Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2023 03:02
Static task
static1
Behavioral task
behavioral1
Sample
537ca83e58dfc0da3a87d09b50fcbf04ec5ba736c19c9f7cec9733a58c57a961.exe
Resource
win7-20230220-en
General
-
Target
537ca83e58dfc0da3a87d09b50fcbf04ec5ba736c19c9f7cec9733a58c57a961.exe
-
Size
274KB
-
MD5
a67b9455e07da0e206e388aadfce24ee
-
SHA1
ae4726f82b0a392b91655f91fdd634f810722027
-
SHA256
537ca83e58dfc0da3a87d09b50fcbf04ec5ba736c19c9f7cec9733a58c57a961
-
SHA512
a086bcc0ff5789d780aee0aa64fb09053fb1736a0dc70bd3b6321e0c3671b48d1e0d220d6a4e85c8c2ca0ef0122a4a7c3f3ca9d42bbda62b093c54aa73f603f2
-
SSDEEP
6144:PYa6kSIwjB9pgGrwb35p84UEexcGqBpFtofapRQlJc6QNM:PYiShSGrspYEycnPksQnCK
Malware Config
Extracted
formbook
poub
WY0eksfISzRg4O6c+opnGL6gaw==
moRjn9ExtYi8UmUo+Tya
2vME+GedoxzFnuLXesUoVj4=
EvW4JWJ1NQ8nN3tA3SM=
2mK9efMZMgN1VOs=
8d0jua5b0J6AQEW7
/2cyThOd37DSTYMASDye4Q0t/Vs=
ral+tbIh2KKAQEW7
YLY9jsPtYB/FRmMo+Tya
R1WcElWAMtFxFrVqtZT2ZpIS9xRZNho=
KFXGg/T1pCC9GjrxUPTcjw==
8mMlK5nDwjjPFTP5jMtAtQ0t/Vs=
c7am8nhhlCo=
UW91trZj6dENxuRdpxOvW1Cf
sjOMUcvq6lYJCZEfV4euFzY=
62nBgPjdmWQkmWElww==
64E8JqA1aruSUvw=
NqI1reXpcR+REye0
8+y1oOsbjgSyEhjXUPTcjw==
Rx9by8gNBwN1VOs=
Muif0yE4CQN1VOs=
VEt6//SsIukFo46EOTs=
Z8su52MYL67C
usDwuHRs8/KlWg==
idmltXXu7XAgHLE/UPTcjw==
QPrxO2shWNiGexGboHDSRqBQ1TBd
hq9rqBND8/KlWg==
QS9iHFx08/KlWg==
v1soVFoThEdt/B/dK0v4+6Wb
7rqJytN13KKAQEW7
OWbeN2SDJwonsI6EOTs=
aqQrrKZDm16GMlAtvxavW1Cf
imnEZWIEbC4M8Q+i
Bry3oQg5+6ZaUNxzwg==
B3vYmyxPQS5XYvmCsqQXX8X948Zf
KbGBmwwCyKTKsUcRUNN6CD61aw==
2WpDae4P+W4cdqc8kPBcjqg0wS1X
MvkZLPRY25jI
Alr0VZGxYxG3dR/zSNjBhQ==
ZJkdjczlrF+8l0Os
dcmMkFm+QhFD4OM=
fMdUrd4J1n4mmWElww==
Gat+k1fHg11vTQ==
sn+7Q4uxaAu9FyGv7k24F1DWaBEvmRI=
CjvGRTnXOhtN6QSNxhmvW1Cf
CpHvP2VSxaKAQEW7
qQWkEUJYFKhPttOZ4MarX8KKLl+/Jg==
GNVP4yIy8/KlWg==
pqfVAERhYxN7YPM=
9nS5b/AGCpZNAfZj1A==
a3GcpSND8/KlWg==
fin6NmQXayreIOrzPyw=
EjdROfeTsDPVH+rzPyw=
DO4xD8nURBwM8Q+i
+p/LQHFh0KOAQEW7
iNos10QpwjvjvFrXJYtYFiuHdA==
SX//aFP4Yi5T6NbcKQr07J6e
2NKh0dNr52sTdH4OSNjBhQ==
ZMSJmgsxFrlp5fnecrgeVYcP4xRZNho=
oXmlavAJ+3IbFbl3Gm4H+iKG
ijjWRYCaXiTcigreSNjBhQ==
ZqpH49I4XPu1k+rzPyw=
ZZUh+4FrrBbKukgJWoeuFzY=
lLnTxHn7rq/W9G8rzjsgCnyBYw==
drzjup.space
Signatures
-
Xloader payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/736-141-0x0000000000400000-0x000000000042C000-memory.dmp xloader behavioral2/memory/736-148-0x0000000000400000-0x000000000042C000-memory.dmp xloader behavioral2/memory/736-152-0x0000000000400000-0x000000000042C000-memory.dmp xloader behavioral2/memory/2692-155-0x00000000001A0000-0x00000000001CC000-memory.dmp xloader behavioral2/memory/2692-157-0x00000000001A0000-0x00000000001CC000-memory.dmp xloader -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
dwxrv.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation dwxrv.exe -
Executes dropped EXE 2 IoCs
Processes:
dwxrv.exedwxrv.exepid process 1652 dwxrv.exe 736 dwxrv.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
dwxrv.exedwxrv.exemstsc.exedescription pid process target process PID 1652 set thread context of 736 1652 dwxrv.exe dwxrv.exe PID 736 set thread context of 3184 736 dwxrv.exe Explorer.EXE PID 736 set thread context of 3184 736 dwxrv.exe Explorer.EXE PID 2692 set thread context of 3184 2692 mstsc.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 61 IoCs
Processes:
dwxrv.exemstsc.exepid process 736 dwxrv.exe 736 dwxrv.exe 736 dwxrv.exe 736 dwxrv.exe 736 dwxrv.exe 736 dwxrv.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe 2692 mstsc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3184 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
dwxrv.exedwxrv.exemstsc.exepid process 1652 dwxrv.exe 736 dwxrv.exe 736 dwxrv.exe 736 dwxrv.exe 736 dwxrv.exe 2692 mstsc.exe 2692 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
dwxrv.exemstsc.exedescription pid process Token: SeDebugPrivilege 736 dwxrv.exe Token: SeDebugPrivilege 2692 mstsc.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
537ca83e58dfc0da3a87d09b50fcbf04ec5ba736c19c9f7cec9733a58c57a961.exedwxrv.exeExplorer.EXEmstsc.exedescription pid process target process PID 2096 wrote to memory of 1652 2096 537ca83e58dfc0da3a87d09b50fcbf04ec5ba736c19c9f7cec9733a58c57a961.exe dwxrv.exe PID 2096 wrote to memory of 1652 2096 537ca83e58dfc0da3a87d09b50fcbf04ec5ba736c19c9f7cec9733a58c57a961.exe dwxrv.exe PID 2096 wrote to memory of 1652 2096 537ca83e58dfc0da3a87d09b50fcbf04ec5ba736c19c9f7cec9733a58c57a961.exe dwxrv.exe PID 1652 wrote to memory of 736 1652 dwxrv.exe dwxrv.exe PID 1652 wrote to memory of 736 1652 dwxrv.exe dwxrv.exe PID 1652 wrote to memory of 736 1652 dwxrv.exe dwxrv.exe PID 1652 wrote to memory of 736 1652 dwxrv.exe dwxrv.exe PID 3184 wrote to memory of 2692 3184 Explorer.EXE mstsc.exe PID 3184 wrote to memory of 2692 3184 Explorer.EXE mstsc.exe PID 3184 wrote to memory of 2692 3184 Explorer.EXE mstsc.exe PID 2692 wrote to memory of 2540 2692 mstsc.exe cmd.exe PID 2692 wrote to memory of 2540 2692 mstsc.exe cmd.exe PID 2692 wrote to memory of 2540 2692 mstsc.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\537ca83e58dfc0da3a87d09b50fcbf04ec5ba736c19c9f7cec9733a58c57a961.exe"C:\Users\Admin\AppData\Local\Temp\537ca83e58dfc0da3a87d09b50fcbf04ec5ba736c19c9f7cec9733a58c57a961.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\dwxrv.exe"C:\Users\Admin\AppData\Local\Temp\dwxrv.exe" C:\Users\Admin\AppData\Local\Temp\nismj.s3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\dwxrv.exe"C:\Users\Admin\AppData\Local\Temp\dwxrv.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\dwxrv.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\dwxrv.exeFilesize
101KB
MD51d215b52e2994740c3cd03b1c1574c53
SHA1675daabaa68a01d0c2ca1b8a97eded39e342084e
SHA25672866ee7f6d1d1f83658457c1619c3b7db5b3773409eaf86cabc9bb8d5bb1c0d
SHA512ad7b25924c1656fe7b88eb840ed0608deea600f8b6d6df11261c8a5c1c0939c3630cb949ab549909fab999d9a1860a62d083179ccf56ee5aa26411aa7769c82b
-
C:\Users\Admin\AppData\Local\Temp\dwxrv.exeFilesize
101KB
MD51d215b52e2994740c3cd03b1c1574c53
SHA1675daabaa68a01d0c2ca1b8a97eded39e342084e
SHA25672866ee7f6d1d1f83658457c1619c3b7db5b3773409eaf86cabc9bb8d5bb1c0d
SHA512ad7b25924c1656fe7b88eb840ed0608deea600f8b6d6df11261c8a5c1c0939c3630cb949ab549909fab999d9a1860a62d083179ccf56ee5aa26411aa7769c82b
-
C:\Users\Admin\AppData\Local\Temp\dwxrv.exeFilesize
101KB
MD51d215b52e2994740c3cd03b1c1574c53
SHA1675daabaa68a01d0c2ca1b8a97eded39e342084e
SHA25672866ee7f6d1d1f83658457c1619c3b7db5b3773409eaf86cabc9bb8d5bb1c0d
SHA512ad7b25924c1656fe7b88eb840ed0608deea600f8b6d6df11261c8a5c1c0939c3630cb949ab549909fab999d9a1860a62d083179ccf56ee5aa26411aa7769c82b
-
C:\Users\Admin\AppData\Local\Temp\jvpje.gdFilesize
196KB
MD5cfffdffaa191107af9a0aa5462cd94a5
SHA1d337083139a26dd67fa3e549c58d25d22a626cf6
SHA256a21bae4b660fc9be7c86675332961cc2a08e5170612217e5c15456f079b4c99f
SHA5122a2a1598c642faae7011f35f7e86f5be38195e9a685dda412c5799500f7699bdc87ac4f791c5fe4e3cff9227f0716e2852ab68053706b0b248ccf1bde7f414b5
-
C:\Users\Admin\AppData\Local\Temp\nismj.sFilesize
5KB
MD51a26d491632d01552e871920c75c91ec
SHA186aa68d6928221cb58e40838841fb9fa0de0dca4
SHA2568d5d5dec473e49e1388c10c2d36d16930efb10143978e098769f1f3f680f41da
SHA512094b7a5241b53ecc28ecb86c9d8588cb32fe104d6e4809ccf13fa78639ecfd9819ffac52073d7e1b9bc3c46468273bab4c5bdc26e46814690945f1e219526af8
-
memory/736-149-0x0000000000FE0000-0x0000000000FF1000-memory.dmpFilesize
68KB
-
memory/736-152-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/736-146-0x0000000000F70000-0x0000000000F81000-memory.dmpFilesize
68KB
-
memory/736-145-0x00000000014B0000-0x00000000017FA000-memory.dmpFilesize
3.3MB
-
memory/736-148-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/736-141-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/2692-151-0x0000000000BF0000-0x0000000000D2A000-memory.dmpFilesize
1.2MB
-
memory/2692-154-0x0000000000BF0000-0x0000000000D2A000-memory.dmpFilesize
1.2MB
-
memory/2692-155-0x00000000001A0000-0x00000000001CC000-memory.dmpFilesize
176KB
-
memory/2692-156-0x0000000002630000-0x000000000297A000-memory.dmpFilesize
3.3MB
-
memory/2692-157-0x00000000001A0000-0x00000000001CC000-memory.dmpFilesize
176KB
-
memory/2692-159-0x00000000022D0000-0x0000000002360000-memory.dmpFilesize
576KB
-
memory/3184-150-0x000000000ACE0000-0x000000000AE19000-memory.dmpFilesize
1.2MB
-
memory/3184-147-0x0000000009460000-0x00000000095A4000-memory.dmpFilesize
1.3MB
-
memory/3184-160-0x0000000002E40000-0x0000000002F43000-memory.dmpFilesize
1.0MB
-
memory/3184-161-0x0000000002E40000-0x0000000002F43000-memory.dmpFilesize
1.0MB