Analysis
-
max time kernel
41s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-01-2021 07:13
Static task
static1
Behavioral task
behavioral1
Sample
8fb76e6c9b652646d7c1f7f377c97cbd.exe
Resource
win7v20201028
General
-
Target
8fb76e6c9b652646d7c1f7f377c97cbd.exe
-
Size
1.0MB
-
MD5
8fb76e6c9b652646d7c1f7f377c97cbd
-
SHA1
087721c9ad24c3895e66186c208512706b64f025
-
SHA256
81e7927ab5ca518d06687dc18d5c4df22198011494322486e562136344d2513b
-
SHA512
cfb1aa684ea4be725ec7c63cb6477404f7a591b017743866e77afea9f39fd1c117af614b3654d21652f43ffcad31ad63bd93981ef17dc37157e3b4be1f6bdb8b
Malware Config
Extracted
formbook
http://www.h-v-biz.com/c8so/
floeperformancegear.com
youtubeincreaser.com
cbb-is.com
bullsbikeusa.com
mama-asobitai.com
parkdaleliving.com
kinneintl.com
byrondramos.com
topangashaman.com
channel1057.com
nuancedigitalsolutions.com
kumheekim.com
erikating.com
ulinekorea.com
giftoes.com
blacknation.info
eventsdonevirtually.com
mx190501.com
bingent.info
seronofertilitymeds.com
homeloanswap.com
radissonusadevelopment.com
fuzionclood.com
best-datingclub.com
monjesphoto.com
kaysklittra.com
redirect.space
heliaoyixue.com
studentsafetysheild.info
automicsky.com
drsachinguptaoncologist.com
viralbisnisricis.com
ortodontx.com
lj5683.com
177braithwaite.com
peopleofpublix.com
vapesaucepro.com
zhadzc.com
yourattractionllc.net
linguafrancese.com
kindredkitchencatering.com
jikzo.com
studyspanissh.com
kidsbele.com
rainyknyght.com
cassandrastark.com
mysooners.com
catcara.com
shangxiaidea.com
vancouverjuniorgiants.com
xn--iiq68jfvffs1f.store
cfndonline.com
blenclad.net
alexroquemedia.com
escorturkiye.xyz
yurukire.com
floortak.com
rickettes.com
bubblewrapjogja.com
jayachandraadvertising.com
cleansevacco.com
magazinepodcastcce.com
mybusiness-plus.com
cleverwares.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1988-13-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/1988-14-0x000000000041CFE0-mapping.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
8fb76e6c9b652646d7c1f7f377c97cbd.exedescription pid process target process PID 1924 set thread context of 1988 1924 8fb76e6c9b652646d7c1f7f377c97cbd.exe 8fb76e6c9b652646d7c1f7f377c97cbd.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
8fb76e6c9b652646d7c1f7f377c97cbd.exe8fb76e6c9b652646d7c1f7f377c97cbd.exepid process 1924 8fb76e6c9b652646d7c1f7f377c97cbd.exe 1988 8fb76e6c9b652646d7c1f7f377c97cbd.exe 1988 8fb76e6c9b652646d7c1f7f377c97cbd.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
8fb76e6c9b652646d7c1f7f377c97cbd.exedescription pid process Token: SeDebugPrivilege 1924 8fb76e6c9b652646d7c1f7f377c97cbd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
8fb76e6c9b652646d7c1f7f377c97cbd.exedescription pid process target process PID 1924 wrote to memory of 200 1924 8fb76e6c9b652646d7c1f7f377c97cbd.exe schtasks.exe PID 1924 wrote to memory of 200 1924 8fb76e6c9b652646d7c1f7f377c97cbd.exe schtasks.exe PID 1924 wrote to memory of 200 1924 8fb76e6c9b652646d7c1f7f377c97cbd.exe schtasks.exe PID 1924 wrote to memory of 1988 1924 8fb76e6c9b652646d7c1f7f377c97cbd.exe 8fb76e6c9b652646d7c1f7f377c97cbd.exe PID 1924 wrote to memory of 1988 1924 8fb76e6c9b652646d7c1f7f377c97cbd.exe 8fb76e6c9b652646d7c1f7f377c97cbd.exe PID 1924 wrote to memory of 1988 1924 8fb76e6c9b652646d7c1f7f377c97cbd.exe 8fb76e6c9b652646d7c1f7f377c97cbd.exe PID 1924 wrote to memory of 1988 1924 8fb76e6c9b652646d7c1f7f377c97cbd.exe 8fb76e6c9b652646d7c1f7f377c97cbd.exe PID 1924 wrote to memory of 1988 1924 8fb76e6c9b652646d7c1f7f377c97cbd.exe 8fb76e6c9b652646d7c1f7f377c97cbd.exe PID 1924 wrote to memory of 1988 1924 8fb76e6c9b652646d7c1f7f377c97cbd.exe 8fb76e6c9b652646d7c1f7f377c97cbd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fb76e6c9b652646d7c1f7f377c97cbd.exe"C:\Users\Admin\AppData\Local\Temp\8fb76e6c9b652646d7c1f7f377c97cbd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\dromkeG" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1677.tmp"2⤵
- Creates scheduled task(s)
PID:200
-
-
C:\Users\Admin\AppData\Local\Temp\8fb76e6c9b652646d7c1f7f377c97cbd.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1988
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
e67ffd4ac29d4a519d94f93bb12986ec
SHA1a014c541816cd7779038d89830063d19d9ab0423
SHA256761468ed28a1dcc5c1db1c467bb45b59c3e5a4b3890c9f9a1b8eda0c23c380fb
SHA51297b98cfb26a6821fc4327f6d794cffde34caf2d99cf68dc14429ef67556583da4cd2f982f01d21ef8a3ea9bb7fd42605dab737fca16860dfb8a0f05ccb5762cb