Analysis
-
max time kernel
4294210s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
21-03-2022 12:38
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order.exe
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
Purchase Order.exe
Resource
win10v2004-en-20220113
General
-
Target
Purchase Order.exe
-
Size
300KB
-
MD5
4f330209cb5f706da6ac858c06f9ef48
-
SHA1
703aae256afa3bc08683f2332a06d5e11dd147aa
-
SHA256
704f63330e41ba5e17d5c0628e755ac3acd41392b43d72ed951900eaf78141cd
-
SHA512
9afcb75544d24690c604f72e83205ec83c5641af45018c91f058ced29224b40cf356125ef3d1663d3891373a35e132ff92903c14009234779c9960f4486f65f6
Malware Config
Extracted
xloader
2.5
noi6
sukiller.com
finistere.today
pipandelli.com
thegulfweek.com
piggoz.com
leofighters.com
hkako.com
rafipuff.store
gxzcgl.com
mayuracaps.com
merry-ux.com
classicalequestrianacademy.com
pancakesawp.club
theinspiredfutures.com
dunkadogllc.com
bklmkm.com
glow-fabric.com
b2bxcal.xyz
autostorageco.com
ellyandjessee.com
jltmediaholdings.com
projectmi.info
kyrecoverycafe.com
qxfhmcj.com
blushingandco.com
velocitydistrict.com
omklemcapron.quest
iojliif.com
alienrest.xyz
dalaapp.com
pyrfos.com
syuanen.com
tbr247.plus
warriorsouls.com
franksmobiletires.net
xccessorizeme.com
desfrallde.club
us-en-finance.com
gladonly.com
workingholiday5.com
stellascrubs.com
tobemi.com
seanse.info
parmetanilao.quest
trekhaakmontage.com
dieconnecterei.com
testdomain232345.com
jgkim-sa.com
nursesdock.com
sensinfo.art
thejaipurpublicschool.com
jyuken-dojo.com
experienceanewexceptional.com
michellehondainternational.com
ydanerrioscolon.com
dbcvj.com
officeofthefuture.life
claimchip.com
xn--he5b2j35bi2d87v.com
allancomputers.com
pjbyun.xyz
kraines3.com
929efem.com
family-legends.com
igconsultoria.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1888-62-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1888-66-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/840-72-0x00000000000C0000-0x00000000000E9000-memory.dmp xloader -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
colorcpl.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run colorcpl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\9R0DZLAXG = "C:\\Program Files (x86)\\Zaz7\\updateonuplpfp.exe" colorcpl.exe -
Executes dropped EXE 3 IoCs
Processes:
vtqaxtgmvh.exevtqaxtgmvh.exeupdateonuplpfp.exepid process 1656 vtqaxtgmvh.exe 1888 vtqaxtgmvh.exe 1312 updateonuplpfp.exe -
Loads dropped DLL 6 IoCs
Processes:
Purchase Order.exevtqaxtgmvh.exeWerFault.exepid process 1676 Purchase Order.exe 1656 vtqaxtgmvh.exe 976 WerFault.exe 976 WerFault.exe 976 WerFault.exe 976 WerFault.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
vtqaxtgmvh.exevtqaxtgmvh.execolorcpl.exedescription pid process target process PID 1656 set thread context of 1888 1656 vtqaxtgmvh.exe vtqaxtgmvh.exe PID 1888 set thread context of 1236 1888 vtqaxtgmvh.exe Explorer.EXE PID 840 set thread context of 1236 840 colorcpl.exe Explorer.EXE -
Drops file in Program Files directory 2 IoCs
Processes:
Explorer.EXEcolorcpl.exedescription ioc process File created C:\Program Files (x86)\Zaz7\updateonuplpfp.exe Explorer.EXE File opened for modification C:\Program Files (x86)\Zaz7\updateonuplpfp.exe colorcpl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 976 1312 WerFault.exe updateonuplpfp.exe -
Processes:
colorcpl.exedescription ioc process Key created \Registry\User\S-1-5-21-2932610838-281738825-1127631353-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 colorcpl.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
vtqaxtgmvh.execolorcpl.exepid process 1888 vtqaxtgmvh.exe 1888 vtqaxtgmvh.exe 840 colorcpl.exe 840 colorcpl.exe 840 colorcpl.exe 840 colorcpl.exe 840 colorcpl.exe 840 colorcpl.exe 840 colorcpl.exe 840 colorcpl.exe 840 colorcpl.exe 840 colorcpl.exe 840 colorcpl.exe 840 colorcpl.exe 840 colorcpl.exe 840 colorcpl.exe 840 colorcpl.exe 840 colorcpl.exe 840 colorcpl.exe 840 colorcpl.exe 840 colorcpl.exe 840 colorcpl.exe 840 colorcpl.exe 840 colorcpl.exe 840 colorcpl.exe 840 colorcpl.exe 840 colorcpl.exe 840 colorcpl.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1236 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
vtqaxtgmvh.execolorcpl.exepid process 1888 vtqaxtgmvh.exe 1888 vtqaxtgmvh.exe 1888 vtqaxtgmvh.exe 840 colorcpl.exe 840 colorcpl.exe 840 colorcpl.exe 840 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vtqaxtgmvh.execolorcpl.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 1888 vtqaxtgmvh.exe Token: SeDebugPrivilege 840 colorcpl.exe Token: SeShutdownPrivilege 1236 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1236 Explorer.EXE 1236 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1236 Explorer.EXE 1236 Explorer.EXE -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
Purchase Order.exevtqaxtgmvh.exeExplorer.EXEcolorcpl.exeupdateonuplpfp.exedescription pid process target process PID 1676 wrote to memory of 1656 1676 Purchase Order.exe vtqaxtgmvh.exe PID 1676 wrote to memory of 1656 1676 Purchase Order.exe vtqaxtgmvh.exe PID 1676 wrote to memory of 1656 1676 Purchase Order.exe vtqaxtgmvh.exe PID 1676 wrote to memory of 1656 1676 Purchase Order.exe vtqaxtgmvh.exe PID 1656 wrote to memory of 1888 1656 vtqaxtgmvh.exe vtqaxtgmvh.exe PID 1656 wrote to memory of 1888 1656 vtqaxtgmvh.exe vtqaxtgmvh.exe PID 1656 wrote to memory of 1888 1656 vtqaxtgmvh.exe vtqaxtgmvh.exe PID 1656 wrote to memory of 1888 1656 vtqaxtgmvh.exe vtqaxtgmvh.exe PID 1656 wrote to memory of 1888 1656 vtqaxtgmvh.exe vtqaxtgmvh.exe PID 1656 wrote to memory of 1888 1656 vtqaxtgmvh.exe vtqaxtgmvh.exe PID 1656 wrote to memory of 1888 1656 vtqaxtgmvh.exe vtqaxtgmvh.exe PID 1236 wrote to memory of 840 1236 Explorer.EXE colorcpl.exe PID 1236 wrote to memory of 840 1236 Explorer.EXE colorcpl.exe PID 1236 wrote to memory of 840 1236 Explorer.EXE colorcpl.exe PID 1236 wrote to memory of 840 1236 Explorer.EXE colorcpl.exe PID 840 wrote to memory of 1952 840 colorcpl.exe cmd.exe PID 840 wrote to memory of 1952 840 colorcpl.exe cmd.exe PID 840 wrote to memory of 1952 840 colorcpl.exe cmd.exe PID 840 wrote to memory of 1952 840 colorcpl.exe cmd.exe PID 1236 wrote to memory of 1312 1236 Explorer.EXE updateonuplpfp.exe PID 1236 wrote to memory of 1312 1236 Explorer.EXE updateonuplpfp.exe PID 1236 wrote to memory of 1312 1236 Explorer.EXE updateonuplpfp.exe PID 1236 wrote to memory of 1312 1236 Explorer.EXE updateonuplpfp.exe PID 1236 wrote to memory of 1312 1236 Explorer.EXE updateonuplpfp.exe PID 1236 wrote to memory of 1312 1236 Explorer.EXE updateonuplpfp.exe PID 1236 wrote to memory of 1312 1236 Explorer.EXE updateonuplpfp.exe PID 1312 wrote to memory of 976 1312 updateonuplpfp.exe WerFault.exe PID 1312 wrote to memory of 976 1312 updateonuplpfp.exe WerFault.exe PID 1312 wrote to memory of 976 1312 updateonuplpfp.exe WerFault.exe PID 1312 wrote to memory of 976 1312 updateonuplpfp.exe WerFault.exe PID 840 wrote to memory of 1076 840 colorcpl.exe Firefox.exe PID 840 wrote to memory of 1076 840 colorcpl.exe Firefox.exe PID 840 wrote to memory of 1076 840 colorcpl.exe Firefox.exe PID 840 wrote to memory of 1076 840 colorcpl.exe Firefox.exe PID 840 wrote to memory of 1076 840 colorcpl.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Drops file in Program Files directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\vtqaxtgmvh.exeC:\Users\Admin\AppData\Local\Temp\vtqaxtgmvh.exe C:\Users\Admin\AppData\Local\Temp\ewlckyqwr3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\vtqaxtgmvh.exeC:\Users\Admin\AppData\Local\Temp\vtqaxtgmvh.exe C:\Users\Admin\AppData\Local\Temp\ewlckyqwr4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Adds policy Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\vtqaxtgmvh.exe"3⤵
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵
-
C:\Program Files (x86)\Zaz7\updateonuplpfp.exe"C:\Program Files (x86)\Zaz7\updateonuplpfp.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1312 -s 2483⤵
- Loads dropped DLL
- Program crash
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Zaz7\updateonuplpfp.exeMD5
1025eaa76f6b53ffbdb40ac22bf661ad
SHA1ca8334ba4b0bcf0bbd9d4f983e1a6faf895f5316
SHA25631db194f19e97bfc4a1674e23ca0b35728a9f56fa91a87208e5bf545bce19dea
SHA5129b8c252215d878506c9b7b8597cbe75c62f413746c56e69332df337e712f8ff1b1c62b2166a629dcffef51734c387afe9185bdfce54e3fa6c628f7a4574a7a5c
-
C:\Program Files (x86)\Zaz7\updateonuplpfp.exeMD5
1025eaa76f6b53ffbdb40ac22bf661ad
SHA1ca8334ba4b0bcf0bbd9d4f983e1a6faf895f5316
SHA25631db194f19e97bfc4a1674e23ca0b35728a9f56fa91a87208e5bf545bce19dea
SHA5129b8c252215d878506c9b7b8597cbe75c62f413746c56e69332df337e712f8ff1b1c62b2166a629dcffef51734c387afe9185bdfce54e3fa6c628f7a4574a7a5c
-
C:\Users\Admin\AppData\Local\Temp\ewlckyqwrMD5
9ff62fb5ff9cc1db43014d8f97757ea1
SHA1ed19dd461e40e148b05517ad16a452b5bb343b8c
SHA25665876004185fce692dd7d8b3fc96709709016da8512620941c7258777a2f290e
SHA512eba309f68f8343a473a5456d3576f47e9e0b2bca700c7ec708f881a37b271d3b82105986b7e9d3f08a7ecd18815308ed101840e808ad8db4c9e8448d2e12bf7b
-
C:\Users\Admin\AppData\Local\Temp\sexe7r9y8uui17iMD5
9a5a4519770c2494374f8a5822872150
SHA15d8967df139a43366f255905d5f399a355446753
SHA256271c21840a10465c170c72233d38f2f7a5c6ba5a3db33be320a7524c6d85bc56
SHA512233dba3d3a9922afa3bd7ae2b341d19a6422fa39c6d50387a8b4c28201b773842dc22d2ce26d31f90e7f7278bbe02ce97424b3f6d845ea0ac2463fd95521bf02
-
C:\Users\Admin\AppData\Local\Temp\vtqaxtgmvh.exeMD5
1025eaa76f6b53ffbdb40ac22bf661ad
SHA1ca8334ba4b0bcf0bbd9d4f983e1a6faf895f5316
SHA25631db194f19e97bfc4a1674e23ca0b35728a9f56fa91a87208e5bf545bce19dea
SHA5129b8c252215d878506c9b7b8597cbe75c62f413746c56e69332df337e712f8ff1b1c62b2166a629dcffef51734c387afe9185bdfce54e3fa6c628f7a4574a7a5c
-
C:\Users\Admin\AppData\Local\Temp\vtqaxtgmvh.exeMD5
1025eaa76f6b53ffbdb40ac22bf661ad
SHA1ca8334ba4b0bcf0bbd9d4f983e1a6faf895f5316
SHA25631db194f19e97bfc4a1674e23ca0b35728a9f56fa91a87208e5bf545bce19dea
SHA5129b8c252215d878506c9b7b8597cbe75c62f413746c56e69332df337e712f8ff1b1c62b2166a629dcffef51734c387afe9185bdfce54e3fa6c628f7a4574a7a5c
-
C:\Users\Admin\AppData\Local\Temp\vtqaxtgmvh.exeMD5
1025eaa76f6b53ffbdb40ac22bf661ad
SHA1ca8334ba4b0bcf0bbd9d4f983e1a6faf895f5316
SHA25631db194f19e97bfc4a1674e23ca0b35728a9f56fa91a87208e5bf545bce19dea
SHA5129b8c252215d878506c9b7b8597cbe75c62f413746c56e69332df337e712f8ff1b1c62b2166a629dcffef51734c387afe9185bdfce54e3fa6c628f7a4574a7a5c
-
\Program Files (x86)\Zaz7\updateonuplpfp.exeMD5
1025eaa76f6b53ffbdb40ac22bf661ad
SHA1ca8334ba4b0bcf0bbd9d4f983e1a6faf895f5316
SHA25631db194f19e97bfc4a1674e23ca0b35728a9f56fa91a87208e5bf545bce19dea
SHA5129b8c252215d878506c9b7b8597cbe75c62f413746c56e69332df337e712f8ff1b1c62b2166a629dcffef51734c387afe9185bdfce54e3fa6c628f7a4574a7a5c
-
\Program Files (x86)\Zaz7\updateonuplpfp.exeMD5
1025eaa76f6b53ffbdb40ac22bf661ad
SHA1ca8334ba4b0bcf0bbd9d4f983e1a6faf895f5316
SHA25631db194f19e97bfc4a1674e23ca0b35728a9f56fa91a87208e5bf545bce19dea
SHA5129b8c252215d878506c9b7b8597cbe75c62f413746c56e69332df337e712f8ff1b1c62b2166a629dcffef51734c387afe9185bdfce54e3fa6c628f7a4574a7a5c
-
\Program Files (x86)\Zaz7\updateonuplpfp.exeMD5
1025eaa76f6b53ffbdb40ac22bf661ad
SHA1ca8334ba4b0bcf0bbd9d4f983e1a6faf895f5316
SHA25631db194f19e97bfc4a1674e23ca0b35728a9f56fa91a87208e5bf545bce19dea
SHA5129b8c252215d878506c9b7b8597cbe75c62f413746c56e69332df337e712f8ff1b1c62b2166a629dcffef51734c387afe9185bdfce54e3fa6c628f7a4574a7a5c
-
\Program Files (x86)\Zaz7\updateonuplpfp.exeMD5
1025eaa76f6b53ffbdb40ac22bf661ad
SHA1ca8334ba4b0bcf0bbd9d4f983e1a6faf895f5316
SHA25631db194f19e97bfc4a1674e23ca0b35728a9f56fa91a87208e5bf545bce19dea
SHA5129b8c252215d878506c9b7b8597cbe75c62f413746c56e69332df337e712f8ff1b1c62b2166a629dcffef51734c387afe9185bdfce54e3fa6c628f7a4574a7a5c
-
\Users\Admin\AppData\Local\Temp\vtqaxtgmvh.exeMD5
1025eaa76f6b53ffbdb40ac22bf661ad
SHA1ca8334ba4b0bcf0bbd9d4f983e1a6faf895f5316
SHA25631db194f19e97bfc4a1674e23ca0b35728a9f56fa91a87208e5bf545bce19dea
SHA5129b8c252215d878506c9b7b8597cbe75c62f413746c56e69332df337e712f8ff1b1c62b2166a629dcffef51734c387afe9185bdfce54e3fa6c628f7a4574a7a5c
-
\Users\Admin\AppData\Local\Temp\vtqaxtgmvh.exeMD5
1025eaa76f6b53ffbdb40ac22bf661ad
SHA1ca8334ba4b0bcf0bbd9d4f983e1a6faf895f5316
SHA25631db194f19e97bfc4a1674e23ca0b35728a9f56fa91a87208e5bf545bce19dea
SHA5129b8c252215d878506c9b7b8597cbe75c62f413746c56e69332df337e712f8ff1b1c62b2166a629dcffef51734c387afe9185bdfce54e3fa6c628f7a4574a7a5c
-
memory/840-74-0x0000000001E00000-0x0000000001E90000-memory.dmpFilesize
576KB
-
memory/840-71-0x00000000001E0000-0x00000000001F8000-memory.dmpFilesize
96KB
-
memory/840-72-0x00000000000C0000-0x00000000000E9000-memory.dmpFilesize
164KB
-
memory/840-73-0x0000000001EF0000-0x00000000021F3000-memory.dmpFilesize
3.0MB
-
memory/1236-75-0x0000000006B20000-0x0000000006CA6000-memory.dmpFilesize
1.5MB
-
memory/1236-69-0x0000000004A30000-0x0000000004B14000-memory.dmpFilesize
912KB
-
memory/1676-54-0x0000000075EA1000-0x0000000075EA3000-memory.dmpFilesize
8KB
-
memory/1888-68-0x0000000000290000-0x00000000002A1000-memory.dmpFilesize
68KB
-
memory/1888-67-0x000000000041D000-0x000000000041E000-memory.dmpFilesize
4KB
-
memory/1888-66-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1888-65-0x0000000000AE0000-0x0000000000DE3000-memory.dmpFilesize
3.0MB
-
memory/1888-62-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB