Analysis
-
max time kernel
36s -
max time network
117s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
14-01-2021 19:44
Static task
static1
Behavioral task
behavioral1
Sample
cd925558146dc80ccf028ce0e9a5c542.exe
Resource
win7v20201028
General
-
Target
cd925558146dc80ccf028ce0e9a5c542.exe
-
Size
850KB
-
MD5
cd925558146dc80ccf028ce0e9a5c542
-
SHA1
e91a37336f7c2accce48b407f622e1c2bfb7c76f
-
SHA256
41440a2e9db109558bde920dddba0eee3a5f269eef4c0d80eedf6a0bf0445a70
-
SHA512
54df05cc95e14b18c85f1621960ce32e4590b6a7ff06ac365369c3609a32a9dd9559a0ffd584532a1fa6fe591579415722159ac76c1b8bdfa9400034b72a88f4
Malware Config
Extracted
formbook
http://www.h-v-biz.com/c8so/
floeperformancegear.com
youtubeincreaser.com
cbb-is.com
bullsbikeusa.com
mama-asobitai.com
parkdaleliving.com
kinneintl.com
byrondramos.com
topangashaman.com
channel1057.com
nuancedigitalsolutions.com
kumheekim.com
erikating.com
ulinekorea.com
giftoes.com
blacknation.info
eventsdonevirtually.com
mx190501.com
bingent.info
seronofertilitymeds.com
homeloanswap.com
radissonusadevelopment.com
fuzionclood.com
best-datingclub.com
monjesphoto.com
kaysklittra.com
redirect.space
heliaoyixue.com
studentsafetysheild.info
automicsky.com
drsachinguptaoncologist.com
viralbisnisricis.com
ortodontx.com
lj5683.com
177braithwaite.com
peopleofpublix.com
vapesaucepro.com
zhadzc.com
yourattractionllc.net
linguafrancese.com
kindredkitchencatering.com
jikzo.com
studyspanissh.com
kidsbele.com
rainyknyght.com
cassandrastark.com
mysooners.com
catcara.com
shangxiaidea.com
vancouverjuniorgiants.com
xn--iiq68jfvffs1f.store
cfndonline.com
blenclad.net
alexroquemedia.com
escorturkiye.xyz
yurukire.com
floortak.com
rickettes.com
bubblewrapjogja.com
jayachandraadvertising.com
cleansevacco.com
magazinepodcastcce.com
mybusiness-plus.com
cleverwares.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3432-11-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/3432-12-0x000000000041CFE0-mapping.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
cd925558146dc80ccf028ce0e9a5c542.exedescription pid process target process PID 4764 set thread context of 3432 4764 cd925558146dc80ccf028ce0e9a5c542.exe cd925558146dc80ccf028ce0e9a5c542.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
cd925558146dc80ccf028ce0e9a5c542.execd925558146dc80ccf028ce0e9a5c542.exepid process 4764 cd925558146dc80ccf028ce0e9a5c542.exe 3432 cd925558146dc80ccf028ce0e9a5c542.exe 3432 cd925558146dc80ccf028ce0e9a5c542.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
cd925558146dc80ccf028ce0e9a5c542.exedescription pid process Token: SeDebugPrivilege 4764 cd925558146dc80ccf028ce0e9a5c542.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
cd925558146dc80ccf028ce0e9a5c542.exedescription pid process target process PID 4764 wrote to memory of 3432 4764 cd925558146dc80ccf028ce0e9a5c542.exe cd925558146dc80ccf028ce0e9a5c542.exe PID 4764 wrote to memory of 3432 4764 cd925558146dc80ccf028ce0e9a5c542.exe cd925558146dc80ccf028ce0e9a5c542.exe PID 4764 wrote to memory of 3432 4764 cd925558146dc80ccf028ce0e9a5c542.exe cd925558146dc80ccf028ce0e9a5c542.exe PID 4764 wrote to memory of 3432 4764 cd925558146dc80ccf028ce0e9a5c542.exe cd925558146dc80ccf028ce0e9a5c542.exe PID 4764 wrote to memory of 3432 4764 cd925558146dc80ccf028ce0e9a5c542.exe cd925558146dc80ccf028ce0e9a5c542.exe PID 4764 wrote to memory of 3432 4764 cd925558146dc80ccf028ce0e9a5c542.exe cd925558146dc80ccf028ce0e9a5c542.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd925558146dc80ccf028ce0e9a5c542.exe"C:\Users\Admin\AppData\Local\Temp\cd925558146dc80ccf028ce0e9a5c542.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\cd925558146dc80ccf028ce0e9a5c542.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3432-11-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/3432-12-0x000000000041CFE0-mapping.dmp
-
memory/4764-2-0x0000000073370000-0x0000000073A5E000-memory.dmpFilesize
6.9MB
-
memory/4764-3-0x00000000005A0000-0x00000000005A1000-memory.dmpFilesize
4KB
-
memory/4764-5-0x0000000005370000-0x0000000005371000-memory.dmpFilesize
4KB
-
memory/4764-6-0x0000000004F10000-0x0000000004F11000-memory.dmpFilesize
4KB
-
memory/4764-7-0x0000000004EB0000-0x0000000004EB1000-memory.dmpFilesize
4KB
-
memory/4764-8-0x00000000050D0000-0x00000000050DE000-memory.dmpFilesize
56KB
-
memory/4764-9-0x0000000007310000-0x00000000073A1000-memory.dmpFilesize
580KB
-
memory/4764-10-0x0000000007460000-0x0000000007461000-memory.dmpFilesize
4KB