Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
19-04-2022 13:14
Static task
static1
Behavioral task
behavioral1
Sample
dekont 2022.exe
Resource
win7-20220414-en
General
-
Target
dekont 2022.exe
-
Size
219KB
-
MD5
b432fee7f4857a9ad25f143b2ac645a9
-
SHA1
cd7beb58da064e0caebcc5604893bb3be6568b45
-
SHA256
413e58ab30e56edfaa7899ebe3fc8655314c993db5a0d1840100752ba6be0be0
-
SHA512
55558e311529a70cbb6406ea0e1bf409328960e23ee0bb961768ea5c11dd2476da8dd2cc12cff2945fc8e97ba9f99342c866c9b91fc47a42e082178bd3144ec8
Malware Config
Extracted
xloader
2.5
cbgo
santesha.com
britneysbeautybar.com
sh-cy17.com
jeffcarveragency.com
3117111.com
sobrehosting.net
ddm123.xyz
toxcompliance.com
auditorydesigns.com
vliftfacial.com
ielhii.com
naameliss.com
ritualchariot.com
solchange.com
quatre-vingts.design
lawnmowermashine.com
braceletsstore.net
admappy.com
tollivercoltd.com
vaidix.com
rodrigomartinsadv.com
bouncingskull.com
hamiltonhellerrealestate.com
dream-kidz.com
growupnotgrowold.com
clanginandbangin.com
cornerstone-constructions.com
mcdonalds-delivery.xyz
omnikro.com
nca-group.com
hughers3.com
move-mobius.com
shrivs.com
hoshikuzu-hegemony.com
zpwx17.online
masoncable.com
butecreditunion.com
creativefolksnetwork.xyz
lejanet.com
tacticalslings.club
bestprodutos.com
quirkysoul39.com
sdettest.com
aomendc.xyz
lorticepttoyof6.xyz
nonvaxrnpositions.com
maintainaviation.com
kubanitka.com
fractalmerch.xyz
elbowguru.com
nikiyang.com
cialisactivesupers.com
bestofrochester.info
ynov-rennes.com
saiden8164.com
ffuster.com
papierle.com
dobsonfryedentist.com
rufisquoisedetransit.com
compassionatecuddling.com
kimlady.com
mashinchand.com
semicivilization.com
milamixecommerce.com
ambassadorandceoclub.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4832-136-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/4832-139-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/4760-145-0x0000000000200000-0x0000000000229000-memory.dmp xloader -
Executes dropped EXE 2 IoCs
Processes:
mjabhrxdeb.exemjabhrxdeb.exepid process 4576 mjabhrxdeb.exe 4832 mjabhrxdeb.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
mjabhrxdeb.exemjabhrxdeb.execmd.exedescription pid process target process PID 4576 set thread context of 4832 4576 mjabhrxdeb.exe mjabhrxdeb.exe PID 4832 set thread context of 8 4832 mjabhrxdeb.exe Explorer.EXE PID 4760 set thread context of 8 4760 cmd.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 58 IoCs
Processes:
mjabhrxdeb.execmd.exepid process 4832 mjabhrxdeb.exe 4832 mjabhrxdeb.exe 4832 mjabhrxdeb.exe 4832 mjabhrxdeb.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe 4760 cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 8 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
mjabhrxdeb.execmd.exepid process 4832 mjabhrxdeb.exe 4832 mjabhrxdeb.exe 4832 mjabhrxdeb.exe 4760 cmd.exe 4760 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
mjabhrxdeb.execmd.exedescription pid process Token: SeDebugPrivilege 4832 mjabhrxdeb.exe Token: SeDebugPrivilege 4760 cmd.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
dekont 2022.exemjabhrxdeb.exeExplorer.EXEcmd.exedescription pid process target process PID 4468 wrote to memory of 4576 4468 dekont 2022.exe mjabhrxdeb.exe PID 4468 wrote to memory of 4576 4468 dekont 2022.exe mjabhrxdeb.exe PID 4468 wrote to memory of 4576 4468 dekont 2022.exe mjabhrxdeb.exe PID 4576 wrote to memory of 4832 4576 mjabhrxdeb.exe mjabhrxdeb.exe PID 4576 wrote to memory of 4832 4576 mjabhrxdeb.exe mjabhrxdeb.exe PID 4576 wrote to memory of 4832 4576 mjabhrxdeb.exe mjabhrxdeb.exe PID 4576 wrote to memory of 4832 4576 mjabhrxdeb.exe mjabhrxdeb.exe PID 4576 wrote to memory of 4832 4576 mjabhrxdeb.exe mjabhrxdeb.exe PID 4576 wrote to memory of 4832 4576 mjabhrxdeb.exe mjabhrxdeb.exe PID 8 wrote to memory of 4760 8 Explorer.EXE cmd.exe PID 8 wrote to memory of 4760 8 Explorer.EXE cmd.exe PID 8 wrote to memory of 4760 8 Explorer.EXE cmd.exe PID 4760 wrote to memory of 4636 4760 cmd.exe cmd.exe PID 4760 wrote to memory of 4636 4760 cmd.exe cmd.exe PID 4760 wrote to memory of 4636 4760 cmd.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\dekont 2022.exe"C:\Users\Admin\AppData\Local\Temp\dekont 2022.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\mjabhrxdeb.exeC:\Users\Admin\AppData\Local\Temp\mjabhrxdeb.exe C:\Users\Admin\AppData\Local\Temp\snialyaeho3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\mjabhrxdeb.exeC:\Users\Admin\AppData\Local\Temp\mjabhrxdeb.exe C:\Users\Admin\AppData\Local\Temp\snialyaeho4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\mjabhrxdeb.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\mjabhrxdeb.exeFilesize
65KB
MD5ebc78b15b08cbdbe9d97f4c4a1d2f581
SHA13b11c202e6a2fe5bf518854f6ba5aa722fed1cf5
SHA256133d4e616c1d84e1210cbc95408fb9fa7c95647b964dc9d93cf0da0f18cec736
SHA5126f93407a01c2a68de283a96b73a08f737de90c26c6781bc2b1c133b667d0fbc8ba14df0cb24a6915956d6e00c964b0a58301893a583141c8f580b009570cecdd
-
C:\Users\Admin\AppData\Local\Temp\mjabhrxdeb.exeFilesize
65KB
MD5ebc78b15b08cbdbe9d97f4c4a1d2f581
SHA13b11c202e6a2fe5bf518854f6ba5aa722fed1cf5
SHA256133d4e616c1d84e1210cbc95408fb9fa7c95647b964dc9d93cf0da0f18cec736
SHA5126f93407a01c2a68de283a96b73a08f737de90c26c6781bc2b1c133b667d0fbc8ba14df0cb24a6915956d6e00c964b0a58301893a583141c8f580b009570cecdd
-
C:\Users\Admin\AppData\Local\Temp\mjabhrxdeb.exeFilesize
65KB
MD5ebc78b15b08cbdbe9d97f4c4a1d2f581
SHA13b11c202e6a2fe5bf518854f6ba5aa722fed1cf5
SHA256133d4e616c1d84e1210cbc95408fb9fa7c95647b964dc9d93cf0da0f18cec736
SHA5126f93407a01c2a68de283a96b73a08f737de90c26c6781bc2b1c133b667d0fbc8ba14df0cb24a6915956d6e00c964b0a58301893a583141c8f580b009570cecdd
-
C:\Users\Admin\AppData\Local\Temp\rd0vbkwpvwFilesize
163KB
MD5519f332951512ab70b509950d645576b
SHA14edb7ad778e85239cb03122e7fa2d80eb3b59f89
SHA256213c9ea7d346397bfafeeb6cf96a92ff1072c870b47054eea468bbc856c3d801
SHA512e4f81a56334d069368870dfdb80830d9ae8e4f290ad12b1b221be67365c1359d102395ddef7a3dad4e0cc35960fb598c0ffb680eda3004436a6b8861bafa27af
-
C:\Users\Admin\AppData\Local\Temp\snialyaehoFilesize
5KB
MD548c66b750085965860331ce2e105fec7
SHA195c87505daf5e871e5fc0f6e67a5ed9a38be818a
SHA2563b9903268cf9e95f2ebb8275bc67230eefa3b59f8cfff1b7e9119473366017a2
SHA51218358a00a936b4f58052477c5b1f6894cd994916ae94c606fed7fffc5280ba0e73d77a5f89781c5a5d974fca97c8d1b14bd760b5e138cc0d03f1c5f444cb3c16
-
memory/8-142-0x0000000008430000-0x0000000008584000-memory.dmpFilesize
1.3MB
-
memory/8-149-0x0000000008DA0000-0x0000000008EBF000-memory.dmpFilesize
1.1MB
-
memory/4576-130-0x0000000000000000-mapping.dmp
-
memory/4636-147-0x0000000000000000-mapping.dmp
-
memory/4760-143-0x0000000000000000-mapping.dmp
-
memory/4760-145-0x0000000000200000-0x0000000000229000-memory.dmpFilesize
164KB
-
memory/4760-144-0x00000000002A0000-0x00000000002FA000-memory.dmpFilesize
360KB
-
memory/4760-146-0x0000000000D50000-0x000000000109A000-memory.dmpFilesize
3.3MB
-
memory/4760-148-0x0000000000B70000-0x0000000000C00000-memory.dmpFilesize
576KB
-
memory/4832-141-0x0000000000E90000-0x0000000000EA1000-memory.dmpFilesize
68KB
-
memory/4832-140-0x0000000000B40000-0x0000000000E8A000-memory.dmpFilesize
3.3MB
-
memory/4832-139-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/4832-136-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/4832-135-0x0000000000000000-mapping.dmp