Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220331-en -
submitted
13-04-2022 13:27
Static task
static1
Behavioral task
behavioral1
Sample
triage_dropped_file.exe
Resource
win7-20220331-en
General
-
Target
triage_dropped_file.exe
-
Size
271KB
-
MD5
f9a20cce97d6efd9e8d071420a8858b7
-
SHA1
17680094e9bdefe2f5205729f2b55be2ffca81fa
-
SHA256
aa9db27b2063f5aee9f97d7d86b883686f51bd030d0b38d6daaed3629a230a7d
-
SHA512
fb9055d9f19788e0c2d25f3f400165b630ef6f62604d6ee6a764c7a57f5f115737db4187be30641bca16af11d84d3afdde73b0790f5d43f682e10439ed7a1026
Malware Config
Extracted
xloader
2.5
p00n
beaniemart.com
sugarlaces.online
kinesio-leman.com
gasfreenft.com
ateneaespai.com
askyourhr.com
recruitloft.com
carolinasbestroofingcompany.com
coacher.online
freshmind.today
help-it.online
nicelink17.com
islandtimeoperations.com
agricurve.net
rizkhr.com
innovatorsincommerce.com
grownwings.com
learningout.store
miaglam.com
tengfeijd8.com
cxhz.xyz
papayaflorida.com
bellanotteclub.online
nudeteenpornvideos.com
uowmnsds.icu
neighbourjoy-5.xyz
parkingparcel.com
yfly627.xyz
dooms.one
crushedvmkdla.online
24video-net.com
general-technologies.net
leadgenteambyec4.online
adorango.com
harborfundingconsultants.com
genetest.store
mapa-beograda.net
ppeglovesmasks.com
gleadss.com
mqzkk.com
siterrenos.com
letsmakeyourchoice.com
doseofyouth.com
shoppersgate.online
cdrb028.com
lojamariaml.com
customcabinetshoppaysonut.com
pow4u.com
einfach-mario.com
brasbux.com
indoor-lamps.com
ribblevalleyfairs.com
limonsite.com
cinreyyy.com
mobileinternetpackages.com
cazaclean.com
awaytraveltnpasumo6.xyz
roboskullks.com
sudnettrapline.com
360metaverse.tech
iphone13promax.repair
ichaogupiao.com
kathyrowe.com
it-brainpool.com
greensunergy.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 4 IoCs
resource yara_rule behavioral1/memory/1760-63-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1760-64-0x000000000041D430-mapping.dmp xloader behavioral1/memory/1760-68-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1320-74-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Blocklisted process makes network request 1 IoCs
flow pid Process 13 1320 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1984 vvywdeos.exe 1760 vvywdeos.exe -
Loads dropped DLL 2 IoCs
pid Process 1988 triage_dropped_file.exe 1984 vvywdeos.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1984 set thread context of 1760 1984 vvywdeos.exe 30 PID 1760 set thread context of 1216 1760 vvywdeos.exe 14 PID 1320 set thread context of 1216 1320 cmd.exe 14 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 1760 vvywdeos.exe 1760 vvywdeos.exe 1320 cmd.exe 1320 cmd.exe 1320 cmd.exe 1320 cmd.exe 1320 cmd.exe 1320 cmd.exe 1320 cmd.exe 1320 cmd.exe 1320 cmd.exe 1320 cmd.exe 1320 cmd.exe 1320 cmd.exe 1320 cmd.exe 1320 cmd.exe 1320 cmd.exe 1320 cmd.exe 1320 cmd.exe 1320 cmd.exe 1320 cmd.exe 1320 cmd.exe 1320 cmd.exe 1320 cmd.exe 1320 cmd.exe 1320 cmd.exe 1320 cmd.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1760 vvywdeos.exe 1760 vvywdeos.exe 1760 vvywdeos.exe 1320 cmd.exe 1320 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1760 vvywdeos.exe Token: SeDebugPrivilege 1320 cmd.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1216 Explorer.EXE 1216 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1216 Explorer.EXE 1216 Explorer.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1988 wrote to memory of 1984 1988 triage_dropped_file.exe 28 PID 1988 wrote to memory of 1984 1988 triage_dropped_file.exe 28 PID 1988 wrote to memory of 1984 1988 triage_dropped_file.exe 28 PID 1988 wrote to memory of 1984 1988 triage_dropped_file.exe 28 PID 1984 wrote to memory of 1760 1984 vvywdeos.exe 30 PID 1984 wrote to memory of 1760 1984 vvywdeos.exe 30 PID 1984 wrote to memory of 1760 1984 vvywdeos.exe 30 PID 1984 wrote to memory of 1760 1984 vvywdeos.exe 30 PID 1984 wrote to memory of 1760 1984 vvywdeos.exe 30 PID 1984 wrote to memory of 1760 1984 vvywdeos.exe 30 PID 1984 wrote to memory of 1760 1984 vvywdeos.exe 30 PID 1216 wrote to memory of 1320 1216 Explorer.EXE 31 PID 1216 wrote to memory of 1320 1216 Explorer.EXE 31 PID 1216 wrote to memory of 1320 1216 Explorer.EXE 31 PID 1216 wrote to memory of 1320 1216 Explorer.EXE 31 PID 1320 wrote to memory of 1268 1320 cmd.exe 32 PID 1320 wrote to memory of 1268 1320 cmd.exe 32 PID 1320 wrote to memory of 1268 1320 cmd.exe 32 PID 1320 wrote to memory of 1268 1320 cmd.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\triage_dropped_file.exe"C:\Users\Admin\AppData\Local\Temp\triage_dropped_file.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\vvywdeos.exeC:\Users\Admin\AppData\Local\Temp\vvywdeos.exe C:\Users\Admin\AppData\Local\Temp\pkjant3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\vvywdeos.exeC:\Users\Admin\AppData\Local\Temp\vvywdeos.exe C:\Users\Admin\AppData\Local\Temp\pkjant4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1760
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\vvywdeos.exe"3⤵PID:1268
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD5024f5eb96b56308cfb64fe436e8de447
SHA1307585696be6985d5b7a3289dd4845f534868483
SHA256926d2ab16139435d5fda9b2badafb9d5eefb606faf59cd1c7b44a282a22feefb
SHA512e9754c234a15449ccc1e0d2f72c6a7cc63ef4887c2a5c8a93ab83905e42f3d85e77a1efe6b3e032e8b7d531a722c3b7da62349faf7921539947dd8e117bc650d
-
Filesize
4KB
MD535ba5cfdc4921d469e0f0959c2827785
SHA17295bd83ae1c581099495ec9d8fd9f9b62a97657
SHA256c3a8511a37564f699ee8c9ec8340f73790bf81e55f3327f4d787b13dc333e013
SHA51228be15b241179899df176541c469d49cd555e73871ee515bd2d931370fe416b8ad9b3464cfcb741156af126bcc1cdb9f5b5320671c16ffb1a25876d14952d4dd
-
Filesize
70KB
MD5f357de702f7b08ff1b60c2ca5bbdafa2
SHA1bc9e18bfbb4a9ce14351dfdffc3f57d22b40831a
SHA2569b4b5b5048151f723ca57f67e9107e24c844f1be62b977efaeabedb5d620eaf5
SHA5129b096e239c01f7bf7c946719deb3cadaf206ebd29530cf425a885e7351286b5f010b3fb66a3d55cef5200f2504ef76648789ec95a4935a6ea59a8f51280484d8
-
Filesize
70KB
MD5f357de702f7b08ff1b60c2ca5bbdafa2
SHA1bc9e18bfbb4a9ce14351dfdffc3f57d22b40831a
SHA2569b4b5b5048151f723ca57f67e9107e24c844f1be62b977efaeabedb5d620eaf5
SHA5129b096e239c01f7bf7c946719deb3cadaf206ebd29530cf425a885e7351286b5f010b3fb66a3d55cef5200f2504ef76648789ec95a4935a6ea59a8f51280484d8
-
Filesize
70KB
MD5f357de702f7b08ff1b60c2ca5bbdafa2
SHA1bc9e18bfbb4a9ce14351dfdffc3f57d22b40831a
SHA2569b4b5b5048151f723ca57f67e9107e24c844f1be62b977efaeabedb5d620eaf5
SHA5129b096e239c01f7bf7c946719deb3cadaf206ebd29530cf425a885e7351286b5f010b3fb66a3d55cef5200f2504ef76648789ec95a4935a6ea59a8f51280484d8
-
Filesize
70KB
MD5f357de702f7b08ff1b60c2ca5bbdafa2
SHA1bc9e18bfbb4a9ce14351dfdffc3f57d22b40831a
SHA2569b4b5b5048151f723ca57f67e9107e24c844f1be62b977efaeabedb5d620eaf5
SHA5129b096e239c01f7bf7c946719deb3cadaf206ebd29530cf425a885e7351286b5f010b3fb66a3d55cef5200f2504ef76648789ec95a4935a6ea59a8f51280484d8
-
Filesize
70KB
MD5f357de702f7b08ff1b60c2ca5bbdafa2
SHA1bc9e18bfbb4a9ce14351dfdffc3f57d22b40831a
SHA2569b4b5b5048151f723ca57f67e9107e24c844f1be62b977efaeabedb5d620eaf5
SHA5129b096e239c01f7bf7c946719deb3cadaf206ebd29530cf425a885e7351286b5f010b3fb66a3d55cef5200f2504ef76648789ec95a4935a6ea59a8f51280484d8