Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-01-2021 07:35
Static task
static1
Behavioral task
behavioral1
Sample
FtLroeD5Kmr6rNC.exe
Resource
win7v20201028
General
-
Target
FtLroeD5Kmr6rNC.exe
-
Size
734KB
-
MD5
c8208e09703f024933544517fb4db4a3
-
SHA1
0f6b53720c7556d04c5fed4b07084f86fd115480
-
SHA256
ee4b567e9ec4039e3494f812a70c14c02865b600a2356e3f5906ac520242839f
-
SHA512
637668d98a88d73b496fb5c3fb928ab018ece33947cacf8ca7cb42d3874967d07cc995357b8710bc451d1301bb0e41e5000cdfa4f56548f7b983313fd49b358e
Malware Config
Extracted
formbook
http://www.asicprominer.com/umSa/
lessensations.com
growcerybank.com
rvworkforce.com
djangosports.com
jgrosinger.com
tongjiash.com
rianebrady.com
xiaoxu.info
allwaysautism.com
couturev.com
dantedikhali.com
sagamoreca.com
sandisyardsale.com
happizi.com
moonchildboxco.store
maquillajembp.com
sojubythebay.com
verdexwellness.com
authenticperiod.cloud
bitpreserve.com
southernstarescape.com
therobloids.net
123hpcomsetu.com
hongtinvn.com
magnoliarack.net
jiegaojc.com
provaavincere.com
freefiregarena20.com
laurenpathak.com
become-flightattendant.com
shanyagus.com
top12watches.com
dcdialysiscenter.com
lawandlawholdingsinc.com
madisonpears.com
cakesinchargecatering.com
nc500-accommodation.com
cypherium.academy
wingmanwallet.com
spit-commodity.com
nhimlike.com
givebitties.com
xn--iiqa6618cvla.xn--hxt814e
abilitiesin.com
premioscreatube.com
foodtock.com
nationalmakeawillmonth.net
vettedwealthmanagement.com
bingent.info
betslotspin.com
sportsenviron.com
epskate.com
rsoliver.com
philrealtorpro.com
novelchapter.com
proclipperz.com
andresbuendia.com
bookmyshemale.com
newwavepost.net
4pro.life
sippatrbpnbireuen.com
asbuilt.services
speedfreightlines.com
irgendwie-sterben.xyz
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3056-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3056-13-0x000000000041D060-mapping.dmp xloader behavioral2/memory/2688-15-0x0000000000000000-mapping.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
Processes:
FtLroeD5Kmr6rNC.exeFtLroeD5Kmr6rNC.execolorcpl.exedescription pid process target process PID 60 set thread context of 3056 60 FtLroeD5Kmr6rNC.exe FtLroeD5Kmr6rNC.exe PID 3056 set thread context of 3012 3056 FtLroeD5Kmr6rNC.exe Explorer.EXE PID 3056 set thread context of 3012 3056 FtLroeD5Kmr6rNC.exe Explorer.EXE PID 2688 set thread context of 3012 2688 colorcpl.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 36 IoCs
Processes:
FtLroeD5Kmr6rNC.exeFtLroeD5Kmr6rNC.execolorcpl.exepid process 60 FtLroeD5Kmr6rNC.exe 60 FtLroeD5Kmr6rNC.exe 60 FtLroeD5Kmr6rNC.exe 60 FtLroeD5Kmr6rNC.exe 3056 FtLroeD5Kmr6rNC.exe 3056 FtLroeD5Kmr6rNC.exe 3056 FtLroeD5Kmr6rNC.exe 3056 FtLroeD5Kmr6rNC.exe 3056 FtLroeD5Kmr6rNC.exe 3056 FtLroeD5Kmr6rNC.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe 2688 colorcpl.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
FtLroeD5Kmr6rNC.execolorcpl.exepid process 3056 FtLroeD5Kmr6rNC.exe 3056 FtLroeD5Kmr6rNC.exe 3056 FtLroeD5Kmr6rNC.exe 3056 FtLroeD5Kmr6rNC.exe 2688 colorcpl.exe 2688 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
FtLroeD5Kmr6rNC.exeFtLroeD5Kmr6rNC.execolorcpl.exedescription pid process Token: SeDebugPrivilege 60 FtLroeD5Kmr6rNC.exe Token: SeDebugPrivilege 3056 FtLroeD5Kmr6rNC.exe Token: SeDebugPrivilege 2688 colorcpl.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
FtLroeD5Kmr6rNC.exeExplorer.EXEcolorcpl.exedescription pid process target process PID 60 wrote to memory of 2384 60 FtLroeD5Kmr6rNC.exe FtLroeD5Kmr6rNC.exe PID 60 wrote to memory of 2384 60 FtLroeD5Kmr6rNC.exe FtLroeD5Kmr6rNC.exe PID 60 wrote to memory of 2384 60 FtLroeD5Kmr6rNC.exe FtLroeD5Kmr6rNC.exe PID 60 wrote to memory of 2216 60 FtLroeD5Kmr6rNC.exe FtLroeD5Kmr6rNC.exe PID 60 wrote to memory of 2216 60 FtLroeD5Kmr6rNC.exe FtLroeD5Kmr6rNC.exe PID 60 wrote to memory of 2216 60 FtLroeD5Kmr6rNC.exe FtLroeD5Kmr6rNC.exe PID 60 wrote to memory of 3056 60 FtLroeD5Kmr6rNC.exe FtLroeD5Kmr6rNC.exe PID 60 wrote to memory of 3056 60 FtLroeD5Kmr6rNC.exe FtLroeD5Kmr6rNC.exe PID 60 wrote to memory of 3056 60 FtLroeD5Kmr6rNC.exe FtLroeD5Kmr6rNC.exe PID 60 wrote to memory of 3056 60 FtLroeD5Kmr6rNC.exe FtLroeD5Kmr6rNC.exe PID 60 wrote to memory of 3056 60 FtLroeD5Kmr6rNC.exe FtLroeD5Kmr6rNC.exe PID 60 wrote to memory of 3056 60 FtLroeD5Kmr6rNC.exe FtLroeD5Kmr6rNC.exe PID 3012 wrote to memory of 2688 3012 Explorer.EXE colorcpl.exe PID 3012 wrote to memory of 2688 3012 Explorer.EXE colorcpl.exe PID 3012 wrote to memory of 2688 3012 Explorer.EXE colorcpl.exe PID 2688 wrote to memory of 512 2688 colorcpl.exe cmd.exe PID 2688 wrote to memory of 512 2688 colorcpl.exe cmd.exe PID 2688 wrote to memory of 512 2688 colorcpl.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\FtLroeD5Kmr6rNC.exe"C:\Users\Admin\AppData\Local\Temp\FtLroeD5Kmr6rNC.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Users\Admin\AppData\Local\Temp\FtLroeD5Kmr6rNC.exe"C:\Users\Admin\AppData\Local\Temp\FtLroeD5Kmr6rNC.exe"3⤵PID:2384
-
-
C:\Users\Admin\AppData\Local\Temp\FtLroeD5Kmr6rNC.exe"C:\Users\Admin\AppData\Local\Temp\FtLroeD5Kmr6rNC.exe"3⤵PID:2216
-
-
C:\Users\Admin\AppData\Local\Temp\FtLroeD5Kmr6rNC.exe"C:\Users\Admin\AppData\Local\Temp\FtLroeD5Kmr6rNC.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\FtLroeD5Kmr6rNC.exe"3⤵PID:512
-
-