Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
12-01-2021 07:22
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Documents PL&BL Draft.exe
Resource
win7v20201028
General
-
Target
Shipping Documents PL&BL Draft.exe
-
Size
366KB
-
MD5
1ba16598fa883ad4f4c2238c773268f5
-
SHA1
8181de877164649dcba23d8b5436287636190fec
-
SHA256
6ac9238d32f2a7b7315cdb2755e090aa53431a71d613e188209b02105e3b8af9
-
SHA512
0c04662ca807321fc2facef5702fa136fec8b524613cabd4f6067ed51c80261199ea2d4d58dd2f7188b61381eee42d50fc48e2bed0b158e5159c5b6dab7cba85
Malware Config
Extracted
formbook
http://www.elevatedenterprizes.com/h3qo/
dhflow.com
jyindex.com
ezcleanhandle.com
trungtamcongdong.online
simsprotectionagency.com
easylivemeet.com
blackvikingfashionhouse.com
52banxue.com
girlsinit.com
drhemo.com
freethefarmers.com
velvetrosephotography.com
geometricbotaniclas.com
skyandspirit.com
deltacomunicacao.com
mucademy.com
jaboilfieldsolutions.net
howtowinatblackjacknow.com
anytimegrowth.com
simranluthra.com
thefinleyshow.com
basalmeals.com
esurpluss.com
hrbjczsfs.com
tourphuquocnguyenhien.com
mxprographics.com
themetaphysicalmaster.net
directorystar.asia
thehomeofdiamonds.com
riqinxin.com
covicio.com
sciineurope.com
womensportclothes.com
celestialchimes.net
lotsmen.com
hi-rescloud.net
lewisnathaniel.com
ageonward.com
eyetownglasses.com
bingent.info
matildealvaradovera.com
otorrinonews.com
cdeg898.com
lexingtoncoorgresort.com
minidachshundpups.com
tools365-shop.com
romancingtheeras.com
residentmining.com
aquaflowsprinklers.com
crackapks.com
caffeinatedeverafter.com
sureyyapasa.net
strawberryhearts.com
ptgo.net
devyshkam.com
thethrottletherapy.com
givelyrics.com
signaturepsinc.com
mersinsudunyasi.com
fivedayskitchen.com
fefebeauty.com
long0001.com
hmm40.com
claracarbon.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2280-2-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2280-3-0x000000000041D0E0-mapping.dmp xloader behavioral2/memory/2500-6-0x0000000000000000-mapping.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Shipping Documents PL&BL Draft.exeShipping Documents PL&BL Draft.exemstsc.exedescription pid process target process PID 4000 set thread context of 2280 4000 Shipping Documents PL&BL Draft.exe Shipping Documents PL&BL Draft.exe PID 2280 set thread context of 3036 2280 Shipping Documents PL&BL Draft.exe Explorer.EXE PID 2500 set thread context of 3036 2500 mstsc.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
Shipping Documents PL&BL Draft.exemstsc.exepid process 2280 Shipping Documents PL&BL Draft.exe 2280 Shipping Documents PL&BL Draft.exe 2280 Shipping Documents PL&BL Draft.exe 2280 Shipping Documents PL&BL Draft.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe 2500 mstsc.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
Shipping Documents PL&BL Draft.exeShipping Documents PL&BL Draft.exemstsc.exepid process 4000 Shipping Documents PL&BL Draft.exe 2280 Shipping Documents PL&BL Draft.exe 2280 Shipping Documents PL&BL Draft.exe 2280 Shipping Documents PL&BL Draft.exe 2500 mstsc.exe 2500 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Shipping Documents PL&BL Draft.exemstsc.exedescription pid process Token: SeDebugPrivilege 2280 Shipping Documents PL&BL Draft.exe Token: SeDebugPrivilege 2500 mstsc.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3036 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
Shipping Documents PL&BL Draft.exeExplorer.EXEmstsc.exedescription pid process target process PID 4000 wrote to memory of 2280 4000 Shipping Documents PL&BL Draft.exe Shipping Documents PL&BL Draft.exe PID 4000 wrote to memory of 2280 4000 Shipping Documents PL&BL Draft.exe Shipping Documents PL&BL Draft.exe PID 4000 wrote to memory of 2280 4000 Shipping Documents PL&BL Draft.exe Shipping Documents PL&BL Draft.exe PID 4000 wrote to memory of 2280 4000 Shipping Documents PL&BL Draft.exe Shipping Documents PL&BL Draft.exe PID 3036 wrote to memory of 2500 3036 Explorer.EXE mstsc.exe PID 3036 wrote to memory of 2500 3036 Explorer.EXE mstsc.exe PID 3036 wrote to memory of 2500 3036 Explorer.EXE mstsc.exe PID 2500 wrote to memory of 1864 2500 mstsc.exe cmd.exe PID 2500 wrote to memory of 1864 2500 mstsc.exe cmd.exe PID 2500 wrote to memory of 1864 2500 mstsc.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\Shipping Documents PL&BL Draft.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Documents PL&BL Draft.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\Shipping Documents PL&BL Draft.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Documents PL&BL Draft.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2280 -
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Shipping Documents PL&BL Draft.exe"3⤵PID:1864