Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
14-01-2021 20:11
Static task
static1
Behavioral task
behavioral1
Sample
spptqzbEyNlEJvj.exe
Resource
win7v20201028
General
-
Target
spptqzbEyNlEJvj.exe
-
Size
801KB
-
MD5
fac6e34cc6144304a2a4c9f59ad426cb
-
SHA1
c28d46950f2f4f163fca3fb042d33ab23a7c81e1
-
SHA256
43822089dc4bbbe3800a980d2ac64435c0b00dd18648c0fd56dda65b11af5a35
-
SHA512
3fbc3a9e6d707468d53cf5e0244b5e4c58a85e822605a4cd71b127620736a90d23915a5ba5eaaed825cd55da61e64b7efde7a2c8e6dd6909fa17acff1eb78ccc
Malware Config
Extracted
formbook
http://www.asicprominer.com/umSa/
lessensations.com
growcerybank.com
rvworkforce.com
djangosports.com
jgrosinger.com
tongjiash.com
rianebrady.com
xiaoxu.info
allwaysautism.com
couturev.com
dantedikhali.com
sagamoreca.com
sandisyardsale.com
happizi.com
moonchildboxco.store
maquillajembp.com
sojubythebay.com
verdexwellness.com
authenticperiod.cloud
bitpreserve.com
southernstarescape.com
therobloids.net
123hpcomsetu.com
hongtinvn.com
magnoliarack.net
jiegaojc.com
provaavincere.com
freefiregarena20.com
laurenpathak.com
become-flightattendant.com
shanyagus.com
top12watches.com
dcdialysiscenter.com
lawandlawholdingsinc.com
madisonpears.com
cakesinchargecatering.com
nc500-accommodation.com
cypherium.academy
wingmanwallet.com
spit-commodity.com
nhimlike.com
givebitties.com
xn--iiqa6618cvla.xn--hxt814e
abilitiesin.com
premioscreatube.com
foodtock.com
nationalmakeawillmonth.net
vettedwealthmanagement.com
bingent.info
betslotspin.com
sportsenviron.com
epskate.com
rsoliver.com
philrealtorpro.com
novelchapter.com
proclipperz.com
andresbuendia.com
bookmyshemale.com
newwavepost.net
4pro.life
sippatrbpnbireuen.com
asbuilt.services
speedfreightlines.com
irgendwie-sterben.xyz
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3300-2-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3300-3-0x000000000041D060-mapping.dmp xloader behavioral2/memory/648-4-0x0000000000000000-mapping.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
spptqzbEyNlEJvj.exespptqzbEyNlEJvj.exewscript.exedescription pid process target process PID 4772 set thread context of 3300 4772 spptqzbEyNlEJvj.exe spptqzbEyNlEJvj.exe PID 3300 set thread context of 2576 3300 spptqzbEyNlEJvj.exe Explorer.EXE PID 648 set thread context of 2576 648 wscript.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 34 IoCs
Processes:
spptqzbEyNlEJvj.exewscript.exepid process 3300 spptqzbEyNlEJvj.exe 3300 spptqzbEyNlEJvj.exe 3300 spptqzbEyNlEJvj.exe 3300 spptqzbEyNlEJvj.exe 648 wscript.exe 648 wscript.exe 648 wscript.exe 648 wscript.exe 648 wscript.exe 648 wscript.exe 648 wscript.exe 648 wscript.exe 648 wscript.exe 648 wscript.exe 648 wscript.exe 648 wscript.exe 648 wscript.exe 648 wscript.exe 648 wscript.exe 648 wscript.exe 648 wscript.exe 648 wscript.exe 648 wscript.exe 648 wscript.exe 648 wscript.exe 648 wscript.exe 648 wscript.exe 648 wscript.exe 648 wscript.exe 648 wscript.exe 648 wscript.exe 648 wscript.exe 648 wscript.exe 648 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
spptqzbEyNlEJvj.exewscript.exepid process 3300 spptqzbEyNlEJvj.exe 3300 spptqzbEyNlEJvj.exe 3300 spptqzbEyNlEJvj.exe 648 wscript.exe 648 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
spptqzbEyNlEJvj.exewscript.exedescription pid process Token: SeDebugPrivilege 3300 spptqzbEyNlEJvj.exe Token: SeDebugPrivilege 648 wscript.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
spptqzbEyNlEJvj.exeExplorer.EXEwscript.exedescription pid process target process PID 4772 wrote to memory of 3300 4772 spptqzbEyNlEJvj.exe spptqzbEyNlEJvj.exe PID 4772 wrote to memory of 3300 4772 spptqzbEyNlEJvj.exe spptqzbEyNlEJvj.exe PID 4772 wrote to memory of 3300 4772 spptqzbEyNlEJvj.exe spptqzbEyNlEJvj.exe PID 4772 wrote to memory of 3300 4772 spptqzbEyNlEJvj.exe spptqzbEyNlEJvj.exe PID 4772 wrote to memory of 3300 4772 spptqzbEyNlEJvj.exe spptqzbEyNlEJvj.exe PID 4772 wrote to memory of 3300 4772 spptqzbEyNlEJvj.exe spptqzbEyNlEJvj.exe PID 2576 wrote to memory of 648 2576 Explorer.EXE wscript.exe PID 2576 wrote to memory of 648 2576 Explorer.EXE wscript.exe PID 2576 wrote to memory of 648 2576 Explorer.EXE wscript.exe PID 648 wrote to memory of 904 648 wscript.exe cmd.exe PID 648 wrote to memory of 904 648 wscript.exe cmd.exe PID 648 wrote to memory of 904 648 wscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\spptqzbEyNlEJvj.exe"C:\Users\Admin\AppData\Local\Temp\spptqzbEyNlEJvj.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\spptqzbEyNlEJvj.exe"C:\Users\Admin\AppData\Local\Temp\spptqzbEyNlEJvj.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3300
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\spptqzbEyNlEJvj.exe"3⤵PID:904
-
-