Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-01-2021 07:40
Static task
static1
Behavioral task
behavioral1
Sample
20210111 Virginie.exe
Resource
win7v20201028
General
-
Target
20210111 Virginie.exe
-
Size
1.0MB
-
MD5
75ad92105a21f723cab80577de7ce4f7
-
SHA1
e6ae412993f371e70418fc256ca8259eea45b668
-
SHA256
924408349b7b3075a26d4e8408698ab07fc74ada1e94dbe35e6297e957724027
-
SHA512
af6ff25d6c970789623afebc71a0113527dc9fcd00eb39c7f5bb4a61fc497bb5167a4b5fc03a6a38ead8b303dd716562239303117ecbf63aafe761bdf11501e8
Malware Config
Extracted
formbook
http://www.lensinlens.com/ehxh/
financialaccompany.com
face2bouk.com
blazedisinfecting.com
providaconsultinggroup.com
distriautosdelpacifico.com
myaduhelm.com
thangmaygiatot.com
nuevasantatecla.com
endpedophiles.com
alwanps.com
anzi-studio.com
twoswinginghammers.com
curbedinc.com
purecleantn.com
4levelsplit.com
talklinecall.com
egypte-vakanties.com
xzntfwof.icu
sosyoclassic.com
adjoalearningacademy.com
alphacinema.net
lady2lover.com
eleanorandhick.com
kimsfist.com
pemasangangipsum.com
mrkabaadiwala.com
alltechengwork.com
marvitrans.net
islamicwatchdogmovement.net
fortunefoundrydesign.com
911strongerlife.com
cb13xxx.com
ameriloans.info
grantmohnphotography.com
iregentos.info
tubeknows.com
clarkacademiccoaching.com
hongzhifreight.com
sparkletosprinkles.com
sprtncloud.com
goegoldenretrievers.com
highstreetwear.com
channel22newz.com
jmuboprivacy.com
ayurvedayogasardinia.com
resethire.com
simplyrita.com
fatlosszone4u.com
brian.productions
qoogaloo.com
aubreyntaylor.com
jorgianamarlowe.com
onemilliondollarsapp.com
kontenery-pawilony.site
navinkhumui.xyz
lacroixandkress.com
luxlectric.net
haypr.com
lusomarkets.com
laplumebodas.com
leadhorn.com
masksthatsmile.com
suoxqxnnoj.net
xiamen8.xyz
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1444-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/1444-13-0x000000000041D050-mapping.dmp xloader behavioral2/memory/564-14-0x0000000000000000-mapping.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
20210111 Virginie.exe20210111 Virginie.execmd.exedescription pid process target process PID 1308 set thread context of 1444 1308 20210111 Virginie.exe 20210111 Virginie.exe PID 1444 set thread context of 2352 1444 20210111 Virginie.exe Explorer.EXE PID 564 set thread context of 2352 564 cmd.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 40 IoCs
Processes:
20210111 Virginie.execmd.exepid process 1444 20210111 Virginie.exe 1444 20210111 Virginie.exe 1444 20210111 Virginie.exe 1444 20210111 Virginie.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe 564 cmd.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
20210111 Virginie.execmd.exepid process 1444 20210111 Virginie.exe 1444 20210111 Virginie.exe 1444 20210111 Virginie.exe 564 cmd.exe 564 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
20210111 Virginie.execmd.exedescription pid process Token: SeDebugPrivilege 1444 20210111 Virginie.exe Token: SeDebugPrivilege 564 cmd.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 2352 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
20210111 Virginie.exeExplorer.EXEcmd.exedescription pid process target process PID 1308 wrote to memory of 1444 1308 20210111 Virginie.exe 20210111 Virginie.exe PID 1308 wrote to memory of 1444 1308 20210111 Virginie.exe 20210111 Virginie.exe PID 1308 wrote to memory of 1444 1308 20210111 Virginie.exe 20210111 Virginie.exe PID 1308 wrote to memory of 1444 1308 20210111 Virginie.exe 20210111 Virginie.exe PID 1308 wrote to memory of 1444 1308 20210111 Virginie.exe 20210111 Virginie.exe PID 1308 wrote to memory of 1444 1308 20210111 Virginie.exe 20210111 Virginie.exe PID 2352 wrote to memory of 564 2352 Explorer.EXE cmd.exe PID 2352 wrote to memory of 564 2352 Explorer.EXE cmd.exe PID 2352 wrote to memory of 564 2352 Explorer.EXE cmd.exe PID 564 wrote to memory of 1368 564 cmd.exe cmd.exe PID 564 wrote to memory of 1368 564 cmd.exe cmd.exe PID 564 wrote to memory of 1368 564 cmd.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\20210111 Virginie.exe"C:\Users\Admin\AppData\Local\Temp\20210111 Virginie.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\20210111 Virginie.exe"C:\Users\Admin\AppData\Local\Temp\20210111 Virginie.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\20210111 Virginie.exe"3⤵PID:1368
-
-