bbdddc8cdd3515bb681b821203794741
SHA512190ee397a064ca8caf6e0625a79ab764d7bae84007790b2157804f9ae2f16454d430c17402b4d7df76ce5cdea24b3f56d2298c56a5a38215fd9a65fb8e68e0a6