Analysis
-
max time kernel
146s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 03:45
Static task
static1
Behavioral task
behavioral1
Sample
MalwareBazaar.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
MalwareBazaar.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
gynoox.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
gynoox.exe
Resource
win10v2004-20240709-en
General
-
Target
MalwareBazaar.exe
-
Size
214KB
-
MD5
3e63f636a493ee210b6627e63c954665
-
SHA1
07edabeb3c3375043de5a0a2af222a9888e40c75
-
SHA256
e00c78c89894028be70f0125ab20cc5919d39930fb98d01b367c3f05d69029ce
-
SHA512
4bea9a7c13ff9543532bbbb5ef1497bf3d31d03d1629365d962e953695ebc4d77dde329b451e1b07cdf18c3883d22df2e58b2602e116e32bc4292e027b2c0a42
-
SSDEEP
6144:oNeZg14JHXuf5KmE+rZOuTdcC2xIC90pLXg4Psgf:oN8HXG1NOiSPxbCLX7PsO
Malware Config
Extracted
xloader
2.5
hsot
carefile.icu
autrement-dit-translation.com
openft.xyz
hip-express.com
snowwisdom.com
effort-less.xyz
cardiopulmonaryservices.com
mednotics.com
hxtz54.com
sendex.global
getemergencyfood.com
xn--ekr703aymjgvi.group
whitmanrandolphmath.com
theunitedgamingleague.net
sxqnx.com
finessemovement.com
srsremodelinginc.com
shuddhiorganics.com
tlichomedical.com
millennium.school
medienexpert.com
shawnahearnarts.com
brandianext.com
earthezy.com
foldablehandset.com
buggy4t.com
yavuzselimorganizasyon.com
ky1v.com
physicsonscreen.com
9job8.com
myadventures.online
goalcations.com
bamshre.club
senangdominos.com
lookatcrash.online
luxberryco.com
azvirtualstaff.com
copytradepremium.com
cafebar-may.com
rghuba.com
workkiyu.com
yogaforall1.website
vamp4883.com
ametinteriors.com
churchvilledental.com
bj-htjy360.com
eightwebbuilder.com
missuniversepr.com
hoppehour.com
colesfax.com
str8ey.com
wdz888995.com
bellezanaturalcyc.com
pkathletics.com
clintoncohealth.com
ord12route.art
clutterfix.biz
redroofinnmilwaukee.com
miamifastcashhomebuyers.com
career-atoz.com
fpinc.net
mistermissyco.com
pubtech-marketing.com
4m5k.com
skyrim.company
Signatures
-
Xloader payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2176-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2176-15-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2768-21-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Executes dropped EXE 2 IoCs
Processes:
gynoox.exegynoox.exepid Process 2744 gynoox.exe 2176 gynoox.exe -
Loads dropped DLL 2 IoCs
Processes:
MalwareBazaar.exegynoox.exepid Process 2084 MalwareBazaar.exe 2744 gynoox.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
gynoox.exegynoox.exeNAPSTAT.EXEdescription pid Process procid_target PID 2744 set thread context of 2176 2744 gynoox.exe 31 PID 2176 set thread context of 1196 2176 gynoox.exe 21 PID 2768 set thread context of 1196 2768 NAPSTAT.EXE 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
MalwareBazaar.exegynoox.exeNAPSTAT.EXEcmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MalwareBazaar.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gynoox.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NAPSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
gynoox.exeNAPSTAT.EXEpid Process 2176 gynoox.exe 2176 gynoox.exe 2768 NAPSTAT.EXE 2768 NAPSTAT.EXE 2768 NAPSTAT.EXE 2768 NAPSTAT.EXE 2768 NAPSTAT.EXE 2768 NAPSTAT.EXE 2768 NAPSTAT.EXE 2768 NAPSTAT.EXE 2768 NAPSTAT.EXE 2768 NAPSTAT.EXE 2768 NAPSTAT.EXE 2768 NAPSTAT.EXE 2768 NAPSTAT.EXE 2768 NAPSTAT.EXE 2768 NAPSTAT.EXE 2768 NAPSTAT.EXE 2768 NAPSTAT.EXE 2768 NAPSTAT.EXE 2768 NAPSTAT.EXE 2768 NAPSTAT.EXE 2768 NAPSTAT.EXE 2768 NAPSTAT.EXE 2768 NAPSTAT.EXE 2768 NAPSTAT.EXE 2768 NAPSTAT.EXE 2768 NAPSTAT.EXE 2768 NAPSTAT.EXE 2768 NAPSTAT.EXE 2768 NAPSTAT.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
gynoox.exeNAPSTAT.EXEpid Process 2176 gynoox.exe 2176 gynoox.exe 2176 gynoox.exe 2768 NAPSTAT.EXE 2768 NAPSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
gynoox.exeNAPSTAT.EXEdescription pid Process Token: SeDebugPrivilege 2176 gynoox.exe Token: SeDebugPrivilege 2768 NAPSTAT.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
MalwareBazaar.exegynoox.exeExplorer.EXENAPSTAT.EXEdescription pid Process procid_target PID 2084 wrote to memory of 2744 2084 MalwareBazaar.exe 30 PID 2084 wrote to memory of 2744 2084 MalwareBazaar.exe 30 PID 2084 wrote to memory of 2744 2084 MalwareBazaar.exe 30 PID 2084 wrote to memory of 2744 2084 MalwareBazaar.exe 30 PID 2744 wrote to memory of 2176 2744 gynoox.exe 31 PID 2744 wrote to memory of 2176 2744 gynoox.exe 31 PID 2744 wrote to memory of 2176 2744 gynoox.exe 31 PID 2744 wrote to memory of 2176 2744 gynoox.exe 31 PID 2744 wrote to memory of 2176 2744 gynoox.exe 31 PID 2744 wrote to memory of 2176 2744 gynoox.exe 31 PID 2744 wrote to memory of 2176 2744 gynoox.exe 31 PID 1196 wrote to memory of 2768 1196 Explorer.EXE 32 PID 1196 wrote to memory of 2768 1196 Explorer.EXE 32 PID 1196 wrote to memory of 2768 1196 Explorer.EXE 32 PID 1196 wrote to memory of 2768 1196 Explorer.EXE 32 PID 2768 wrote to memory of 2844 2768 NAPSTAT.EXE 33 PID 2768 wrote to memory of 2844 2768 NAPSTAT.EXE 33 PID 2768 wrote to memory of 2844 2768 NAPSTAT.EXE 33 PID 2768 wrote to memory of 2844 2768 NAPSTAT.EXE 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"C:\Users\Admin\AppData\Local\Temp\MalwareBazaar.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\gynoox.exeC:\Users\Admin\AppData\Local\Temp\gynoox.exe C:\Users\Admin\AppData\Local\Temp\jbvzhvisee3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\gynoox.exeC:\Users\Admin\AppData\Local\Temp\gynoox.exe C:\Users\Admin\AppData\Local\Temp\jbvzhvisee4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
-
-
-
C:\Windows\SysWOW64\NAPSTAT.EXE"C:\Windows\SysWOW64\NAPSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\gynoox.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2844
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD514eb81fc11bc5a7519e1d13d9c8db270
SHA1e7fb259e2d54e8d489c31394f4972f8c983a10f6
SHA256fc71e6c40f10c1e7168aafbc20e02af04e4d6e20c5eeed30d337e22f7f3eb4e5
SHA51235c2ae89f4927d3c5e78c05f28203c00ba6ba5de10b0f11ab1573114c5170921ea6412a90b2992b2a5efafb59757c9b0810b3bda86293e9fe5b02e03f225a08a
-
Filesize
163KB
MD5608f25eda319b6b7ff254ae53a9e8705
SHA122fb3e020a4d186fd6e66604754e42c94e546e44
SHA256828363931d3b8d883bc873ca92fdfe5c84937f030c1907868d7e8cecd2ca08e4
SHA512fac692824d87c2017ec1a4a2f5a642a0f89403c174933e1c7077e0e1098ea3f63a5ecf5ac7107e5c6d440c120b40c01bb2bc812d1c3d50dafe3229b9e66cb1eb
-
Filesize
3KB
MD5c81d16f671e6bdf7f5ae1c7003856717
SHA1031ae8483b93c7040fb327d1141dfafa636b75bb
SHA256ea757de6b7cb2593fbdac083b42f2143812370c864e30c8c461de152664e9a1f
SHA512f08e25b1f3ba7e58b4f4993b4cf4079e45c132dc85f6f323eba83c4a92d61e76c74a0b264802aabc031f08f13d291d1c6556bd8d7747ba5f37b306346bc732f8