Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
19-04-2022 13:14
Static task
static1
Behavioral task
behavioral1
Sample
dekont 2022.exe
Resource
win7-20220414-en
General
-
Target
dekont 2022.exe
-
Size
219KB
-
MD5
b432fee7f4857a9ad25f143b2ac645a9
-
SHA1
cd7beb58da064e0caebcc5604893bb3be6568b45
-
SHA256
413e58ab30e56edfaa7899ebe3fc8655314c993db5a0d1840100752ba6be0be0
-
SHA512
55558e311529a70cbb6406ea0e1bf409328960e23ee0bb961768ea5c11dd2476da8dd2cc12cff2945fc8e97ba9f99342c866c9b91fc47a42e082178bd3144ec8
Malware Config
Extracted
xloader
2.5
cbgo
santesha.com
britneysbeautybar.com
sh-cy17.com
jeffcarveragency.com
3117111.com
sobrehosting.net
ddm123.xyz
toxcompliance.com
auditorydesigns.com
vliftfacial.com
ielhii.com
naameliss.com
ritualchariot.com
solchange.com
quatre-vingts.design
lawnmowermashine.com
braceletsstore.net
admappy.com
tollivercoltd.com
vaidix.com
rodrigomartinsadv.com
bouncingskull.com
hamiltonhellerrealestate.com
dream-kidz.com
growupnotgrowold.com
clanginandbangin.com
cornerstone-constructions.com
mcdonalds-delivery.xyz
omnikro.com
nca-group.com
hughers3.com
move-mobius.com
shrivs.com
hoshikuzu-hegemony.com
zpwx17.online
masoncable.com
butecreditunion.com
creativefolksnetwork.xyz
lejanet.com
tacticalslings.club
bestprodutos.com
quirkysoul39.com
sdettest.com
aomendc.xyz
lorticepttoyof6.xyz
nonvaxrnpositions.com
maintainaviation.com
kubanitka.com
fractalmerch.xyz
elbowguru.com
nikiyang.com
cialisactivesupers.com
bestofrochester.info
ynov-rennes.com
saiden8164.com
ffuster.com
papierle.com
dobsonfryedentist.com
rufisquoisedetransit.com
compassionatecuddling.com
kimlady.com
mashinchand.com
semicivilization.com
milamixecommerce.com
ambassadorandceoclub.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1708-64-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1708-65-0x000000000041D450-mapping.dmp xloader behavioral1/memory/1128-74-0x00000000000B0000-0x00000000000D9000-memory.dmp xloader -
Blocklisted process makes network request 1 IoCs
Processes:
wscript.exeflow pid process 16 1128 wscript.exe -
Executes dropped EXE 2 IoCs
Processes:
mjabhrxdeb.exemjabhrxdeb.exepid process 1736 mjabhrxdeb.exe 1708 mjabhrxdeb.exe -
Loads dropped DLL 3 IoCs
Processes:
dekont 2022.exemjabhrxdeb.exepid process 1644 dekont 2022.exe 1644 dekont 2022.exe 1736 mjabhrxdeb.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
mjabhrxdeb.exemjabhrxdeb.exewscript.exedescription pid process target process PID 1736 set thread context of 1708 1736 mjabhrxdeb.exe mjabhrxdeb.exe PID 1708 set thread context of 1428 1708 mjabhrxdeb.exe Explorer.EXE PID 1128 set thread context of 1428 1128 wscript.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
mjabhrxdeb.exewscript.exepid process 1708 mjabhrxdeb.exe 1708 mjabhrxdeb.exe 1128 wscript.exe 1128 wscript.exe 1128 wscript.exe 1128 wscript.exe 1128 wscript.exe 1128 wscript.exe 1128 wscript.exe 1128 wscript.exe 1128 wscript.exe 1128 wscript.exe 1128 wscript.exe 1128 wscript.exe 1128 wscript.exe 1128 wscript.exe 1128 wscript.exe 1128 wscript.exe 1128 wscript.exe 1128 wscript.exe 1128 wscript.exe 1128 wscript.exe 1128 wscript.exe 1128 wscript.exe 1128 wscript.exe 1128 wscript.exe 1128 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
mjabhrxdeb.exewscript.exepid process 1708 mjabhrxdeb.exe 1708 mjabhrxdeb.exe 1708 mjabhrxdeb.exe 1128 wscript.exe 1128 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
mjabhrxdeb.exewscript.exedescription pid process Token: SeDebugPrivilege 1708 mjabhrxdeb.exe Token: SeDebugPrivilege 1128 wscript.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1428 Explorer.EXE 1428 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1428 Explorer.EXE 1428 Explorer.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
dekont 2022.exemjabhrxdeb.exeExplorer.EXEwscript.exedescription pid process target process PID 1644 wrote to memory of 1736 1644 dekont 2022.exe mjabhrxdeb.exe PID 1644 wrote to memory of 1736 1644 dekont 2022.exe mjabhrxdeb.exe PID 1644 wrote to memory of 1736 1644 dekont 2022.exe mjabhrxdeb.exe PID 1644 wrote to memory of 1736 1644 dekont 2022.exe mjabhrxdeb.exe PID 1736 wrote to memory of 1708 1736 mjabhrxdeb.exe mjabhrxdeb.exe PID 1736 wrote to memory of 1708 1736 mjabhrxdeb.exe mjabhrxdeb.exe PID 1736 wrote to memory of 1708 1736 mjabhrxdeb.exe mjabhrxdeb.exe PID 1736 wrote to memory of 1708 1736 mjabhrxdeb.exe mjabhrxdeb.exe PID 1736 wrote to memory of 1708 1736 mjabhrxdeb.exe mjabhrxdeb.exe PID 1736 wrote to memory of 1708 1736 mjabhrxdeb.exe mjabhrxdeb.exe PID 1736 wrote to memory of 1708 1736 mjabhrxdeb.exe mjabhrxdeb.exe PID 1428 wrote to memory of 1128 1428 Explorer.EXE wscript.exe PID 1428 wrote to memory of 1128 1428 Explorer.EXE wscript.exe PID 1428 wrote to memory of 1128 1428 Explorer.EXE wscript.exe PID 1428 wrote to memory of 1128 1428 Explorer.EXE wscript.exe PID 1128 wrote to memory of 2016 1128 wscript.exe cmd.exe PID 1128 wrote to memory of 2016 1128 wscript.exe cmd.exe PID 1128 wrote to memory of 2016 1128 wscript.exe cmd.exe PID 1128 wrote to memory of 2016 1128 wscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\dekont 2022.exe"C:\Users\Admin\AppData\Local\Temp\dekont 2022.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\mjabhrxdeb.exeC:\Users\Admin\AppData\Local\Temp\mjabhrxdeb.exe C:\Users\Admin\AppData\Local\Temp\snialyaeho3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\mjabhrxdeb.exeC:\Users\Admin\AppData\Local\Temp\mjabhrxdeb.exe C:\Users\Admin\AppData\Local\Temp\snialyaeho4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\mjabhrxdeb.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\mjabhrxdeb.exeFilesize
65KB
MD5ebc78b15b08cbdbe9d97f4c4a1d2f581
SHA13b11c202e6a2fe5bf518854f6ba5aa722fed1cf5
SHA256133d4e616c1d84e1210cbc95408fb9fa7c95647b964dc9d93cf0da0f18cec736
SHA5126f93407a01c2a68de283a96b73a08f737de90c26c6781bc2b1c133b667d0fbc8ba14df0cb24a6915956d6e00c964b0a58301893a583141c8f580b009570cecdd
-
C:\Users\Admin\AppData\Local\Temp\mjabhrxdeb.exeFilesize
65KB
MD5ebc78b15b08cbdbe9d97f4c4a1d2f581
SHA13b11c202e6a2fe5bf518854f6ba5aa722fed1cf5
SHA256133d4e616c1d84e1210cbc95408fb9fa7c95647b964dc9d93cf0da0f18cec736
SHA5126f93407a01c2a68de283a96b73a08f737de90c26c6781bc2b1c133b667d0fbc8ba14df0cb24a6915956d6e00c964b0a58301893a583141c8f580b009570cecdd
-
C:\Users\Admin\AppData\Local\Temp\mjabhrxdeb.exeFilesize
65KB
MD5ebc78b15b08cbdbe9d97f4c4a1d2f581
SHA13b11c202e6a2fe5bf518854f6ba5aa722fed1cf5
SHA256133d4e616c1d84e1210cbc95408fb9fa7c95647b964dc9d93cf0da0f18cec736
SHA5126f93407a01c2a68de283a96b73a08f737de90c26c6781bc2b1c133b667d0fbc8ba14df0cb24a6915956d6e00c964b0a58301893a583141c8f580b009570cecdd
-
C:\Users\Admin\AppData\Local\Temp\rd0vbkwpvwFilesize
163KB
MD5519f332951512ab70b509950d645576b
SHA14edb7ad778e85239cb03122e7fa2d80eb3b59f89
SHA256213c9ea7d346397bfafeeb6cf96a92ff1072c870b47054eea468bbc856c3d801
SHA512e4f81a56334d069368870dfdb80830d9ae8e4f290ad12b1b221be67365c1359d102395ddef7a3dad4e0cc35960fb598c0ffb680eda3004436a6b8861bafa27af
-
C:\Users\Admin\AppData\Local\Temp\snialyaehoFilesize
5KB
MD548c66b750085965860331ce2e105fec7
SHA195c87505daf5e871e5fc0f6e67a5ed9a38be818a
SHA2563b9903268cf9e95f2ebb8275bc67230eefa3b59f8cfff1b7e9119473366017a2
SHA51218358a00a936b4f58052477c5b1f6894cd994916ae94c606fed7fffc5280ba0e73d77a5f89781c5a5d974fca97c8d1b14bd760b5e138cc0d03f1c5f444cb3c16
-
\Users\Admin\AppData\Local\Temp\mjabhrxdeb.exeFilesize
65KB
MD5ebc78b15b08cbdbe9d97f4c4a1d2f581
SHA13b11c202e6a2fe5bf518854f6ba5aa722fed1cf5
SHA256133d4e616c1d84e1210cbc95408fb9fa7c95647b964dc9d93cf0da0f18cec736
SHA5126f93407a01c2a68de283a96b73a08f737de90c26c6781bc2b1c133b667d0fbc8ba14df0cb24a6915956d6e00c964b0a58301893a583141c8f580b009570cecdd
-
\Users\Admin\AppData\Local\Temp\mjabhrxdeb.exeFilesize
65KB
MD5ebc78b15b08cbdbe9d97f4c4a1d2f581
SHA13b11c202e6a2fe5bf518854f6ba5aa722fed1cf5
SHA256133d4e616c1d84e1210cbc95408fb9fa7c95647b964dc9d93cf0da0f18cec736
SHA5126f93407a01c2a68de283a96b73a08f737de90c26c6781bc2b1c133b667d0fbc8ba14df0cb24a6915956d6e00c964b0a58301893a583141c8f580b009570cecdd
-
\Users\Admin\AppData\Local\Temp\mjabhrxdeb.exeFilesize
65KB
MD5ebc78b15b08cbdbe9d97f4c4a1d2f581
SHA13b11c202e6a2fe5bf518854f6ba5aa722fed1cf5
SHA256133d4e616c1d84e1210cbc95408fb9fa7c95647b964dc9d93cf0da0f18cec736
SHA5126f93407a01c2a68de283a96b73a08f737de90c26c6781bc2b1c133b667d0fbc8ba14df0cb24a6915956d6e00c964b0a58301893a583141c8f580b009570cecdd
-
memory/1128-71-0x0000000000000000-mapping.dmp
-
memory/1128-73-0x00000000002E0000-0x0000000000306000-memory.dmpFilesize
152KB
-
memory/1128-76-0x0000000001EC0000-0x0000000001F50000-memory.dmpFilesize
576KB
-
memory/1128-75-0x0000000001F60000-0x0000000002263000-memory.dmpFilesize
3.0MB
-
memory/1128-74-0x00000000000B0000-0x00000000000D9000-memory.dmpFilesize
164KB
-
memory/1428-77-0x0000000004A50000-0x0000000004B1B000-memory.dmpFilesize
812KB
-
memory/1428-70-0x00000000068C0000-0x0000000006A0C000-memory.dmpFilesize
1.3MB
-
memory/1644-54-0x0000000076781000-0x0000000076783000-memory.dmpFilesize
8KB
-
memory/1708-64-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1708-69-0x00000000002B0000-0x00000000002C1000-memory.dmpFilesize
68KB
-
memory/1708-68-0x0000000000850000-0x0000000000B53000-memory.dmpFilesize
3.0MB
-
memory/1708-65-0x000000000041D450-mapping.dmp
-
memory/1736-57-0x0000000000000000-mapping.dmp
-
memory/2016-72-0x0000000000000000-mapping.dmp