Analysis
-
max time kernel
147s -
max time network
13s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
13-01-2021 07:40
Static task
static1
Behavioral task
behavioral1
Sample
20210111 Virginie.exe
Resource
win7v20201028
General
-
Target
20210111 Virginie.exe
-
Size
1.0MB
-
MD5
75ad92105a21f723cab80577de7ce4f7
-
SHA1
e6ae412993f371e70418fc256ca8259eea45b668
-
SHA256
924408349b7b3075a26d4e8408698ab07fc74ada1e94dbe35e6297e957724027
-
SHA512
af6ff25d6c970789623afebc71a0113527dc9fcd00eb39c7f5bb4a61fc497bb5167a4b5fc03a6a38ead8b303dd716562239303117ecbf63aafe761bdf11501e8
Malware Config
Extracted
formbook
http://www.lensinlens.com/ehxh/
financialaccompany.com
face2bouk.com
blazedisinfecting.com
providaconsultinggroup.com
distriautosdelpacifico.com
myaduhelm.com
thangmaygiatot.com
nuevasantatecla.com
endpedophiles.com
alwanps.com
anzi-studio.com
twoswinginghammers.com
curbedinc.com
purecleantn.com
4levelsplit.com
talklinecall.com
egypte-vakanties.com
xzntfwof.icu
sosyoclassic.com
adjoalearningacademy.com
alphacinema.net
lady2lover.com
eleanorandhick.com
kimsfist.com
pemasangangipsum.com
mrkabaadiwala.com
alltechengwork.com
marvitrans.net
islamicwatchdogmovement.net
fortunefoundrydesign.com
911strongerlife.com
cb13xxx.com
ameriloans.info
grantmohnphotography.com
iregentos.info
tubeknows.com
clarkacademiccoaching.com
hongzhifreight.com
sparkletosprinkles.com
sprtncloud.com
goegoldenretrievers.com
highstreetwear.com
channel22newz.com
jmuboprivacy.com
ayurvedayogasardinia.com
resethire.com
simplyrita.com
fatlosszone4u.com
brian.productions
qoogaloo.com
aubreyntaylor.com
jorgianamarlowe.com
onemilliondollarsapp.com
kontenery-pawilony.site
navinkhumui.xyz
lacroixandkress.com
luxlectric.net
haypr.com
lusomarkets.com
laplumebodas.com
leadhorn.com
masksthatsmile.com
suoxqxnnoj.net
xiamen8.xyz
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1624-7-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/1624-8-0x000000000041D050-mapping.dmp xloader behavioral1/memory/764-9-0x0000000000000000-mapping.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1448 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
20210111 Virginie.exe20210111 Virginie.exerundll32.exedescription pid process target process PID 1576 set thread context of 1624 1576 20210111 Virginie.exe 20210111 Virginie.exe PID 1624 set thread context of 1312 1624 20210111 Virginie.exe Explorer.EXE PID 764 set thread context of 1312 764 rundll32.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 19 IoCs
Processes:
20210111 Virginie.exerundll32.exepid process 1624 20210111 Virginie.exe 1624 20210111 Virginie.exe 764 rundll32.exe 764 rundll32.exe 764 rundll32.exe 764 rundll32.exe 764 rundll32.exe 764 rundll32.exe 764 rundll32.exe 764 rundll32.exe 764 rundll32.exe 764 rundll32.exe 764 rundll32.exe 764 rundll32.exe 764 rundll32.exe 764 rundll32.exe 764 rundll32.exe 764 rundll32.exe 764 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
20210111 Virginie.exerundll32.exepid process 1624 20210111 Virginie.exe 1624 20210111 Virginie.exe 1624 20210111 Virginie.exe 764 rundll32.exe 764 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
20210111 Virginie.exerundll32.exedescription pid process Token: SeDebugPrivilege 1624 20210111 Virginie.exe Token: SeDebugPrivilege 764 rundll32.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1312 Explorer.EXE 1312 Explorer.EXE 1312 Explorer.EXE 1312 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1312 Explorer.EXE 1312 Explorer.EXE 1312 Explorer.EXE 1312 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
20210111 Virginie.exeExplorer.EXErundll32.exedescription pid process target process PID 1576 wrote to memory of 1624 1576 20210111 Virginie.exe 20210111 Virginie.exe PID 1576 wrote to memory of 1624 1576 20210111 Virginie.exe 20210111 Virginie.exe PID 1576 wrote to memory of 1624 1576 20210111 Virginie.exe 20210111 Virginie.exe PID 1576 wrote to memory of 1624 1576 20210111 Virginie.exe 20210111 Virginie.exe PID 1576 wrote to memory of 1624 1576 20210111 Virginie.exe 20210111 Virginie.exe PID 1576 wrote to memory of 1624 1576 20210111 Virginie.exe 20210111 Virginie.exe PID 1576 wrote to memory of 1624 1576 20210111 Virginie.exe 20210111 Virginie.exe PID 1312 wrote to memory of 764 1312 Explorer.EXE rundll32.exe PID 1312 wrote to memory of 764 1312 Explorer.EXE rundll32.exe PID 1312 wrote to memory of 764 1312 Explorer.EXE rundll32.exe PID 1312 wrote to memory of 764 1312 Explorer.EXE rundll32.exe PID 1312 wrote to memory of 764 1312 Explorer.EXE rundll32.exe PID 1312 wrote to memory of 764 1312 Explorer.EXE rundll32.exe PID 1312 wrote to memory of 764 1312 Explorer.EXE rundll32.exe PID 764 wrote to memory of 1448 764 rundll32.exe cmd.exe PID 764 wrote to memory of 1448 764 rundll32.exe cmd.exe PID 764 wrote to memory of 1448 764 rundll32.exe cmd.exe PID 764 wrote to memory of 1448 764 rundll32.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\20210111 Virginie.exe"C:\Users\Admin\AppData\Local\Temp\20210111 Virginie.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\20210111 Virginie.exe"C:\Users\Admin\AppData\Local\Temp\20210111 Virginie.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\20210111 Virginie.exe"3⤵
- Deletes itself
PID:1448
-
-