Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:16
Static task
static1
Behavioral task
behavioral1
Sample
d036c4b1a4ff6265030084d453558c56f6a2d19b5a6af25943c47bc96895891c.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d036c4b1a4ff6265030084d453558c56f6a2d19b5a6af25943c47bc96895891c.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
xnozsgld.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
xnozsgld.exe
Resource
win10v2004-20241007-en
General
-
Target
d036c4b1a4ff6265030084d453558c56f6a2d19b5a6af25943c47bc96895891c.exe
-
Size
330KB
-
MD5
58a93d1d064b9e8265ea798531adb0bf
-
SHA1
d5e30f238fabd304d30ba2c726c71fb47765b494
-
SHA256
d036c4b1a4ff6265030084d453558c56f6a2d19b5a6af25943c47bc96895891c
-
SHA512
c5e9c0e07ea8904a45011380836ff8f0b936954729df4fb18f62414322f5815ec8ebc5803729a13b783cf87a5bd723fc821405e3579e017c7b19059e57f76bfb
-
SSDEEP
6144:PYa69K+mD7y0q2hhBCH4m6Qx8qQ5+/ucZiE2TZPwc7j0W6KmZE0HOkv/kBa:PYnUD71qc+6Q+qQuu/Tn396KmLDv/
Malware Config
Extracted
formbook
poub
WY0eksfISzRg4O6c+opnGL6gaw==
moRjn9ExtYi8UmUo+Tya
2vME+GedoxzFnuLXesUoVj4=
EvW4JWJ1NQ8nN3tA3SM=
2mK9efMZMgN1VOs=
8d0jua5b0J6AQEW7
/2cyThOd37DSTYMASDye4Q0t/Vs=
ral+tbIh2KKAQEW7
YLY9jsPtYB/FRmMo+Tya
R1WcElWAMtFxFrVqtZT2ZpIS9xRZNho=
KFXGg/T1pCC9GjrxUPTcjw==
8mMlK5nDwjjPFTP5jMtAtQ0t/Vs=
c7am8nhhlCo=
UW91trZj6dENxuRdpxOvW1Cf
sjOMUcvq6lYJCZEfV4euFzY=
62nBgPjdmWQkmWElww==
64E8JqA1aruSUvw=
NqI1reXpcR+REye0
8+y1oOsbjgSyEhjXUPTcjw==
Rx9by8gNBwN1VOs=
Muif0yE4CQN1VOs=
VEt6//SsIukFo46EOTs=
Z8su52MYL67C
usDwuHRs8/KlWg==
idmltXXu7XAgHLE/UPTcjw==
QPrxO2shWNiGexGboHDSRqBQ1TBd
hq9rqBND8/KlWg==
QS9iHFx08/KlWg==
v1soVFoThEdt/B/dK0v4+6Wb
7rqJytN13KKAQEW7
OWbeN2SDJwonsI6EOTs=
aqQrrKZDm16GMlAtvxavW1Cf
imnEZWIEbC4M8Q+i
Bry3oQg5+6ZaUNxzwg==
B3vYmyxPQS5XYvmCsqQXX8X948Zf
KbGBmwwCyKTKsUcRUNN6CD61aw==
2WpDae4P+W4cdqc8kPBcjqg0wS1X
MvkZLPRY25jI
Alr0VZGxYxG3dR/zSNjBhQ==
ZJkdjczlrF+8l0Os
dcmMkFm+QhFD4OM=
fMdUrd4J1n4mmWElww==
Gat+k1fHg11vTQ==
sn+7Q4uxaAu9FyGv7k24F1DWaBEvmRI=
CjvGRTnXOhtN6QSNxhmvW1Cf
CpHvP2VSxaKAQEW7
qQWkEUJYFKhPttOZ4MarX8KKLl+/Jg==
GNVP4yIy8/KlWg==
pqfVAERhYxN7YPM=
9nS5b/AGCpZNAfZj1A==
a3GcpSND8/KlWg==
fin6NmQXayreIOrzPyw=
EjdROfeTsDPVH+rzPyw=
DO4xD8nURBwM8Q+i
+p/LQHFh0KOAQEW7
iNos10QpwjvjvFrXJYtYFiuHdA==
SX//aFP4Yi5T6NbcKQr07J6e
2NKh0dNr52sTdH4OSNjBhQ==
ZMSJmgsxFrlp5fnecrgeVYcP4xRZNho=
oXmlavAJ+3IbFbl3Gm4H+iKG
ijjWRYCaXiTcigreSNjBhQ==
ZqpH49I4XPu1k+rzPyw=
ZZUh+4FrrBbKukgJWoeuFzY=
lLnTxHn7rq/W9G8rzjsgCnyBYw==
drzjup.space
Signatures
-
Formbook family
-
Xloader family
-
Xloader payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/348-12-0x0000000000400000-0x000000000042C000-memory.dmp xloader behavioral1/memory/348-16-0x0000000000400000-0x000000000042C000-memory.dmp xloader behavioral1/memory/348-19-0x0000000000400000-0x000000000042C000-memory.dmp xloader -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
xnozsgld.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Control Panel\International\Geo\Nation xnozsgld.exe -
Executes dropped EXE 2 IoCs
Processes:
xnozsgld.exexnozsgld.exepid Process 2516 xnozsgld.exe 348 xnozsgld.exe -
Loads dropped DLL 2 IoCs
Processes:
d036c4b1a4ff6265030084d453558c56f6a2d19b5a6af25943c47bc96895891c.exexnozsgld.exepid Process 2976 d036c4b1a4ff6265030084d453558c56f6a2d19b5a6af25943c47bc96895891c.exe 2516 xnozsgld.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
xnozsgld.exexnozsgld.exedescription pid Process procid_target PID 2516 set thread context of 348 2516 xnozsgld.exe 31 PID 348 set thread context of 1180 348 xnozsgld.exe 21 PID 348 set thread context of 1180 348 xnozsgld.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2700 2836 WerFault.exe 33 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
d036c4b1a4ff6265030084d453558c56f6a2d19b5a6af25943c47bc96895891c.exexnozsgld.exemsiexec.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d036c4b1a4ff6265030084d453558c56f6a2d19b5a6af25943c47bc96895891c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xnozsgld.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
xnozsgld.exepid Process 348 xnozsgld.exe 348 xnozsgld.exe 348 xnozsgld.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
xnozsgld.exexnozsgld.exepid Process 2516 xnozsgld.exe 348 xnozsgld.exe 348 xnozsgld.exe 348 xnozsgld.exe 348 xnozsgld.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
xnozsgld.exeExplorer.EXEdescription pid Process Token: SeDebugPrivilege 348 xnozsgld.exe Token: SeShutdownPrivilege 1180 Explorer.EXE Token: SeShutdownPrivilege 1180 Explorer.EXE Token: SeShutdownPrivilege 1180 Explorer.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
d036c4b1a4ff6265030084d453558c56f6a2d19b5a6af25943c47bc96895891c.exexnozsgld.exeExplorer.EXEmsiexec.exedescription pid Process procid_target PID 2976 wrote to memory of 2516 2976 d036c4b1a4ff6265030084d453558c56f6a2d19b5a6af25943c47bc96895891c.exe 30 PID 2976 wrote to memory of 2516 2976 d036c4b1a4ff6265030084d453558c56f6a2d19b5a6af25943c47bc96895891c.exe 30 PID 2976 wrote to memory of 2516 2976 d036c4b1a4ff6265030084d453558c56f6a2d19b5a6af25943c47bc96895891c.exe 30 PID 2976 wrote to memory of 2516 2976 d036c4b1a4ff6265030084d453558c56f6a2d19b5a6af25943c47bc96895891c.exe 30 PID 2516 wrote to memory of 348 2516 xnozsgld.exe 31 PID 2516 wrote to memory of 348 2516 xnozsgld.exe 31 PID 2516 wrote to memory of 348 2516 xnozsgld.exe 31 PID 2516 wrote to memory of 348 2516 xnozsgld.exe 31 PID 2516 wrote to memory of 348 2516 xnozsgld.exe 31 PID 1180 wrote to memory of 2836 1180 Explorer.EXE 33 PID 1180 wrote to memory of 2836 1180 Explorer.EXE 33 PID 1180 wrote to memory of 2836 1180 Explorer.EXE 33 PID 1180 wrote to memory of 2836 1180 Explorer.EXE 33 PID 1180 wrote to memory of 2836 1180 Explorer.EXE 33 PID 1180 wrote to memory of 2836 1180 Explorer.EXE 33 PID 1180 wrote to memory of 2836 1180 Explorer.EXE 33 PID 2836 wrote to memory of 2700 2836 msiexec.exe 34 PID 2836 wrote to memory of 2700 2836 msiexec.exe 34 PID 2836 wrote to memory of 2700 2836 msiexec.exe 34 PID 2836 wrote to memory of 2700 2836 msiexec.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\d036c4b1a4ff6265030084d453558c56f6a2d19b5a6af25943c47bc96895891c.exe"C:\Users\Admin\AppData\Local\Temp\d036c4b1a4ff6265030084d453558c56f6a2d19b5a6af25943c47bc96895891c.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\xnozsgld.exe"C:\Users\Admin\AppData\Local\Temp\xnozsgld.exe" C:\Users\Admin\AppData\Local\Temp\ucpha.v3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\xnozsgld.exe"C:\Users\Admin\AppData\Local\Temp\xnozsgld.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:348
-
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2836 -s 2683⤵
- Program crash
PID:2700
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD528eed71dacb4522dbf2c1aeca39e2c5d
SHA1b5633dcf66f1657552ba992c55e7124250c23a35
SHA25622bfb554d299b3fc4686643b0522384db2c92ebf64bd80475439b8dd9bbe7bc5
SHA5127f08bc8237868fb6509baafd3c4a01663b0577ebec86aef9cb185bec13acb8c5787604329a85c74a2ebbc3f39933929a2f36ea21513330124bd2d66363e54cae
-
Filesize
5KB
MD5d934356067b6133646fad1aa12371a1e
SHA123fe2ea62be0949a32ea6609345a8b8d27ce3757
SHA25681f2eb3bd3c2135b0d6abdcc4f2e6427a76dac558928d4c8beb648a045010ae5
SHA51226b50a5599353328bfc4609754ead9efd9e4084e4fdb6a9479ad56ea79aed81648de897e66c3dd1c9de1cdb6eba04855e4498f0d8d09f7804224ba27ceab91d8
-
Filesize
253KB
MD5d8394c44bc790e1bdab00823f689c1bd
SHA1735d8986424e2ab3440f49a7a720ecaad43d491d
SHA256234d80febbdd23b49a2ff5db4e51aa33e82cd77ff082ac6e8f32078cdd701007
SHA512c6dd135932d86f6a7ae2b82045e024fddad3ce7286672c134e8314d2a7a003d237b4b62141b67c7947e6ca1fffa78047e015c5e714cfb56739ef152485cd559e