Overview
overview
10Static
static
1033.exe
windows10-2004-x64
1034.exe
windows10-2004-x64
1035.exe
windows10-2004-x64
1036.exe
windows10-2004-x64
1037.exe
windows10-2004-x64
1038.exe
windows10-2004-x64
1039.exe
windows10-2004-x64
1040.exe
windows10-2004-x64
1041.exe
windows10-2004-x64
1042.exe
windows10-2004-x64
1043.exe
windows10-2004-x64
1044.exe
windows10-2004-x64
1045.exe
windows10-2004-x64
1046.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
166s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02-09-2022 03:27
Behavioral task
behavioral1
Sample
33.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral2
Sample
34.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
35.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral4
Sample
36.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
37.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral6
Sample
38.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
39.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral8
Sample
40.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral9
Sample
41.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral10
Sample
42.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral11
Sample
43.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral12
Sample
44.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
45.exe
Resource
win10v2004-20220812-en
General
-
Target
38.exe
-
Size
176KB
-
MD5
8d832564ccf944aa80614078e59afca3
-
SHA1
0eb7785515b2acc2c35fd4ec7b822fe97ef884b9
-
SHA256
71d20cb55abb01e4cdb1d2f7a5e61f6048c34079970d5850b785386ca53c7c1a
-
SHA512
c5a1a9acb1da0d57b057e0a1a8141b21f209d50ed838e03ee904364255e4889beaea43173e65d1188cd8057c6ac25f43328f0ba181e7ee34c8b49c34aa41bfc9
-
SSDEEP
3072:xrtRM59Srdxq5+HIbTS4WGRbQ/0oqcMisygnrs4oEV4oyDaShxt/RZG0TQh/mxrC:9I596dYoo3SYbQMogyUY4hV4oyDa87Zi
Malware Config
Signatures
-
Xloader payload 2 IoCs
Processes:
resource yara_rule behavioral6/memory/4632-137-0x0000000000940000-0x000000000096C000-memory.dmp xloader behavioral6/memory/4632-142-0x0000000000940000-0x000000000096C000-memory.dmp xloader -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\0RX8FTBP = "C:\\Program Files (x86)\\Vwpx\\cz74anojp0kz.exe" explorer.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
38.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 38.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
38.exeexplorer.exedescription pid process target process PID 5016 set thread context of 2556 5016 38.exe Explorer.EXE PID 4632 set thread context of 2556 4632 explorer.exe Explorer.EXE -
Drops file in Program Files directory 1 IoCs
Processes:
explorer.exedescription ioc process File opened for modification C:\Program Files (x86)\Vwpx\cz74anojp0kz.exe explorer.exe -
Processes:
explorer.exedescription ioc process Key created \Registry\User\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 explorer.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
Processes:
38.exeexplorer.exepid process 5016 38.exe 5016 38.exe 5016 38.exe 5016 38.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2556 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
38.exeexplorer.exepid process 5016 38.exe 5016 38.exe 5016 38.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe 4632 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
38.exeexplorer.exedescription pid process Token: SeDebugPrivilege 5016 38.exe Token: SeDebugPrivilege 4632 explorer.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 2556 Explorer.EXE 2556 Explorer.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
Explorer.EXEexplorer.exedescription pid process target process PID 2556 wrote to memory of 4632 2556 Explorer.EXE explorer.exe PID 2556 wrote to memory of 4632 2556 Explorer.EXE explorer.exe PID 2556 wrote to memory of 4632 2556 Explorer.EXE explorer.exe PID 4632 wrote to memory of 4616 4632 explorer.exe cmd.exe PID 4632 wrote to memory of 4616 4632 explorer.exe cmd.exe PID 4632 wrote to memory of 4616 4632 explorer.exe cmd.exe PID 4632 wrote to memory of 3116 4632 explorer.exe Firefox.exe PID 4632 wrote to memory of 3116 4632 explorer.exe Firefox.exe PID 4632 wrote to memory of 3116 4632 explorer.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\38.exe"C:\Users\Admin\AppData\Local\Temp\38.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Adds policy Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\38.exe"3⤵
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2556-134-0x0000000008940000-0x0000000008AC5000-memory.dmpFilesize
1.5MB
-
memory/2556-141-0x0000000008AD0000-0x0000000008BEF000-memory.dmpFilesize
1.1MB
-
memory/2556-143-0x0000000008AD0000-0x0000000008BEF000-memory.dmpFilesize
1.1MB
-
memory/4616-138-0x0000000000000000-mapping.dmp
-
memory/4632-135-0x0000000000000000-mapping.dmp
-
memory/4632-136-0x0000000000E50000-0x0000000001283000-memory.dmpFilesize
4.2MB
-
memory/4632-137-0x0000000000940000-0x000000000096C000-memory.dmpFilesize
176KB
-
memory/4632-139-0x0000000002F80000-0x00000000032CA000-memory.dmpFilesize
3.3MB
-
memory/4632-140-0x0000000002D20000-0x0000000002DB0000-memory.dmpFilesize
576KB
-
memory/4632-142-0x0000000000940000-0x000000000096C000-memory.dmpFilesize
176KB
-
memory/5016-132-0x0000000000F80000-0x00000000012CA000-memory.dmpFilesize
3.3MB
-
memory/5016-133-0x00000000009B0000-0x00000000009C1000-memory.dmpFilesize
68KB