Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
12-01-2021 07:23
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order -263.exe
Resource
win7v20201028
General
-
Target
Purchase Order -263.exe
-
Size
1.2MB
-
MD5
eed4b5009af44f6714fedd14a013c77c
-
SHA1
2f49c70492785e3aeb7e6ff174fa86977d44def9
-
SHA256
d98998e1d6649dba775358afffb1771be64bef20f490b5a97fca770f68bf6f2a
-
SHA512
76fa3e37eebef55f819c028890a84cf22090bc7caf5c6c27b0b7a12aed949caf0a62258f1d81ee03c22d94ee2354dae3635d3f7b968e50c43ff95c3f32ba9325
Malware Config
Extracted
formbook
http://www.clivehamiltonstone.com/n925/
vrgamestickets.com
bilalproperties.com
cutfortheconnect.com
0312pifa.com
hileyjey.com
miljardairs.com
portablescoop.com
bundesregierungfinanzen.info
noorsoul.com
ediliovivas.com
findmafia.com
yourmaskslanyard.com
schmellnutrition.com
seo0577.com
slumzmusic.com
thetugdealer.com
americaflys.com
rudram.info
debsdivacollection.com
hamptonmobilenotarysvc.com
cad-zeichnung.com
naturallyyoursvirginhair.com
myvipurse.com
escritorionasala.com
20200868justin.space
poolwatchlasvegas.com
pornsville.com
achieveyourdigitalpotential.com
citestpridom20200814131144.net
rapidreachpr.com
keepinupwiththepups.com
shopcival.info
livestream40.xyz
kelvinxie.com
vienesacarnicos.com
cultuscafe.com
srpestcontrolllc.com
hashtagday.com
meizhidy.com
alcoholtreatment.center
leticiamata.com
wfttl.com
315sunsetcreek.com
demandmaintenance.com
ifonixsolutions.com
cedarservicellc.com
gzjkbx.com
moseley-mould.com
stockmarjets.com
travaze.net
potenziamentoeducativo.com
tantsrideshares.com
onecapricorn.com
mobplaces.net
nabataeanmystery.com
online-termin-vereinbarung.info
avaniejoshi.com
iregentos.info
kallin-tone.com
redboxgroup.net
cuakinhtudong.asia
hermonieonly.com
sababatoast.com
xcsmoney.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3976-3-0x000000000041D140-mapping.dmp xloader behavioral2/memory/3976-2-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2580-5-0x0000000000000000-mapping.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Purchase Order -263.exedllhost.exemsiexec.exedescription pid process target process PID 4048 set thread context of 3976 4048 Purchase Order -263.exe dllhost.exe PID 3976 set thread context of 3028 3976 dllhost.exe Explorer.EXE PID 2580 set thread context of 3028 2580 msiexec.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
dllhost.exemsiexec.exepid process 3976 dllhost.exe 3976 dllhost.exe 3976 dllhost.exe 3976 dllhost.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe 2580 msiexec.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
Purchase Order -263.exedllhost.exemsiexec.exepid process 4048 Purchase Order -263.exe 3976 dllhost.exe 3976 dllhost.exe 3976 dllhost.exe 2580 msiexec.exe 2580 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
dllhost.exemsiexec.exedescription pid process Token: SeDebugPrivilege 3976 dllhost.exe Token: SeDebugPrivilege 2580 msiexec.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
Purchase Order -263.exepid process 4048 Purchase Order -263.exe 4048 Purchase Order -263.exe 4048 Purchase Order -263.exe -
Suspicious use of SendNotifyMessage 3 IoCs
Processes:
Purchase Order -263.exepid process 4048 Purchase Order -263.exe 4048 Purchase Order -263.exe 4048 Purchase Order -263.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3028 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
Purchase Order -263.exeExplorer.EXEmsiexec.exedescription pid process target process PID 4048 wrote to memory of 3976 4048 Purchase Order -263.exe dllhost.exe PID 4048 wrote to memory of 3976 4048 Purchase Order -263.exe dllhost.exe PID 4048 wrote to memory of 3976 4048 Purchase Order -263.exe dllhost.exe PID 4048 wrote to memory of 3976 4048 Purchase Order -263.exe dllhost.exe PID 3028 wrote to memory of 2580 3028 Explorer.EXE msiexec.exe PID 3028 wrote to memory of 2580 3028 Explorer.EXE msiexec.exe PID 3028 wrote to memory of 2580 3028 Explorer.EXE msiexec.exe PID 2580 wrote to memory of 3036 2580 msiexec.exe cmd.exe PID 2580 wrote to memory of 3036 2580 msiexec.exe cmd.exe PID 2580 wrote to memory of 3036 2580 msiexec.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\Purchase Order -263.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order -263.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\SysWOW64\dllhost.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3976 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\dllhost.exe"3⤵PID:3036