Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12-05-2022 07:32
Static task
static1
Behavioral task
behavioral1
Sample
148b63c2b85f806c7c3036f854b1c6f0.exe
Resource
win7-20220414-en
General
-
Target
148b63c2b85f806c7c3036f854b1c6f0.exe
-
Size
253KB
-
MD5
148b63c2b85f806c7c3036f854b1c6f0
-
SHA1
43b8071712dc21a04140a2eae003380b7575f7e8
-
SHA256
ca4112bb9a7b776f14e9085c5b3ecaa7458ecaaa4c2515b79978d7f99eca768f
-
SHA512
b16af075fc1a9569d6898d58f623a8af277b09543130afaf9e21a710032d1545c42b37530514cb0d080ed3afcc028317573ae5cdd7c2fac5bbb87e0ac80f99d2
Malware Config
Extracted
xloader
2.6
arh2
hstorc.com
blackountry.com
dhrbakery.com
dezhouofit.com
defipayout.xyz
ginas4t.com
byzbh63.xyz
qrcrashview.com
mialibaby.com
enhaut.net
samainnova.com
yashveerresort.com
delfos.online
dungcumay.com
lj-counseling.net
fliptheswitch.pro
padogbitelawyer.com
aticarev.com
sederino.site
bestplansforpets-japan3.life
radicallysimplesupps.com
sandbagmaker.com
misdcf.xyz
nbpz.xyz
floridasunbreaks.com
justfinishesofcolorado.com
homemethtestkit.com
chaquetashapticas.com
zodiactshirt.com
tees.email
zxzx999.com
tempepdf.com
watchusroll.com
parotacenter.com
assistcourse.online
paulstilingroup.com
cnbcfx.com
mooncore.xyz
laplugnation.com
gosti24.com
cthomassolutions.com
rkhubs.com
aboutpier.com
multimediaroomandboard.com
iamparrot.com
wifitest.info
nounworld.com
xpartner.biz
128grandviewdrivenewportnsw.com
bakiin.com
suitcell.com
onehitgamerstudios.com
bathingsuitsshoppingus.com
wingstarifa.com
ccasudqi.com
epiconscious.com
ponponshoes.com
cicom.tech
safetynetinc.net
recanto.xyz
sellsidelite.net
kevmoinesproperties.com
hdwallpaperpics.life
57gznfw.xyz
abtys6.online
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/972-64-0x0000000000400000-0x000000000042B000-memory.dmp xloader behavioral1/memory/972-65-0x000000000041F270-mapping.dmp xloader behavioral1/memory/972-68-0x0000000000400000-0x000000000042B000-memory.dmp xloader behavioral1/memory/1988-76-0x0000000000080000-0x00000000000AB000-memory.dmp xloader -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
msdt.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run msdt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\MRQPL = "C:\\Program Files (x86)\\Xcbcpfzx\\systraynpxlg6.exe" msdt.exe -
Executes dropped EXE 2 IoCs
Processes:
lbaooyiqoz.exelbaooyiqoz.exepid process 900 lbaooyiqoz.exe 972 lbaooyiqoz.exe -
Loads dropped DLL 3 IoCs
Processes:
148b63c2b85f806c7c3036f854b1c6f0.exelbaooyiqoz.exepid process 756 148b63c2b85f806c7c3036f854b1c6f0.exe 756 148b63c2b85f806c7c3036f854b1c6f0.exe 900 lbaooyiqoz.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
lbaooyiqoz.exelbaooyiqoz.exemsdt.exedescription pid process target process PID 900 set thread context of 972 900 lbaooyiqoz.exe lbaooyiqoz.exe PID 972 set thread context of 1300 972 lbaooyiqoz.exe Explorer.EXE PID 1988 set thread context of 1300 1988 msdt.exe Explorer.EXE -
Drops file in Program Files directory 1 IoCs
Processes:
msdt.exedescription ioc process File opened for modification C:\Program Files (x86)\Xcbcpfzx\systraynpxlg6.exe msdt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
msdt.exedescription ioc process Key created \Registry\User\S-1-5-21-2277218442-1199762539-2004043321-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 msdt.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
lbaooyiqoz.exemsdt.exepid process 972 lbaooyiqoz.exe 972 lbaooyiqoz.exe 1988 msdt.exe 1988 msdt.exe 1988 msdt.exe 1988 msdt.exe 1988 msdt.exe 1988 msdt.exe 1988 msdt.exe 1988 msdt.exe 1988 msdt.exe 1988 msdt.exe 1988 msdt.exe 1988 msdt.exe 1988 msdt.exe 1988 msdt.exe 1988 msdt.exe 1988 msdt.exe 1988 msdt.exe 1988 msdt.exe 1988 msdt.exe 1988 msdt.exe 1988 msdt.exe 1988 msdt.exe 1988 msdt.exe 1988 msdt.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
lbaooyiqoz.exemsdt.exepid process 972 lbaooyiqoz.exe 972 lbaooyiqoz.exe 972 lbaooyiqoz.exe 1988 msdt.exe 1988 msdt.exe 1988 msdt.exe 1988 msdt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
lbaooyiqoz.exemsdt.exedescription pid process Token: SeDebugPrivilege 972 lbaooyiqoz.exe Token: SeDebugPrivilege 1988 msdt.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1300 Explorer.EXE 1300 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1300 Explorer.EXE 1300 Explorer.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
148b63c2b85f806c7c3036f854b1c6f0.exelbaooyiqoz.exeExplorer.EXEmsdt.exedescription pid process target process PID 756 wrote to memory of 900 756 148b63c2b85f806c7c3036f854b1c6f0.exe lbaooyiqoz.exe PID 756 wrote to memory of 900 756 148b63c2b85f806c7c3036f854b1c6f0.exe lbaooyiqoz.exe PID 756 wrote to memory of 900 756 148b63c2b85f806c7c3036f854b1c6f0.exe lbaooyiqoz.exe PID 756 wrote to memory of 900 756 148b63c2b85f806c7c3036f854b1c6f0.exe lbaooyiqoz.exe PID 900 wrote to memory of 972 900 lbaooyiqoz.exe lbaooyiqoz.exe PID 900 wrote to memory of 972 900 lbaooyiqoz.exe lbaooyiqoz.exe PID 900 wrote to memory of 972 900 lbaooyiqoz.exe lbaooyiqoz.exe PID 900 wrote to memory of 972 900 lbaooyiqoz.exe lbaooyiqoz.exe PID 900 wrote to memory of 972 900 lbaooyiqoz.exe lbaooyiqoz.exe PID 900 wrote to memory of 972 900 lbaooyiqoz.exe lbaooyiqoz.exe PID 900 wrote to memory of 972 900 lbaooyiqoz.exe lbaooyiqoz.exe PID 1300 wrote to memory of 1988 1300 Explorer.EXE msdt.exe PID 1300 wrote to memory of 1988 1300 Explorer.EXE msdt.exe PID 1300 wrote to memory of 1988 1300 Explorer.EXE msdt.exe PID 1300 wrote to memory of 1988 1300 Explorer.EXE msdt.exe PID 1988 wrote to memory of 1944 1988 msdt.exe cmd.exe PID 1988 wrote to memory of 1944 1988 msdt.exe cmd.exe PID 1988 wrote to memory of 1944 1988 msdt.exe cmd.exe PID 1988 wrote to memory of 1944 1988 msdt.exe cmd.exe PID 1988 wrote to memory of 1100 1988 msdt.exe Firefox.exe PID 1988 wrote to memory of 1100 1988 msdt.exe Firefox.exe PID 1988 wrote to memory of 1100 1988 msdt.exe Firefox.exe PID 1988 wrote to memory of 1100 1988 msdt.exe Firefox.exe PID 1988 wrote to memory of 1100 1988 msdt.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\148b63c2b85f806c7c3036f854b1c6f0.exe"C:\Users\Admin\AppData\Local\Temp\148b63c2b85f806c7c3036f854b1c6f0.exe"2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\lbaooyiqoz.exeC:\Users\Admin\AppData\Local\Temp\lbaooyiqoz.exe C:\Users\Admin\AppData\Local\Temp\enevfyfwb3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\lbaooyiqoz.exeC:\Users\Admin\AppData\Local\Temp\lbaooyiqoz.exe C:\Users\Admin\AppData\Local\Temp\enevfyfwb4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Adds policy Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\lbaooyiqoz.exe"3⤵
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\2zz4hssyl78Filesize
171KB
MD56629f2fca8fbc541cd84585ba0322e0a
SHA1ee152ebf1a896a3e36423c10f2e82144e8d2637c
SHA256cb50a336c419ed641855193c3c0467f29c60db1281dba1902b1fe4e23f67a57f
SHA51225eb74a5362c67377a8030b4cc8c74f6c63151cb53fab167ff1387824c8bc4bcfe6d95d89cfd75344b2b1a0cd17fd4f28f54d83078fb8cc2e90e75703043359b
-
C:\Users\Admin\AppData\Local\Temp\enevfyfwbFilesize
5KB
MD589a491b662b90b975d9e4a21c82922f7
SHA176feb91a683e49167ee4733a3c33036d488d13a1
SHA2565341ab5d2d79a3589bad2eab39513a9445935a628f74acf2b0a92e0eb3c9f439
SHA51241831f6d6b1c1c4f7aecf4a1f8c482e91992ffe3872c4e7e5e3cd5f8cde758fb54319935377af1d3239efa6c49afa3876e8421f3dbcd4e91fea3fec3e4a28638
-
C:\Users\Admin\AppData\Local\Temp\lbaooyiqoz.exeFilesize
74KB
MD5b0981fa438a30d097b95a96d1d7ec4b9
SHA1e75ad5039db2bd35d56019da92cd8c71f95dbc4c
SHA256f77848ff5808ce9a5a0d7732cbc15882c7453e4bd1c927bb62bdae198b4b7697
SHA512be0257e995faa14ce18d9107078b4b6127ad5ce7c3fbbdda5aa1904d7f7eb41167398d36b124dc7296afc2d71df64e6e04a39b66fd7436b1b26a163773381eea
-
C:\Users\Admin\AppData\Local\Temp\lbaooyiqoz.exeFilesize
74KB
MD5b0981fa438a30d097b95a96d1d7ec4b9
SHA1e75ad5039db2bd35d56019da92cd8c71f95dbc4c
SHA256f77848ff5808ce9a5a0d7732cbc15882c7453e4bd1c927bb62bdae198b4b7697
SHA512be0257e995faa14ce18d9107078b4b6127ad5ce7c3fbbdda5aa1904d7f7eb41167398d36b124dc7296afc2d71df64e6e04a39b66fd7436b1b26a163773381eea
-
C:\Users\Admin\AppData\Local\Temp\lbaooyiqoz.exeFilesize
74KB
MD5b0981fa438a30d097b95a96d1d7ec4b9
SHA1e75ad5039db2bd35d56019da92cd8c71f95dbc4c
SHA256f77848ff5808ce9a5a0d7732cbc15882c7453e4bd1c927bb62bdae198b4b7697
SHA512be0257e995faa14ce18d9107078b4b6127ad5ce7c3fbbdda5aa1904d7f7eb41167398d36b124dc7296afc2d71df64e6e04a39b66fd7436b1b26a163773381eea
-
\Users\Admin\AppData\Local\Temp\lbaooyiqoz.exeFilesize
74KB
MD5b0981fa438a30d097b95a96d1d7ec4b9
SHA1e75ad5039db2bd35d56019da92cd8c71f95dbc4c
SHA256f77848ff5808ce9a5a0d7732cbc15882c7453e4bd1c927bb62bdae198b4b7697
SHA512be0257e995faa14ce18d9107078b4b6127ad5ce7c3fbbdda5aa1904d7f7eb41167398d36b124dc7296afc2d71df64e6e04a39b66fd7436b1b26a163773381eea
-
\Users\Admin\AppData\Local\Temp\lbaooyiqoz.exeFilesize
74KB
MD5b0981fa438a30d097b95a96d1d7ec4b9
SHA1e75ad5039db2bd35d56019da92cd8c71f95dbc4c
SHA256f77848ff5808ce9a5a0d7732cbc15882c7453e4bd1c927bb62bdae198b4b7697
SHA512be0257e995faa14ce18d9107078b4b6127ad5ce7c3fbbdda5aa1904d7f7eb41167398d36b124dc7296afc2d71df64e6e04a39b66fd7436b1b26a163773381eea
-
\Users\Admin\AppData\Local\Temp\lbaooyiqoz.exeFilesize
74KB
MD5b0981fa438a30d097b95a96d1d7ec4b9
SHA1e75ad5039db2bd35d56019da92cd8c71f95dbc4c
SHA256f77848ff5808ce9a5a0d7732cbc15882c7453e4bd1c927bb62bdae198b4b7697
SHA512be0257e995faa14ce18d9107078b4b6127ad5ce7c3fbbdda5aa1904d7f7eb41167398d36b124dc7296afc2d71df64e6e04a39b66fd7436b1b26a163773381eea
-
memory/756-54-0x00000000763E1000-0x00000000763E3000-memory.dmpFilesize
8KB
-
memory/900-57-0x0000000000000000-mapping.dmp
-
memory/972-65-0x000000000041F270-mapping.dmp
-
memory/972-64-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/972-68-0x0000000000400000-0x000000000042B000-memory.dmpFilesize
172KB
-
memory/972-69-0x0000000000700000-0x0000000000A03000-memory.dmpFilesize
3.0MB
-
memory/972-70-0x0000000000470000-0x0000000000481000-memory.dmpFilesize
68KB
-
memory/1300-71-0x0000000006EE0000-0x000000000703B000-memory.dmpFilesize
1.4MB
-
memory/1300-79-0x0000000007040000-0x00000000071A5000-memory.dmpFilesize
1.4MB
-
memory/1944-74-0x0000000000000000-mapping.dmp
-
memory/1988-72-0x0000000000000000-mapping.dmp
-
memory/1988-75-0x0000000000640000-0x0000000000734000-memory.dmpFilesize
976KB
-
memory/1988-76-0x0000000000080000-0x00000000000AB000-memory.dmpFilesize
172KB
-
memory/1988-77-0x00000000021D0000-0x00000000024D3000-memory.dmpFilesize
3.0MB
-
memory/1988-78-0x0000000002000000-0x0000000002090000-memory.dmpFilesize
576KB