Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
11-05-2022 07:52
Static task
static1
General
-
Target
ca4112bb9a7b776f14e9085c5b3ecaa7458ecaaa4c2515b79978d7f99eca768f.exe
-
Size
253KB
-
MD5
148b63c2b85f806c7c3036f854b1c6f0
-
SHA1
43b8071712dc21a04140a2eae003380b7575f7e8
-
SHA256
ca4112bb9a7b776f14e9085c5b3ecaa7458ecaaa4c2515b79978d7f99eca768f
-
SHA512
b16af075fc1a9569d6898d58f623a8af277b09543130afaf9e21a710032d1545c42b37530514cb0d080ed3afcc028317573ae5cdd7c2fac5bbb87e0ac80f99d2
Malware Config
Extracted
xloader
2.6
arh2
hstorc.com
blackountry.com
dhrbakery.com
dezhouofit.com
defipayout.xyz
ginas4t.com
byzbh63.xyz
qrcrashview.com
mialibaby.com
enhaut.net
samainnova.com
yashveerresort.com
delfos.online
dungcumay.com
lj-counseling.net
fliptheswitch.pro
padogbitelawyer.com
aticarev.com
sederino.site
bestplansforpets-japan3.life
radicallysimplesupps.com
sandbagmaker.com
misdcf.xyz
nbpz.xyz
floridasunbreaks.com
justfinishesofcolorado.com
homemethtestkit.com
chaquetashapticas.com
zodiactshirt.com
tees.email
zxzx999.com
tempepdf.com
watchusroll.com
parotacenter.com
assistcourse.online
paulstilingroup.com
cnbcfx.com
mooncore.xyz
laplugnation.com
gosti24.com
cthomassolutions.com
rkhubs.com
aboutpier.com
multimediaroomandboard.com
iamparrot.com
wifitest.info
nounworld.com
xpartner.biz
128grandviewdrivenewportnsw.com
bakiin.com
suitcell.com
onehitgamerstudios.com
bathingsuitsshoppingus.com
wingstarifa.com
ccasudqi.com
epiconscious.com
ponponshoes.com
cicom.tech
safetynetinc.net
recanto.xyz
sellsidelite.net
kevmoinesproperties.com
hdwallpaperpics.life
57gznfw.xyz
abtys6.online
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/4416-136-0x0000000000400000-0x000000000042B000-memory.dmp xloader behavioral1/memory/4416-142-0x0000000000400000-0x000000000042B000-memory.dmp xloader behavioral1/memory/4208-148-0x0000000000A10000-0x0000000000A3B000-memory.dmp xloader -
Executes dropped EXE 2 IoCs
Processes:
lbaooyiqoz.exelbaooyiqoz.exepid process 560 lbaooyiqoz.exe 4416 lbaooyiqoz.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
lbaooyiqoz.exelbaooyiqoz.execolorcpl.exedescription pid process target process PID 560 set thread context of 4416 560 lbaooyiqoz.exe lbaooyiqoz.exe PID 4416 set thread context of 2700 4416 lbaooyiqoz.exe Explorer.EXE PID 4416 set thread context of 2700 4416 lbaooyiqoz.exe Explorer.EXE PID 4208 set thread context of 2700 4208 colorcpl.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
lbaooyiqoz.execolorcpl.exepid process 4416 lbaooyiqoz.exe 4416 lbaooyiqoz.exe 4416 lbaooyiqoz.exe 4416 lbaooyiqoz.exe 4416 lbaooyiqoz.exe 4416 lbaooyiqoz.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe 4208 colorcpl.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2700 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
lbaooyiqoz.execolorcpl.exepid process 4416 lbaooyiqoz.exe 4416 lbaooyiqoz.exe 4416 lbaooyiqoz.exe 4416 lbaooyiqoz.exe 4208 colorcpl.exe 4208 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
lbaooyiqoz.execolorcpl.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 4416 lbaooyiqoz.exe Token: SeDebugPrivilege 4208 colorcpl.exe Token: SeShutdownPrivilege 2700 Explorer.EXE Token: SeCreatePagefilePrivilege 2700 Explorer.EXE Token: SeShutdownPrivilege 2700 Explorer.EXE Token: SeCreatePagefilePrivilege 2700 Explorer.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 2700 Explorer.EXE 2700 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
ca4112bb9a7b776f14e9085c5b3ecaa7458ecaaa4c2515b79978d7f99eca768f.exelbaooyiqoz.exeExplorer.EXEcolorcpl.exedescription pid process target process PID 4620 wrote to memory of 560 4620 ca4112bb9a7b776f14e9085c5b3ecaa7458ecaaa4c2515b79978d7f99eca768f.exe lbaooyiqoz.exe PID 4620 wrote to memory of 560 4620 ca4112bb9a7b776f14e9085c5b3ecaa7458ecaaa4c2515b79978d7f99eca768f.exe lbaooyiqoz.exe PID 4620 wrote to memory of 560 4620 ca4112bb9a7b776f14e9085c5b3ecaa7458ecaaa4c2515b79978d7f99eca768f.exe lbaooyiqoz.exe PID 560 wrote to memory of 4416 560 lbaooyiqoz.exe lbaooyiqoz.exe PID 560 wrote to memory of 4416 560 lbaooyiqoz.exe lbaooyiqoz.exe PID 560 wrote to memory of 4416 560 lbaooyiqoz.exe lbaooyiqoz.exe PID 560 wrote to memory of 4416 560 lbaooyiqoz.exe lbaooyiqoz.exe PID 560 wrote to memory of 4416 560 lbaooyiqoz.exe lbaooyiqoz.exe PID 560 wrote to memory of 4416 560 lbaooyiqoz.exe lbaooyiqoz.exe PID 2700 wrote to memory of 4208 2700 Explorer.EXE colorcpl.exe PID 2700 wrote to memory of 4208 2700 Explorer.EXE colorcpl.exe PID 2700 wrote to memory of 4208 2700 Explorer.EXE colorcpl.exe PID 4208 wrote to memory of 1980 4208 colorcpl.exe cmd.exe PID 4208 wrote to memory of 1980 4208 colorcpl.exe cmd.exe PID 4208 wrote to memory of 1980 4208 colorcpl.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ca4112bb9a7b776f14e9085c5b3ecaa7458ecaaa4c2515b79978d7f99eca768f.exe"C:\Users\Admin\AppData\Local\Temp\ca4112bb9a7b776f14e9085c5b3ecaa7458ecaaa4c2515b79978d7f99eca768f.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\lbaooyiqoz.exeC:\Users\Admin\AppData\Local\Temp\lbaooyiqoz.exe C:\Users\Admin\AppData\Local\Temp\enevfyfwb3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\lbaooyiqoz.exeC:\Users\Admin\AppData\Local\Temp\lbaooyiqoz.exe C:\Users\Admin\AppData\Local\Temp\enevfyfwb4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\lbaooyiqoz.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\2zz4hssyl78Filesize
171KB
MD56629f2fca8fbc541cd84585ba0322e0a
SHA1ee152ebf1a896a3e36423c10f2e82144e8d2637c
SHA256cb50a336c419ed641855193c3c0467f29c60db1281dba1902b1fe4e23f67a57f
SHA51225eb74a5362c67377a8030b4cc8c74f6c63151cb53fab167ff1387824c8bc4bcfe6d95d89cfd75344b2b1a0cd17fd4f28f54d83078fb8cc2e90e75703043359b
-
C:\Users\Admin\AppData\Local\Temp\enevfyfwbFilesize
5KB
MD589a491b662b90b975d9e4a21c82922f7
SHA176feb91a683e49167ee4733a3c33036d488d13a1
SHA2565341ab5d2d79a3589bad2eab39513a9445935a628f74acf2b0a92e0eb3c9f439
SHA51241831f6d6b1c1c4f7aecf4a1f8c482e91992ffe3872c4e7e5e3cd5f8cde758fb54319935377af1d3239efa6c49afa3876e8421f3dbcd4e91fea3fec3e4a28638
-
C:\Users\Admin\AppData\Local\Temp\lbaooyiqoz.exeFilesize
74KB
MD5b0981fa438a30d097b95a96d1d7ec4b9
SHA1e75ad5039db2bd35d56019da92cd8c71f95dbc4c
SHA256f77848ff5808ce9a5a0d7732cbc15882c7453e4bd1c927bb62bdae198b4b7697
SHA512be0257e995faa14ce18d9107078b4b6127ad5ce7c3fbbdda5aa1904d7f7eb41167398d36b124dc7296afc2d71df64e6e04a39b66fd7436b1b26a163773381eea
-
C:\Users\Admin\AppData\Local\Temp\lbaooyiqoz.exeFilesize
74KB
MD5b0981fa438a30d097b95a96d1d7ec4b9
SHA1e75ad5039db2bd35d56019da92cd8c71f95dbc4c
SHA256f77848ff5808ce9a5a0d7732cbc15882c7453e4bd1c927bb62bdae198b4b7697
SHA512be0257e995faa14ce18d9107078b4b6127ad5ce7c3fbbdda5aa1904d7f7eb41167398d36b124dc7296afc2d71df64e6e04a39b66fd7436b1b26a163773381eea
-
C:\Users\Admin\AppData\Local\Temp\lbaooyiqoz.exeFilesize
74KB
MD5b0981fa438a30d097b95a96d1d7ec4b9
SHA1e75ad5039db2bd35d56019da92cd8c71f95dbc4c
SHA256f77848ff5808ce9a5a0d7732cbc15882c7453e4bd1c927bb62bdae198b4b7697
SHA512be0257e995faa14ce18d9107078b4b6127ad5ce7c3fbbdda5aa1904d7f7eb41167398d36b124dc7296afc2d71df64e6e04a39b66fd7436b1b26a163773381eea
-
memory/560-130-0x0000000000000000-mapping.dmp
-
memory/1980-149-0x0000000000000000-mapping.dmp
-
memory/2700-141-0x0000000008A30000-0x0000000008BA9000-memory.dmpFilesize
1.5MB
-
memory/2700-151-0x00000000032C0000-0x0000000003369000-memory.dmpFilesize
676KB
-
memory/2700-144-0x0000000008BB0000-0x0000000008CBD000-memory.dmpFilesize
1.1MB
-
memory/4208-147-0x0000000002A00000-0x0000000002D4A000-memory.dmpFilesize
3.3MB
-
memory/4208-145-0x0000000000000000-mapping.dmp
-
memory/4208-146-0x0000000000C50000-0x0000000000C69000-memory.dmpFilesize
100KB
-
memory/4208-148-0x0000000000A10000-0x0000000000A3B000-memory.dmpFilesize
172KB
-
memory/4208-150-0x0000000002830000-0x00000000028C0000-memory.dmpFilesize
576KB
-
memory/4416-142-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/4416-143-0x0000000000A30000-0x0000000000A41000-memory.dmpFilesize
68KB
-
memory/4416-140-0x00000000004F0000-0x0000000000501000-memory.dmpFilesize
68KB
-
memory/4416-139-0x0000000000A90000-0x0000000000DDA000-memory.dmpFilesize
3.3MB
-
memory/4416-136-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/4416-135-0x0000000000000000-mapping.dmp