Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 02:33
Static task
static1
Behavioral task
behavioral1
Sample
249fb8d820272d5672a372465cfb5776.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
249fb8d820272d5672a372465cfb5776.exe
Resource
win10v2004-20231215-en
General
-
Target
249fb8d820272d5672a372465cfb5776.exe
-
Size
433KB
-
MD5
249fb8d820272d5672a372465cfb5776
-
SHA1
165b03a0140a4a1feec63503a1ffd1009d2a42d0
-
SHA256
8452cd6350917ecbecc7828089a30087fd47b25d4995b78699b14e3bb7ee7ade
-
SHA512
e5288edb45d1956fd9cd4472c8e4974d26f0135d0610b165a15990556b6e23582fa9beb0df56c505b5fe12136ea69d526d3b4546a94437bd1fefcf3e3a0437b9
-
SSDEEP
6144:Ojbeiv2zazH8+9kBKbjwuyAFlhntFqAiizBB9QCO6G9o4q85dE6CqX4NKKmImIVC:Ou81L5vqUlhntFqArAKTOOCXSTmJYch
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\ilbsgu\Parameters\ServiceDll = "%SystemRoot%\\System32\\xvlorn.dll" ¹¤¾ß Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Services\ilbsgu\Parameters\ServiceDll = "%SystemRoot%\\System32\\xvlorn.dll" ¹¤¾ß Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet003\Services\ilbsgu\Parameters\ServiceDll = "%SystemRoot%\\System32\\xvlorn.dll" ¹¤¾ß -
Executes dropped EXE 1 IoCs
pid Process 2452 ¹¤¾ß -
Loads dropped DLL 2 IoCs
pid Process 2452 ¹¤¾ß 1484 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 249fb8d820272d5672a372465cfb5776.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\0004d2d1.ini ¹¤¾ß File created C:\Windows\SysWOW64\xvlorn.dll ¹¤¾ß -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2468 wrote to memory of 2452 2468 249fb8d820272d5672a372465cfb5776.exe 89 PID 2468 wrote to memory of 2452 2468 249fb8d820272d5672a372465cfb5776.exe 89 PID 2468 wrote to memory of 2452 2468 249fb8d820272d5672a372465cfb5776.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\249fb8d820272d5672a372465cfb5776.exe"C:\Users\Admin\AppData\Local\Temp\249fb8d820272d5672a372465cfb5776.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\¹¤¾ßC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\¹¤¾ß2⤵
- Sets DLL path for service in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2452
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k ilbsgu1⤵
- Loads dropped DLL
PID:1484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD53168a07f1c4a60e17d8e0106501cbc8f
SHA104ffcb0e1846d94fd8f58935d853de39c89d6cc5
SHA256329b6177b09fd1ad546258f4ea2eb300fb1ab1dc59eb2e670f1e9c96bdd245b0
SHA512baadf8226f8d4b836a0545c78176806499093532d10c3c4f956820458d31c9ca708a41d8a26f0ed1adfb149fa280433b1107193c26042fdb5923b0ac7749cfe8
-
Filesize
32KB
MD507cec5343fc46f52630567fadf9e359a
SHA188969fad8b656727cd1e328a59828d75b6da4936
SHA25641549f6d704f3ed0415c4664be925da7880df0ee1b446baf75152fe692725f66
SHA5128758ffda0d4cf870d9cb2ba348ff6a073df42e27c2f48b3feec96fdb44c8ffb8e00b59f197295cc4bc206f9374823695d4feccefb391b5d70d7c5aace5925601