Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
12-01-2021 07:22
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Documents PL&BL Draft.exe
Resource
win7v20201028
General
-
Target
Shipping Documents PL&BL Draft.exe
-
Size
366KB
-
MD5
1ba16598fa883ad4f4c2238c773268f5
-
SHA1
8181de877164649dcba23d8b5436287636190fec
-
SHA256
6ac9238d32f2a7b7315cdb2755e090aa53431a71d613e188209b02105e3b8af9
-
SHA512
0c04662ca807321fc2facef5702fa136fec8b524613cabd4f6067ed51c80261199ea2d4d58dd2f7188b61381eee42d50fc48e2bed0b158e5159c5b6dab7cba85
Malware Config
Extracted
formbook
http://www.elevatedenterprizes.com/h3qo/
dhflow.com
jyindex.com
ezcleanhandle.com
trungtamcongdong.online
simsprotectionagency.com
easylivemeet.com
blackvikingfashionhouse.com
52banxue.com
girlsinit.com
drhemo.com
freethefarmers.com
velvetrosephotography.com
geometricbotaniclas.com
skyandspirit.com
deltacomunicacao.com
mucademy.com
jaboilfieldsolutions.net
howtowinatblackjacknow.com
anytimegrowth.com
simranluthra.com
thefinleyshow.com
basalmeals.com
esurpluss.com
hrbjczsfs.com
tourphuquocnguyenhien.com
mxprographics.com
themetaphysicalmaster.net
directorystar.asia
thehomeofdiamonds.com
riqinxin.com
covicio.com
sciineurope.com
womensportclothes.com
celestialchimes.net
lotsmen.com
hi-rescloud.net
lewisnathaniel.com
ageonward.com
eyetownglasses.com
bingent.info
matildealvaradovera.com
otorrinonews.com
cdeg898.com
lexingtoncoorgresort.com
minidachshundpups.com
tools365-shop.com
romancingtheeras.com
residentmining.com
aquaflowsprinklers.com
crackapks.com
caffeinatedeverafter.com
sureyyapasa.net
strawberryhearts.com
ptgo.net
devyshkam.com
thethrottletherapy.com
givelyrics.com
signaturepsinc.com
mersinsudunyasi.com
fivedayskitchen.com
fefebeauty.com
long0001.com
hmm40.com
claracarbon.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1868-2-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1868-3-0x000000000041D0E0-mapping.dmp xloader behavioral1/memory/1764-5-0x0000000000000000-mapping.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1784 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Shipping Documents PL&BL Draft.exeShipping Documents PL&BL Draft.execolorcpl.exedescription pid process target process PID 1740 set thread context of 1868 1740 Shipping Documents PL&BL Draft.exe Shipping Documents PL&BL Draft.exe PID 1868 set thread context of 1268 1868 Shipping Documents PL&BL Draft.exe Explorer.EXE PID 1764 set thread context of 1268 1764 colorcpl.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
Shipping Documents PL&BL Draft.execolorcpl.exepid process 1868 Shipping Documents PL&BL Draft.exe 1868 Shipping Documents PL&BL Draft.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe 1764 colorcpl.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
Shipping Documents PL&BL Draft.exeShipping Documents PL&BL Draft.execolorcpl.exepid process 1740 Shipping Documents PL&BL Draft.exe 1868 Shipping Documents PL&BL Draft.exe 1868 Shipping Documents PL&BL Draft.exe 1868 Shipping Documents PL&BL Draft.exe 1764 colorcpl.exe 1764 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Shipping Documents PL&BL Draft.execolorcpl.exedescription pid process Token: SeDebugPrivilege 1868 Shipping Documents PL&BL Draft.exe Token: SeDebugPrivilege 1764 colorcpl.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Shipping Documents PL&BL Draft.exeExplorer.EXEcolorcpl.exedescription pid process target process PID 1740 wrote to memory of 1868 1740 Shipping Documents PL&BL Draft.exe Shipping Documents PL&BL Draft.exe PID 1740 wrote to memory of 1868 1740 Shipping Documents PL&BL Draft.exe Shipping Documents PL&BL Draft.exe PID 1740 wrote to memory of 1868 1740 Shipping Documents PL&BL Draft.exe Shipping Documents PL&BL Draft.exe PID 1740 wrote to memory of 1868 1740 Shipping Documents PL&BL Draft.exe Shipping Documents PL&BL Draft.exe PID 1740 wrote to memory of 1868 1740 Shipping Documents PL&BL Draft.exe Shipping Documents PL&BL Draft.exe PID 1268 wrote to memory of 1764 1268 Explorer.EXE colorcpl.exe PID 1268 wrote to memory of 1764 1268 Explorer.EXE colorcpl.exe PID 1268 wrote to memory of 1764 1268 Explorer.EXE colorcpl.exe PID 1268 wrote to memory of 1764 1268 Explorer.EXE colorcpl.exe PID 1764 wrote to memory of 1784 1764 colorcpl.exe cmd.exe PID 1764 wrote to memory of 1784 1764 colorcpl.exe cmd.exe PID 1764 wrote to memory of 1784 1764 colorcpl.exe cmd.exe PID 1764 wrote to memory of 1784 1764 colorcpl.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\Shipping Documents PL&BL Draft.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Documents PL&BL Draft.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\Shipping Documents PL&BL Draft.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Documents PL&BL Draft.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1868 -
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Shipping Documents PL&BL Draft.exe"3⤵
- Deletes itself
PID:1784