Analysis
-
max time kernel
91s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
16-06-2022 08:00
Static task
static1
Behavioral task
behavioral1
Sample
026c9f0901c1f8edc43dbc0cc965186b.exe
Resource
win7-20220414-en
General
-
Target
026c9f0901c1f8edc43dbc0cc965186b.exe
-
Size
844KB
-
MD5
026c9f0901c1f8edc43dbc0cc965186b
-
SHA1
a500f8cce19f08ff89b9f8c39f34009872cc3e75
-
SHA256
9dcb8b18c173b2407f6edd177227417ab9e0742997570b07d3d40ec71506480d
-
SHA512
81053ecb219dde722185e57db6d2091ec60a2607a3335147b4a6b733123334730b32cec59ebef3251e5185fa6d36182e8e951c8c60ba4f8026bae82cac24f5c3
Malware Config
Extracted
xloader
2.5
r87g
gzjyjzsj.com
rapibest.com
affordablebathroomsbyfrank.net
roboruben.com
xn--dlisucr-byag.com
encoreasso.com
piscire.com
dixiebusybee.com
newrome.xyz
sunshinejon.com
glacierforfcs.xyz
borhanmarket.com
tous-des-cons.club
hsfstea.com
spiniform.info
vaicomfibra.com
shinigami.xyz
kryptoindia.com
listentoappetite.com
securepplpay.com
savannabrazell.com
dallascowboysticket.online
lemuria4.online
pakistaninusa.com
realdigitaldivide.com
nameandlikenesslabs.com
icris2021.com
amorporlaropa.com
xgirlstar.com
localhuktoyof6.xyz
about-times.xyz
withvertex.com
newtajmahalfashion.xyz
myapple3.com
sjitcom.com
shemanifesteverything.com
nft2yuan.com
misfitlamps.com
nordicautoparts.net
precisecleanteam.com
unmoro.com
gh-michikusa.com
usbgdt.net
ordt.xyz
hcaptchabypass.com
samedaycash.loan
lavistacaffe.com
alicekay.online
aceproservices.net
androidapdate.com
kredsen.website
southwinds-kolkata.com
069superbetin.com
adorablymeboutique.store
xbet973.com
xn--czrr40i.xn--io0a7i
shadow-marketing.com
license-plate-find.online
wwwoneparkfinancial.com
milehighrenewals.com
scyxmq.com
mbdeyren.com
nottryingdoing.com
homesandhorse.com
stpaulsschoolbagidora.com
Signatures
-
Xloader Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/5116-141-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
026c9f0901c1f8edc43dbc0cc965186b.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000\Control Panel\International\Geo\Nation 026c9f0901c1f8edc43dbc0cc965186b.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
026c9f0901c1f8edc43dbc0cc965186b.exedescription pid process target process PID 4476 set thread context of 5116 4476 026c9f0901c1f8edc43dbc0cc965186b.exe 026c9f0901c1f8edc43dbc0cc965186b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
powershell.exe026c9f0901c1f8edc43dbc0cc965186b.exepid process 656 powershell.exe 5116 026c9f0901c1f8edc43dbc0cc965186b.exe 5116 026c9f0901c1f8edc43dbc0cc965186b.exe 656 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 656 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
026c9f0901c1f8edc43dbc0cc965186b.exedescription pid process target process PID 4476 wrote to memory of 656 4476 026c9f0901c1f8edc43dbc0cc965186b.exe powershell.exe PID 4476 wrote to memory of 656 4476 026c9f0901c1f8edc43dbc0cc965186b.exe powershell.exe PID 4476 wrote to memory of 656 4476 026c9f0901c1f8edc43dbc0cc965186b.exe powershell.exe PID 4476 wrote to memory of 5056 4476 026c9f0901c1f8edc43dbc0cc965186b.exe schtasks.exe PID 4476 wrote to memory of 5056 4476 026c9f0901c1f8edc43dbc0cc965186b.exe schtasks.exe PID 4476 wrote to memory of 5056 4476 026c9f0901c1f8edc43dbc0cc965186b.exe schtasks.exe PID 4476 wrote to memory of 5116 4476 026c9f0901c1f8edc43dbc0cc965186b.exe 026c9f0901c1f8edc43dbc0cc965186b.exe PID 4476 wrote to memory of 5116 4476 026c9f0901c1f8edc43dbc0cc965186b.exe 026c9f0901c1f8edc43dbc0cc965186b.exe PID 4476 wrote to memory of 5116 4476 026c9f0901c1f8edc43dbc0cc965186b.exe 026c9f0901c1f8edc43dbc0cc965186b.exe PID 4476 wrote to memory of 5116 4476 026c9f0901c1f8edc43dbc0cc965186b.exe 026c9f0901c1f8edc43dbc0cc965186b.exe PID 4476 wrote to memory of 5116 4476 026c9f0901c1f8edc43dbc0cc965186b.exe 026c9f0901c1f8edc43dbc0cc965186b.exe PID 4476 wrote to memory of 5116 4476 026c9f0901c1f8edc43dbc0cc965186b.exe 026c9f0901c1f8edc43dbc0cc965186b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\026c9f0901c1f8edc43dbc0cc965186b.exe"C:\Users\Admin\AppData\Local\Temp\026c9f0901c1f8edc43dbc0cc965186b.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\LPjFjDtf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\LPjFjDtf" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5311.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\026c9f0901c1f8edc43dbc0cc965186b.exe"C:\Users\Admin\AppData\Local\Temp\026c9f0901c1f8edc43dbc0cc965186b.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp5311.tmpFilesize
1KB
MD53d24916f5bafc3cab4fdfa723c8b9309
SHA1a6f16f63dc638d4feae4109671653d010495556a
SHA2563b50ba80507b0249da1051fb4866f647ed9d678effcde019adbfee84daf30dc8
SHA512119b27599f753edef2ebf12d515884004062001f6a290a21f61312b404afdbf22d3ddf0be975819a707119b36ee49a9ca982f7060c7b5d6edce263333d1660ee
-
memory/656-144-0x0000000005E50000-0x0000000005EB6000-memory.dmpFilesize
408KB
-
memory/656-140-0x00000000056B0000-0x0000000005CD8000-memory.dmpFilesize
6.2MB
-
memory/656-143-0x0000000005DE0000-0x0000000005E46000-memory.dmpFilesize
408KB
-
memory/656-156-0x0000000007A90000-0x0000000007A98000-memory.dmpFilesize
32KB
-
memory/656-135-0x0000000000000000-mapping.dmp
-
memory/656-155-0x0000000007AB0000-0x0000000007ACA000-memory.dmpFilesize
104KB
-
memory/656-137-0x0000000002B50000-0x0000000002B86000-memory.dmpFilesize
216KB
-
memory/656-154-0x00000000079A0000-0x00000000079AE000-memory.dmpFilesize
56KB
-
memory/656-153-0x00000000079F0000-0x0000000007A86000-memory.dmpFilesize
600KB
-
memory/656-148-0x0000000071A30000-0x0000000071A7C000-memory.dmpFilesize
304KB
-
memory/656-151-0x0000000007770000-0x000000000778A000-memory.dmpFilesize
104KB
-
memory/656-142-0x00000000054B0000-0x00000000054D2000-memory.dmpFilesize
136KB
-
memory/656-150-0x0000000007DB0000-0x000000000842A000-memory.dmpFilesize
6.5MB
-
memory/656-149-0x0000000006A10000-0x0000000006A2E000-memory.dmpFilesize
120KB
-
memory/656-152-0x00000000077E0000-0x00000000077EA000-memory.dmpFilesize
40KB
-
memory/656-146-0x0000000006470000-0x000000000648E000-memory.dmpFilesize
120KB
-
memory/656-147-0x0000000006A30000-0x0000000006A62000-memory.dmpFilesize
200KB
-
memory/4476-131-0x0000000005310000-0x00000000058B4000-memory.dmpFilesize
5.6MB
-
memory/4476-133-0x0000000004FF0000-0x0000000004FFA000-memory.dmpFilesize
40KB
-
memory/4476-132-0x0000000004E40000-0x0000000004ED2000-memory.dmpFilesize
584KB
-
memory/4476-134-0x00000000087F0000-0x000000000888C000-memory.dmpFilesize
624KB
-
memory/4476-130-0x00000000003C0000-0x000000000049A000-memory.dmpFilesize
872KB
-
memory/5056-136-0x0000000000000000-mapping.dmp
-
memory/5116-157-0x0000000001A20000-0x0000000001D6A000-memory.dmpFilesize
3.3MB
-
memory/5116-141-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/5116-145-0x0000000001A20000-0x0000000001D6A000-memory.dmpFilesize
3.3MB
-
memory/5116-139-0x0000000000000000-mapping.dmp