Analysis
-
max time kernel
132s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
24-07-2022 02:25
Static task
static1
Behavioral task
behavioral1
Sample
59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0.exe
Resource
win10v2004-20220722-en
General
-
Target
59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0.exe
-
Size
1.6MB
-
MD5
8ba75de55191a7b284c87450d7ec168e
-
SHA1
e8c1481d0a26713f92ef785b8fd998fdd87198c6
-
SHA256
59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0
-
SHA512
1af991aa7a4ec227ab38df95a0f8a0ef1ab6cd84dd7100718de088e00cd8f4e3d545d3dd4ee40e619f246edf7ec23e6c44b195e57242536c11e22aff6799731d
Malware Config
Signatures
-
suricata: ET MALWARE W32/Dinwod.Dropper Win32/Xtrat.B CnC Beacon
suricata: ET MALWARE W32/Dinwod.Dropper Win32/Xtrat.B CnC Beacon
-
Executes dropped EXE 3 IoCs
Processes:
o67oo.exeo67oo.exeo67oo.exepid process 1892 o67oo.exe 360 o67oo.exe 1964 o67oo.exe -
Processes:
resource yara_rule behavioral1/memory/1328-65-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/1328-67-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/1328-68-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/1328-70-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/1328-72-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/1328-74-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/1328-75-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/1328-76-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/1964-94-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral1/memory/1964-98-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral1/memory/1328-97-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/1964-101-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral1/memory/1964-105-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral1/memory/1964-110-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral1/memory/1964-108-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral1/memory/1328-111-0x0000000000400000-0x0000000000424000-memory.dmp upx behavioral1/memory/1964-113-0x0000000001610000-0x000000000171E000-memory.dmp upx behavioral1/memory/1964-112-0x0000000001610000-0x000000000171E000-memory.dmp upx -
Loads dropped DLL 7 IoCs
Processes:
59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0.exevbc.exeo67oo.exepid process 1676 59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0.exe 1676 59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0.exe 1676 59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0.exe 1676 59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0.exe 1328 vbc.exe 1328 vbc.exe 360 o67oo.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
vbc.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce vbc.exe Set value (str) \REGISTRY\USER\S-1-5-21-335065374-4263250628-1829373619-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\ZqshSX = "C:\\ZqshSXZqshSX\\ZqshSX.vbs" vbc.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
o67oo.exevbc.exeo67oo.exedescription pid process target process PID 1892 set thread context of 1328 1892 o67oo.exe vbc.exe PID 1328 set thread context of 360 1328 vbc.exe o67oo.exe PID 360 set thread context of 1964 360 o67oo.exe o67oo.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
o67oo.exevbc.exeo67oo.exepid process 1892 o67oo.exe 1892 o67oo.exe 1328 vbc.exe 1328 vbc.exe 1328 vbc.exe 1328 vbc.exe 1328 vbc.exe 1328 vbc.exe 1328 vbc.exe 1328 vbc.exe 1328 vbc.exe 1328 vbc.exe 1328 vbc.exe 1328 vbc.exe 1328 vbc.exe 1328 vbc.exe 1328 vbc.exe 1328 vbc.exe 1328 vbc.exe 1964 o67oo.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
o67oo.exeo67oo.exepid process 360 o67oo.exe 1964 o67oo.exe -
Suspicious use of WriteProcessMemory 38 IoCs
Processes:
59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0.exeo67oo.exevbc.exeo67oo.exedescription pid process target process PID 1676 wrote to memory of 1892 1676 59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0.exe o67oo.exe PID 1676 wrote to memory of 1892 1676 59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0.exe o67oo.exe PID 1676 wrote to memory of 1892 1676 59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0.exe o67oo.exe PID 1676 wrote to memory of 1892 1676 59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0.exe o67oo.exe PID 1676 wrote to memory of 1892 1676 59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0.exe o67oo.exe PID 1676 wrote to memory of 1892 1676 59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0.exe o67oo.exe PID 1676 wrote to memory of 1892 1676 59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0.exe o67oo.exe PID 1892 wrote to memory of 1328 1892 o67oo.exe vbc.exe PID 1892 wrote to memory of 1328 1892 o67oo.exe vbc.exe PID 1892 wrote to memory of 1328 1892 o67oo.exe vbc.exe PID 1892 wrote to memory of 1328 1892 o67oo.exe vbc.exe PID 1892 wrote to memory of 1328 1892 o67oo.exe vbc.exe PID 1892 wrote to memory of 1328 1892 o67oo.exe vbc.exe PID 1892 wrote to memory of 1328 1892 o67oo.exe vbc.exe PID 1892 wrote to memory of 1328 1892 o67oo.exe vbc.exe PID 1892 wrote to memory of 1328 1892 o67oo.exe vbc.exe PID 1892 wrote to memory of 1328 1892 o67oo.exe vbc.exe PID 1892 wrote to memory of 1328 1892 o67oo.exe vbc.exe PID 1328 wrote to memory of 360 1328 vbc.exe o67oo.exe PID 1328 wrote to memory of 360 1328 vbc.exe o67oo.exe PID 1328 wrote to memory of 360 1328 vbc.exe o67oo.exe PID 1328 wrote to memory of 360 1328 vbc.exe o67oo.exe PID 1328 wrote to memory of 360 1328 vbc.exe o67oo.exe PID 1328 wrote to memory of 360 1328 vbc.exe o67oo.exe PID 1328 wrote to memory of 360 1328 vbc.exe o67oo.exe PID 1328 wrote to memory of 360 1328 vbc.exe o67oo.exe PID 1328 wrote to memory of 360 1328 vbc.exe o67oo.exe PID 360 wrote to memory of 1964 360 o67oo.exe o67oo.exe PID 360 wrote to memory of 1964 360 o67oo.exe o67oo.exe PID 360 wrote to memory of 1964 360 o67oo.exe o67oo.exe PID 360 wrote to memory of 1964 360 o67oo.exe o67oo.exe PID 360 wrote to memory of 1964 360 o67oo.exe o67oo.exe PID 360 wrote to memory of 1964 360 o67oo.exe o67oo.exe PID 360 wrote to memory of 1964 360 o67oo.exe o67oo.exe PID 360 wrote to memory of 1964 360 o67oo.exe o67oo.exe PID 360 wrote to memory of 1964 360 o67oo.exe o67oo.exe PID 360 wrote to memory of 1964 360 o67oo.exe o67oo.exe PID 360 wrote to memory of 1964 360 o67oo.exe o67oo.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0.exe"C:\Users\Admin\AppData\Local\Temp\59ebbdf21f80732ee51d8c038fca9306470341d1260751b05626a72a9513a1f0.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Users\Admin\AppData\Roaming\4xmlu\o67oo.exe"C:\Users\Admin\AppData\Roaming\4xmlu\o67oo.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Roaming\4xmlu\o67oo.exe"C:\Users\Admin\AppData\Roaming\4xmlu\o67oo.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Users\Admin\AppData\Roaming\4xmlu\o67oo.exeC:\Users\Admin\AppData\Roaming\4xmlu\o67oo.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1964
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
762KB
MD5e0737d3e97b528ff480a4016fb915511
SHA1e3f0ea67cb3019e1663f5462b21009f4e2bc3bd1
SHA2566a25b4d561b71867ad482557278c780501acf8200a72926f27b99cad8cf4e9ed
SHA512a37f5864d452c31820e9a08582e0fcc67c45cf4c74c0a96b256047cbc4b4b7bbaafb1fe7ec5c9211020d98cc4abfa59c75d0fe4344bcbd2f90b8c90abd4b273e
-
Filesize
2B
MD593e00066d099c0485cfffa1359246d26
SHA1bc69a773f37b2f2071e25f755a66d47b871e5d98
SHA2563b271649a94ad5be4ef46ecbb6a4e7363e8498b7e69b751737bf30df2e0d1dde
SHA512d3dfe508cacae7d36f13908134b5b438b87429fcf93ccb060bcfa346c04633a99e9ca497297418c969537be1da2405171982794055dd0f52e59a82720d3b3d02
-
Filesize
3KB
MD50097ffd3c0d7fee5deb04c5503189995
SHA192a5fc2e5e49b721ff98c6869f164c167fd78e07
SHA256b7b9c173d28df1e581f50c2eb321323afdd8bba308ae01fd23402e15b31941f3
SHA512f38ee1af1c752a0c87633f87673818d822d710dd1ed8b6020951c8df59272d8401228d68973f507a193516b1fcc0f5e28bd9bfb7c3fd5c73c7a3f7dae5d3bcda
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852
-
Filesize
1.5MB
MD5543049a58fe847362b15f8e1aee75721
SHA1b22a1f4731c3123ed9af1d3979930775918a462e
SHA25699afe2ac82bc3efc48cd70ec9acab914989e6e60007400629d3001799ccbb5cf
SHA512fdf84f0738e2ec1503ffc557f07dea550ee48647c51a70c6bad2eb4f5e4514b3681a06511a88451f58e2942f084aa3bef79d9cb13b1b6d37af16ec5a35f6e852