Analysis
-
max time kernel
4294221s -
max time network
174s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
16-03-2022 07:28
Static task
static1
Behavioral task
behavioral1
Sample
Demande de prix.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
Demande de prix.exe
Resource
win10v2004-en-20220113
General
-
Target
Demande de prix.exe
-
Size
333KB
-
MD5
72c876e6f764bb1928d1f62c909b7c67
-
SHA1
2b75b06f02c650a06ed9ba9db90f3e7348d0b8be
-
SHA256
92ab8821f6c4eedc8bec6abee96520514061e32b772831dc3ecb8e71f8f7bcb3
-
SHA512
3e4a8b38bf5de65deca31259338fa3e2e4287b3f3ec7558e7ea7da59835289c5d286ab9e1a74bec4399b287a94908e58f5d62700ca056fa6702e6af824958b59
Malware Config
Extracted
xloader
2.5
cbgo
santesha.com
britneysbeautybar.com
sh-cy17.com
jeffcarveragency.com
3117111.com
sobrehosting.net
ddm123.xyz
toxcompliance.com
auditorydesigns.com
vliftfacial.com
ielhii.com
naameliss.com
ritualchariot.com
solchange.com
quatre-vingts.design
lawnmowermashine.com
braceletsstore.net
admappy.com
tollivercoltd.com
vaidix.com
rodrigomartinsadv.com
bouncingskull.com
hamiltonhellerrealestate.com
dream-kidz.com
growupnotgrowold.com
clanginandbangin.com
cornerstone-constructions.com
mcdonalds-delivery.xyz
omnikro.com
nca-group.com
hughers3.com
move-mobius.com
shrivs.com
hoshikuzu-hegemony.com
zpwx17.online
masoncable.com
butecreditunion.com
creativefolksnetwork.xyz
lejanet.com
tacticalslings.club
bestprodutos.com
quirkysoul39.com
sdettest.com
aomendc.xyz
lorticepttoyof6.xyz
nonvaxrnpositions.com
maintainaviation.com
kubanitka.com
fractalmerch.xyz
elbowguru.com
nikiyang.com
cialisactivesupers.com
bestofrochester.info
ynov-rennes.com
saiden8164.com
ffuster.com
papierle.com
dobsonfryedentist.com
rufisquoisedetransit.com
compassionatecuddling.com
kimlady.com
mashinchand.com
semicivilization.com
milamixecommerce.com
ambassadorandceoclub.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/956-61-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/956-65-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1384-75-0x0000000000120000-0x0000000000149000-memory.dmp xloader -
Executes dropped EXE 2 IoCs
Processes:
dsaxa.exedsaxa.exepid process 1652 dsaxa.exe 956 dsaxa.exe -
Loads dropped DLL 2 IoCs
Processes:
Demande de prix.exedsaxa.exepid process 1556 Demande de prix.exe 1652 dsaxa.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
dsaxa.exedsaxa.exeraserver.exedescription pid process target process PID 1652 set thread context of 956 1652 dsaxa.exe dsaxa.exe PID 956 set thread context of 1352 956 dsaxa.exe Explorer.EXE PID 956 set thread context of 1352 956 dsaxa.exe Explorer.EXE PID 1384 set thread context of 1352 1384 raserver.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
dsaxa.exeraserver.exepid process 956 dsaxa.exe 956 dsaxa.exe 956 dsaxa.exe 1384 raserver.exe 1384 raserver.exe 1384 raserver.exe 1384 raserver.exe 1384 raserver.exe 1384 raserver.exe 1384 raserver.exe 1384 raserver.exe 1384 raserver.exe 1384 raserver.exe 1384 raserver.exe 1384 raserver.exe 1384 raserver.exe 1384 raserver.exe 1384 raserver.exe 1384 raserver.exe 1384 raserver.exe 1384 raserver.exe 1384 raserver.exe 1384 raserver.exe 1384 raserver.exe 1384 raserver.exe 1384 raserver.exe 1384 raserver.exe 1384 raserver.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1352 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
dsaxa.exeraserver.exepid process 956 dsaxa.exe 956 dsaxa.exe 956 dsaxa.exe 956 dsaxa.exe 1384 raserver.exe 1384 raserver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
dsaxa.exeraserver.exedescription pid process Token: SeDebugPrivilege 956 dsaxa.exe Token: SeDebugPrivilege 1384 raserver.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1352 Explorer.EXE 1352 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1352 Explorer.EXE 1352 Explorer.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
Demande de prix.exedsaxa.exeExplorer.EXEraserver.exedescription pid process target process PID 1556 wrote to memory of 1652 1556 Demande de prix.exe dsaxa.exe PID 1556 wrote to memory of 1652 1556 Demande de prix.exe dsaxa.exe PID 1556 wrote to memory of 1652 1556 Demande de prix.exe dsaxa.exe PID 1556 wrote to memory of 1652 1556 Demande de prix.exe dsaxa.exe PID 1652 wrote to memory of 956 1652 dsaxa.exe dsaxa.exe PID 1652 wrote to memory of 956 1652 dsaxa.exe dsaxa.exe PID 1652 wrote to memory of 956 1652 dsaxa.exe dsaxa.exe PID 1652 wrote to memory of 956 1652 dsaxa.exe dsaxa.exe PID 1652 wrote to memory of 956 1652 dsaxa.exe dsaxa.exe PID 1652 wrote to memory of 956 1652 dsaxa.exe dsaxa.exe PID 1652 wrote to memory of 956 1652 dsaxa.exe dsaxa.exe PID 1352 wrote to memory of 1384 1352 Explorer.EXE raserver.exe PID 1352 wrote to memory of 1384 1352 Explorer.EXE raserver.exe PID 1352 wrote to memory of 1384 1352 Explorer.EXE raserver.exe PID 1352 wrote to memory of 1384 1352 Explorer.EXE raserver.exe PID 1384 wrote to memory of 1956 1384 raserver.exe cmd.exe PID 1384 wrote to memory of 1956 1384 raserver.exe cmd.exe PID 1384 wrote to memory of 1956 1384 raserver.exe cmd.exe PID 1384 wrote to memory of 1956 1384 raserver.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Demande de prix.exe"C:\Users\Admin\AppData\Local\Temp\Demande de prix.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\dsaxa.exeC:\Users\Admin\AppData\Local\Temp\dsaxa.exe C:\Users\Admin\AppData\Local\Temp\txhqogil3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\dsaxa.exeC:\Users\Admin\AppData\Local\Temp\dsaxa.exe C:\Users\Admin\AppData\Local\Temp\txhqogil4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\dsaxa.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\dsaxa.exeMD5
78f766ad7d7e23faecf6384147dcfae9
SHA107894888023bd1e068e45641c7b12fa4a1cc9376
SHA256a3976abc44f16aa53b33e27ec429889a09e7200ed15b29966dc29990fdf1f74b
SHA512788cadacfff3ba1290a3c34f038820b6e9163a1a0f5a9dc7ae6bbbdf02dc76051aa3d12a3007f36483eba2af4c90da2a7ef2a7b188bbed22e0431e0784fd29e1
-
C:\Users\Admin\AppData\Local\Temp\dsaxa.exeMD5
78f766ad7d7e23faecf6384147dcfae9
SHA107894888023bd1e068e45641c7b12fa4a1cc9376
SHA256a3976abc44f16aa53b33e27ec429889a09e7200ed15b29966dc29990fdf1f74b
SHA512788cadacfff3ba1290a3c34f038820b6e9163a1a0f5a9dc7ae6bbbdf02dc76051aa3d12a3007f36483eba2af4c90da2a7ef2a7b188bbed22e0431e0784fd29e1
-
C:\Users\Admin\AppData\Local\Temp\dsaxa.exeMD5
78f766ad7d7e23faecf6384147dcfae9
SHA107894888023bd1e068e45641c7b12fa4a1cc9376
SHA256a3976abc44f16aa53b33e27ec429889a09e7200ed15b29966dc29990fdf1f74b
SHA512788cadacfff3ba1290a3c34f038820b6e9163a1a0f5a9dc7ae6bbbdf02dc76051aa3d12a3007f36483eba2af4c90da2a7ef2a7b188bbed22e0431e0784fd29e1
-
C:\Users\Admin\AppData\Local\Temp\f2dtluw9kxtMD5
ca3b8fc9e538982f07ed1f80e567fa38
SHA1f682686846ca013708621f7a018305efbb221269
SHA2560bfaaf2fbcb9678a6cef0ff2e633d0df158e3739595ea8d7f2b2ebb0f48f4565
SHA512d59408f31fec70a481b88046ecdf89abadece69b129f1dd0d6d7f05c8cf3fbd5ae13d161e482a9ddce44815d445e2ea44a5efb58c134e51bb5a76f454cea0ac5
-
C:\Users\Admin\AppData\Local\Temp\txhqogilMD5
728e31cf245db7ed3c805595387f8906
SHA1655133d8295a0f090fd8bf3841c5688fb32d0858
SHA256966ddea35f8e384affe2ebcd373221a10454af54d1806f451259893abe416065
SHA5127a15637736432ab615f1893475f3e89ee3fbf8991bb5e5df8c36f401439788f2daf56705d0c67308cb27156af2dfb7a54744ec25ee97adeb948fa80de6ecf5cb
-
\Users\Admin\AppData\Local\Temp\dsaxa.exeMD5
78f766ad7d7e23faecf6384147dcfae9
SHA107894888023bd1e068e45641c7b12fa4a1cc9376
SHA256a3976abc44f16aa53b33e27ec429889a09e7200ed15b29966dc29990fdf1f74b
SHA512788cadacfff3ba1290a3c34f038820b6e9163a1a0f5a9dc7ae6bbbdf02dc76051aa3d12a3007f36483eba2af4c90da2a7ef2a7b188bbed22e0431e0784fd29e1
-
\Users\Admin\AppData\Local\Temp\dsaxa.exeMD5
78f766ad7d7e23faecf6384147dcfae9
SHA107894888023bd1e068e45641c7b12fa4a1cc9376
SHA256a3976abc44f16aa53b33e27ec429889a09e7200ed15b29966dc29990fdf1f74b
SHA512788cadacfff3ba1290a3c34f038820b6e9163a1a0f5a9dc7ae6bbbdf02dc76051aa3d12a3007f36483eba2af4c90da2a7ef2a7b188bbed22e0431e0784fd29e1
-
memory/956-65-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/956-71-0x00000000003A0000-0x00000000003B1000-memory.dmpFilesize
68KB
-
memory/956-64-0x0000000000920000-0x0000000000C23000-memory.dmpFilesize
3.0MB
-
memory/956-70-0x000000000041D000-0x000000000041E000-memory.dmpFilesize
4KB
-
memory/956-67-0x00000000000E0000-0x00000000000F1000-memory.dmpFilesize
68KB
-
memory/956-66-0x000000000041D000-0x000000000041E000-memory.dmpFilesize
4KB
-
memory/956-61-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1352-68-0x0000000006620000-0x0000000006745000-memory.dmpFilesize
1.1MB
-
memory/1352-72-0x00000000070D0000-0x0000000007269000-memory.dmpFilesize
1.6MB
-
memory/1352-78-0x00000000046F0000-0x00000000047EE000-memory.dmpFilesize
1016KB
-
memory/1384-75-0x0000000000120000-0x0000000000149000-memory.dmpFilesize
164KB
-
memory/1384-74-0x0000000000910000-0x000000000092C000-memory.dmpFilesize
112KB
-
memory/1384-76-0x0000000002000000-0x0000000002303000-memory.dmpFilesize
3.0MB
-
memory/1384-77-0x0000000001D30000-0x0000000001DC0000-memory.dmpFilesize
576KB
-
memory/1556-54-0x00000000757E1000-0x00000000757E3000-memory.dmpFilesize
8KB