Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
12-01-2021 07:23
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order -263.exe
Resource
win7v20201028
General
-
Target
Purchase Order -263.exe
-
Size
1.2MB
-
MD5
eed4b5009af44f6714fedd14a013c77c
-
SHA1
2f49c70492785e3aeb7e6ff174fa86977d44def9
-
SHA256
d98998e1d6649dba775358afffb1771be64bef20f490b5a97fca770f68bf6f2a
-
SHA512
76fa3e37eebef55f819c028890a84cf22090bc7caf5c6c27b0b7a12aed949caf0a62258f1d81ee03c22d94ee2354dae3635d3f7b968e50c43ff95c3f32ba9325
Malware Config
Extracted
formbook
http://www.clivehamiltonstone.com/n925/
vrgamestickets.com
bilalproperties.com
cutfortheconnect.com
0312pifa.com
hileyjey.com
miljardairs.com
portablescoop.com
bundesregierungfinanzen.info
noorsoul.com
ediliovivas.com
findmafia.com
yourmaskslanyard.com
schmellnutrition.com
seo0577.com
slumzmusic.com
thetugdealer.com
americaflys.com
rudram.info
debsdivacollection.com
hamptonmobilenotarysvc.com
cad-zeichnung.com
naturallyyoursvirginhair.com
myvipurse.com
escritorionasala.com
20200868justin.space
poolwatchlasvegas.com
pornsville.com
achieveyourdigitalpotential.com
citestpridom20200814131144.net
rapidreachpr.com
keepinupwiththepups.com
shopcival.info
livestream40.xyz
kelvinxie.com
vienesacarnicos.com
cultuscafe.com
srpestcontrolllc.com
hashtagday.com
meizhidy.com
alcoholtreatment.center
leticiamata.com
wfttl.com
315sunsetcreek.com
demandmaintenance.com
ifonixsolutions.com
cedarservicellc.com
gzjkbx.com
moseley-mould.com
stockmarjets.com
travaze.net
potenziamentoeducativo.com
tantsrideshares.com
onecapricorn.com
mobplaces.net
nabataeanmystery.com
online-termin-vereinbarung.info
avaniejoshi.com
iregentos.info
kallin-tone.com
redboxgroup.net
cuakinhtudong.asia
hermonieonly.com
sababatoast.com
xcsmoney.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/280-2-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/280-3-0x000000000041D140-mapping.dmp xloader behavioral1/memory/1748-4-0x0000000000000000-mapping.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Purchase Order -263.exedllhost.exesystray.exedescription pid process target process PID 1068 set thread context of 280 1068 Purchase Order -263.exe dllhost.exe PID 280 set thread context of 1252 280 dllhost.exe Explorer.EXE PID 1748 set thread context of 1252 1748 systray.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
dllhost.exesystray.exepid process 280 dllhost.exe 280 dllhost.exe 1748 systray.exe 1748 systray.exe 1748 systray.exe 1748 systray.exe 1748 systray.exe 1748 systray.exe 1748 systray.exe 1748 systray.exe 1748 systray.exe 1748 systray.exe 1748 systray.exe 1748 systray.exe 1748 systray.exe 1748 systray.exe 1748 systray.exe 1748 systray.exe 1748 systray.exe 1748 systray.exe 1748 systray.exe 1748 systray.exe 1748 systray.exe 1748 systray.exe 1748 systray.exe 1748 systray.exe 1748 systray.exe 1748 systray.exe 1748 systray.exe 1748 systray.exe 1748 systray.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
Purchase Order -263.exedllhost.exesystray.exepid process 1068 Purchase Order -263.exe 280 dllhost.exe 280 dllhost.exe 280 dllhost.exe 1748 systray.exe 1748 systray.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
dllhost.exesystray.exedescription pid process Token: SeDebugPrivilege 280 dllhost.exe Token: SeDebugPrivilege 1748 systray.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
Processes:
Purchase Order -263.exeExplorer.EXEpid process 1068 Purchase Order -263.exe 1068 Purchase Order -263.exe 1068 Purchase Order -263.exe 1252 Explorer.EXE 1252 Explorer.EXE 1252 Explorer.EXE 1252 Explorer.EXE -
Suspicious use of SendNotifyMessage 7 IoCs
Processes:
Purchase Order -263.exeExplorer.EXEpid process 1068 Purchase Order -263.exe 1068 Purchase Order -263.exe 1068 Purchase Order -263.exe 1252 Explorer.EXE 1252 Explorer.EXE 1252 Explorer.EXE 1252 Explorer.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Purchase Order -263.exeExplorer.EXEsystray.exedescription pid process target process PID 1068 wrote to memory of 280 1068 Purchase Order -263.exe dllhost.exe PID 1068 wrote to memory of 280 1068 Purchase Order -263.exe dllhost.exe PID 1068 wrote to memory of 280 1068 Purchase Order -263.exe dllhost.exe PID 1068 wrote to memory of 280 1068 Purchase Order -263.exe dllhost.exe PID 1068 wrote to memory of 280 1068 Purchase Order -263.exe dllhost.exe PID 1252 wrote to memory of 1748 1252 Explorer.EXE systray.exe PID 1252 wrote to memory of 1748 1252 Explorer.EXE systray.exe PID 1252 wrote to memory of 1748 1252 Explorer.EXE systray.exe PID 1252 wrote to memory of 1748 1252 Explorer.EXE systray.exe PID 1748 wrote to memory of 1396 1748 systray.exe cmd.exe PID 1748 wrote to memory of 1396 1748 systray.exe cmd.exe PID 1748 wrote to memory of 1396 1748 systray.exe cmd.exe PID 1748 wrote to memory of 1396 1748 systray.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\Purchase Order -263.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order -263.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:280 -
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\dllhost.exe"3⤵PID:1396