Analysis
-
max time kernel
4294211s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
22-03-2022 07:01
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220311-en
General
-
Target
tmp.exe
-
Size
274KB
-
MD5
16c4a16f7bd751b068e65d81ba2f64cd
-
SHA1
3cc2679cb6af197f177481f7708bed0eed93f458
-
SHA256
145f840479b9baa3431886abf20b30820f2cc5fe427c0d14390818c7e38ad3cd
-
SHA512
8675970aa4fc84e3fc6e9b84b7189e8077a372e15b01be22bfd52877e2e6c94d439e213271d2554f242182fc9052b9b98148876e31096467c778cc508cad006f
Malware Config
Extracted
xloader
2.5
ahc8
192451.com
wwwripostes.net
sirikhalsalaw.com
bitterbaybay.com
stella-scrubs.com
almanecermezcal.com
goodgood.online
translate-now.online
sincerefilm.com
quadrantforensics.com
johnfrenchart.com
plick-click.com
alnileen.com
tghi.xyz
172711.com
maymakita.com
punnyaseva.com
ukash-online.com
sho-yururi-blog.com
hebergement-solidaire.com
civicinfluencers.net
gzhf8888.com
kuleallstar.com
palisadeslodgecondos.com
holyhirschsprungs.com
azalearoseuk.com
jaggllc.com
italianrofrow.xyz
ioewur.xyz
3a5hlv.icu
kitcycle.com
estate.xyz
ankaraescortvip.xyz
richclubsite2001.xyz
kastore.website
515pleasantvalleyway.com
sittlermd.com
mytemple.group
tiny-wagen.com
sharaleesvintageflames.com
mentalesteem.com
sport-newss.online
fbve.space
lovingtruebloodindallas.com
eaglehospitality.biz
roofrepairnow.info
mcrosfts-updata.digital
cimpactinc.com
greatnotleyeast.com
lovely-tics.com
douglas-enterprise.com
dayannalima.online
ksodl.com
rainbowlampro.com
theinteriorsfurniture.com
eidmueller.email
cg020.online
gta6fuzhu.com
cinemaocity.com
hopeitivity.com
savageequipment.biz
groceriesbazaar.com
hempgotas.com
casino-pharaon-play.xyz
ralfrassendnk-login.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/468-64-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/468-67-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1304-72-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Executes dropped EXE 3 IoCs
Processes:
hsssany.exehsssany.exeigfxqlu.exepid process 308 hsssany.exe 468 hsssany.exe 1116 igfxqlu.exe -
Loads dropped DLL 3 IoCs
Processes:
tmp.exehsssany.exepid process 1832 tmp.exe 1832 tmp.exe 308 hsssany.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
cmmon32.exedescription ioc process Key created \Registry\Machine\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run cmmon32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LTXD9TK0WF5 = "C:\\Program Files (x86)\\K7nh8xz\\igfxqlu.exe" cmmon32.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
hsssany.exehsssany.execmmon32.exedescription pid process target process PID 308 set thread context of 468 308 hsssany.exe hsssany.exe PID 468 set thread context of 1420 468 hsssany.exe Explorer.EXE PID 1304 set thread context of 1420 1304 cmmon32.exe Explorer.EXE -
Drops file in Program Files directory 2 IoCs
Processes:
cmmon32.exeExplorer.EXEdescription ioc process File opened for modification C:\Program Files (x86)\K7nh8xz\igfxqlu.exe cmmon32.exe File created C:\Program Files (x86)\K7nh8xz\igfxqlu.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
cmmon32.exedescription ioc process Key created \Registry\User\S-1-5-21-2199625441-3471261906-229485034-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cmmon32.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
hsssany.execmmon32.exepid process 468 hsssany.exe 468 hsssany.exe 1304 cmmon32.exe 1304 cmmon32.exe 1304 cmmon32.exe 1304 cmmon32.exe 1304 cmmon32.exe 1304 cmmon32.exe 1304 cmmon32.exe 1304 cmmon32.exe 1304 cmmon32.exe 1304 cmmon32.exe 1304 cmmon32.exe 1304 cmmon32.exe 1304 cmmon32.exe 1304 cmmon32.exe 1304 cmmon32.exe 1304 cmmon32.exe 1304 cmmon32.exe 1304 cmmon32.exe 1304 cmmon32.exe 1304 cmmon32.exe 1304 cmmon32.exe 1304 cmmon32.exe 1304 cmmon32.exe 1304 cmmon32.exe 1304 cmmon32.exe 1304 cmmon32.exe 1304 cmmon32.exe 1304 cmmon32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1420 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
hsssany.execmmon32.exepid process 468 hsssany.exe 468 hsssany.exe 468 hsssany.exe 1304 cmmon32.exe 1304 cmmon32.exe 1304 cmmon32.exe 1304 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
hsssany.execmmon32.exedescription pid process Token: SeDebugPrivilege 468 hsssany.exe Token: SeDebugPrivilege 1304 cmmon32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1420 Explorer.EXE 1420 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1420 Explorer.EXE 1420 Explorer.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
tmp.exehsssany.exeExplorer.EXEcmmon32.exedescription pid process target process PID 1832 wrote to memory of 308 1832 tmp.exe hsssany.exe PID 1832 wrote to memory of 308 1832 tmp.exe hsssany.exe PID 1832 wrote to memory of 308 1832 tmp.exe hsssany.exe PID 1832 wrote to memory of 308 1832 tmp.exe hsssany.exe PID 308 wrote to memory of 468 308 hsssany.exe hsssany.exe PID 308 wrote to memory of 468 308 hsssany.exe hsssany.exe PID 308 wrote to memory of 468 308 hsssany.exe hsssany.exe PID 308 wrote to memory of 468 308 hsssany.exe hsssany.exe PID 308 wrote to memory of 468 308 hsssany.exe hsssany.exe PID 308 wrote to memory of 468 308 hsssany.exe hsssany.exe PID 308 wrote to memory of 468 308 hsssany.exe hsssany.exe PID 1420 wrote to memory of 1304 1420 Explorer.EXE cmmon32.exe PID 1420 wrote to memory of 1304 1420 Explorer.EXE cmmon32.exe PID 1420 wrote to memory of 1304 1420 Explorer.EXE cmmon32.exe PID 1420 wrote to memory of 1304 1420 Explorer.EXE cmmon32.exe PID 1304 wrote to memory of 1296 1304 cmmon32.exe cmd.exe PID 1304 wrote to memory of 1296 1304 cmmon32.exe cmd.exe PID 1304 wrote to memory of 1296 1304 cmmon32.exe cmd.exe PID 1304 wrote to memory of 1296 1304 cmmon32.exe cmd.exe PID 1304 wrote to memory of 1084 1304 cmmon32.exe Firefox.exe PID 1304 wrote to memory of 1084 1304 cmmon32.exe Firefox.exe PID 1304 wrote to memory of 1084 1304 cmmon32.exe Firefox.exe PID 1304 wrote to memory of 1084 1304 cmmon32.exe Firefox.exe PID 1420 wrote to memory of 1116 1420 Explorer.EXE igfxqlu.exe PID 1420 wrote to memory of 1116 1420 Explorer.EXE igfxqlu.exe PID 1420 wrote to memory of 1116 1420 Explorer.EXE igfxqlu.exe PID 1420 wrote to memory of 1116 1420 Explorer.EXE igfxqlu.exe PID 1304 wrote to memory of 1084 1304 cmmon32.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Drops file in Program Files directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\hsssany.exeC:\Users\Admin\AppData\Local\Temp\hsssany.exe C:\Users\Admin\AppData\Local\Temp\igjxkq3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\hsssany.exeC:\Users\Admin\AppData\Local\Temp\hsssany.exe C:\Users\Admin\AppData\Local\Temp\igjxkq4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\hsssany.exe"3⤵
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵
-
C:\Program Files (x86)\K7nh8xz\igfxqlu.exe"C:\Program Files (x86)\K7nh8xz\igfxqlu.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\K7nh8xz\igfxqlu.exeMD5
a25a388c0f8ab3779421f0747163c39b
SHA122267c3ea32c9ff6077cc8eccab8e9704a8cd3f2
SHA256f13565cdb210b49835f19fea5c535ae953c9e8a26ed7702b2fdf613a2c3e5959
SHA512807bffd3a312cac816f7dea888af7918c639ebaec25f2afb0f8afdb408ca4ffe06feead3e745bc46c8ca5a4e0ccb5f279ebe7a19c768ddcc839505b26a28ead2
-
C:\Program Files (x86)\K7nh8xz\igfxqlu.exeMD5
a25a388c0f8ab3779421f0747163c39b
SHA122267c3ea32c9ff6077cc8eccab8e9704a8cd3f2
SHA256f13565cdb210b49835f19fea5c535ae953c9e8a26ed7702b2fdf613a2c3e5959
SHA512807bffd3a312cac816f7dea888af7918c639ebaec25f2afb0f8afdb408ca4ffe06feead3e745bc46c8ca5a4e0ccb5f279ebe7a19c768ddcc839505b26a28ead2
-
C:\Users\Admin\AppData\Local\Temp\fki5xdwbhcbhpyMD5
7fb21510f14fd999145c37cb54d191de
SHA17ce318c80c798dfcc6a601d531f49ed95134e9ce
SHA256a20f4cce92d9bd4eb9c9e943514de908ea2ca9f666623c04de319dd7a7a67367
SHA512483b8cbab3e6bd316b290a7cc8f9ae5316d5f8d843e37a26ec628172a038454c557569729eb5cf1ca7731c8781580109a0c9c0f7d2a4c12012d716e2aa0d8e7d
-
C:\Users\Admin\AppData\Local\Temp\hsssany.exeMD5
a25a388c0f8ab3779421f0747163c39b
SHA122267c3ea32c9ff6077cc8eccab8e9704a8cd3f2
SHA256f13565cdb210b49835f19fea5c535ae953c9e8a26ed7702b2fdf613a2c3e5959
SHA512807bffd3a312cac816f7dea888af7918c639ebaec25f2afb0f8afdb408ca4ffe06feead3e745bc46c8ca5a4e0ccb5f279ebe7a19c768ddcc839505b26a28ead2
-
C:\Users\Admin\AppData\Local\Temp\hsssany.exeMD5
a25a388c0f8ab3779421f0747163c39b
SHA122267c3ea32c9ff6077cc8eccab8e9704a8cd3f2
SHA256f13565cdb210b49835f19fea5c535ae953c9e8a26ed7702b2fdf613a2c3e5959
SHA512807bffd3a312cac816f7dea888af7918c639ebaec25f2afb0f8afdb408ca4ffe06feead3e745bc46c8ca5a4e0ccb5f279ebe7a19c768ddcc839505b26a28ead2
-
C:\Users\Admin\AppData\Local\Temp\hsssany.exeMD5
a25a388c0f8ab3779421f0747163c39b
SHA122267c3ea32c9ff6077cc8eccab8e9704a8cd3f2
SHA256f13565cdb210b49835f19fea5c535ae953c9e8a26ed7702b2fdf613a2c3e5959
SHA512807bffd3a312cac816f7dea888af7918c639ebaec25f2afb0f8afdb408ca4ffe06feead3e745bc46c8ca5a4e0ccb5f279ebe7a19c768ddcc839505b26a28ead2
-
C:\Users\Admin\AppData\Local\Temp\igjxkqMD5
1169886f2881955b7e4af98a4d4251d6
SHA1ab0a023754e13727d7e76c7821da43667519c1aa
SHA256f0c6b182474ca01313269fb8f3a1e8aa82c2389ae1b0ee919ff710a34519f320
SHA51280a7794c370cee1babd3dde9e412cfdc4ab850a1654623e3a4fe5657e7ab88d4ae77efcbd15fa9560d405ff01a422a41d9e6569a508a9f8a8987c36fc479f314
-
\Users\Admin\AppData\Local\Temp\hsssany.exeMD5
a25a388c0f8ab3779421f0747163c39b
SHA122267c3ea32c9ff6077cc8eccab8e9704a8cd3f2
SHA256f13565cdb210b49835f19fea5c535ae953c9e8a26ed7702b2fdf613a2c3e5959
SHA512807bffd3a312cac816f7dea888af7918c639ebaec25f2afb0f8afdb408ca4ffe06feead3e745bc46c8ca5a4e0ccb5f279ebe7a19c768ddcc839505b26a28ead2
-
\Users\Admin\AppData\Local\Temp\hsssany.exeMD5
a25a388c0f8ab3779421f0747163c39b
SHA122267c3ea32c9ff6077cc8eccab8e9704a8cd3f2
SHA256f13565cdb210b49835f19fea5c535ae953c9e8a26ed7702b2fdf613a2c3e5959
SHA512807bffd3a312cac816f7dea888af7918c639ebaec25f2afb0f8afdb408ca4ffe06feead3e745bc46c8ca5a4e0ccb5f279ebe7a19c768ddcc839505b26a28ead2
-
\Users\Admin\AppData\Local\Temp\hsssany.exeMD5
a25a388c0f8ab3779421f0747163c39b
SHA122267c3ea32c9ff6077cc8eccab8e9704a8cd3f2
SHA256f13565cdb210b49835f19fea5c535ae953c9e8a26ed7702b2fdf613a2c3e5959
SHA512807bffd3a312cac816f7dea888af7918c639ebaec25f2afb0f8afdb408ca4ffe06feead3e745bc46c8ca5a4e0ccb5f279ebe7a19c768ddcc839505b26a28ead2
-
memory/308-61-0x0000000000220000-0x0000000000222000-memory.dmpFilesize
8KB
-
memory/468-68-0x0000000000820000-0x0000000000B23000-memory.dmpFilesize
3.0MB
-
memory/468-67-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/468-69-0x00000000002B0000-0x00000000002C1000-memory.dmpFilesize
68KB
-
memory/468-64-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1304-71-0x00000000008A0000-0x00000000008AD000-memory.dmpFilesize
52KB
-
memory/1304-72-0x0000000000080000-0x00000000000A9000-memory.dmpFilesize
164KB
-
memory/1304-73-0x0000000001E40000-0x0000000002143000-memory.dmpFilesize
3.0MB
-
memory/1304-74-0x0000000001CB0000-0x0000000001D40000-memory.dmpFilesize
576KB
-
memory/1420-70-0x00000000068E0000-0x0000000006A68000-memory.dmpFilesize
1.5MB
-
memory/1420-75-0x0000000004D50000-0x0000000004E87000-memory.dmpFilesize
1.2MB
-
memory/1832-54-0x00000000759B1000-0x00000000759B3000-memory.dmpFilesize
8KB