Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
14-01-2021 07:03
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Documents PL&BL Draft.scr
Resource
win7v20201028
General
-
Target
Shipping Documents PL&BL Draft.scr
-
Size
449KB
-
MD5
683ec5541b3901533bf82d5df00dcde2
-
SHA1
c3dc36ffb0efaf7aad512b8a82c43678b7314f38
-
SHA256
040e512b75bacd0ed6e0e13efa13f6ea92ebd47c214112b5371425009909c842
-
SHA512
f17861a053bb7646911aa3b9b67b5918c6cefd09a91e28cb11fd2a6d549f4e279ca345403e0e32f9ed6a3b15c29fb2a25a885b4bb845d42c8b8dbfad47165134
Malware Config
Extracted
formbook
http://www.elevatedenterprizes.com/h3qo/
dhflow.com
jyindex.com
ezcleanhandle.com
trungtamcongdong.online
simsprotectionagency.com
easylivemeet.com
blackvikingfashionhouse.com
52banxue.com
girlsinit.com
drhemo.com
freethefarmers.com
velvetrosephotography.com
geometricbotaniclas.com
skyandspirit.com
deltacomunicacao.com
mucademy.com
jaboilfieldsolutions.net
howtowinatblackjacknow.com
anytimegrowth.com
simranluthra.com
thefinleyshow.com
basalmeals.com
esurpluss.com
hrbjczsfs.com
tourphuquocnguyenhien.com
mxprographics.com
themetaphysicalmaster.net
directorystar.asia
thehomeofdiamonds.com
riqinxin.com
covicio.com
sciineurope.com
womensportclothes.com
celestialchimes.net
lotsmen.com
hi-rescloud.net
lewisnathaniel.com
ageonward.com
eyetownglasses.com
bingent.info
matildealvaradovera.com
otorrinonews.com
cdeg898.com
lexingtoncoorgresort.com
minidachshundpups.com
tools365-shop.com
romancingtheeras.com
residentmining.com
aquaflowsprinklers.com
crackapks.com
caffeinatedeverafter.com
sureyyapasa.net
strawberryhearts.com
ptgo.net
devyshkam.com
thethrottletherapy.com
givelyrics.com
signaturepsinc.com
mersinsudunyasi.com
fivedayskitchen.com
fefebeauty.com
long0001.com
hmm40.com
claracarbon.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2752-2-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2752-3-0x000000000041D0E0-mapping.dmp xloader behavioral2/memory/4016-5-0x0000000000000000-mapping.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Shipping Documents PL&BL Draft.scrShipping Documents PL&BL Draft.scrmsdt.exedescription pid process target process PID 756 set thread context of 2752 756 Shipping Documents PL&BL Draft.scr Shipping Documents PL&BL Draft.scr PID 2752 set thread context of 2756 2752 Shipping Documents PL&BL Draft.scr Explorer.EXE PID 4016 set thread context of 2756 4016 msdt.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 62 IoCs
Processes:
Shipping Documents PL&BL Draft.scrmsdt.exepid process 2752 Shipping Documents PL&BL Draft.scr 2752 Shipping Documents PL&BL Draft.scr 2752 Shipping Documents PL&BL Draft.scr 2752 Shipping Documents PL&BL Draft.scr 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe 4016 msdt.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
Shipping Documents PL&BL Draft.scrShipping Documents PL&BL Draft.scrmsdt.exepid process 756 Shipping Documents PL&BL Draft.scr 2752 Shipping Documents PL&BL Draft.scr 2752 Shipping Documents PL&BL Draft.scr 2752 Shipping Documents PL&BL Draft.scr 4016 msdt.exe 4016 msdt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Shipping Documents PL&BL Draft.scrmsdt.exedescription pid process Token: SeDebugPrivilege 2752 Shipping Documents PL&BL Draft.scr Token: SeDebugPrivilege 4016 msdt.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 2756 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
Shipping Documents PL&BL Draft.scrExplorer.EXEmsdt.exedescription pid process target process PID 756 wrote to memory of 2752 756 Shipping Documents PL&BL Draft.scr Shipping Documents PL&BL Draft.scr PID 756 wrote to memory of 2752 756 Shipping Documents PL&BL Draft.scr Shipping Documents PL&BL Draft.scr PID 756 wrote to memory of 2752 756 Shipping Documents PL&BL Draft.scr Shipping Documents PL&BL Draft.scr PID 756 wrote to memory of 2752 756 Shipping Documents PL&BL Draft.scr Shipping Documents PL&BL Draft.scr PID 2756 wrote to memory of 4016 2756 Explorer.EXE msdt.exe PID 2756 wrote to memory of 4016 2756 Explorer.EXE msdt.exe PID 2756 wrote to memory of 4016 2756 Explorer.EXE msdt.exe PID 4016 wrote to memory of 3372 4016 msdt.exe cmd.exe PID 4016 wrote to memory of 3372 4016 msdt.exe cmd.exe PID 4016 wrote to memory of 3372 4016 msdt.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Shipping Documents PL&BL Draft.scr"C:\Users\Admin\AppData\Local\Temp\Shipping Documents PL&BL Draft.scr" /S2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Shipping Documents PL&BL Draft.scr"C:\Users\Admin\AppData\Local\Temp\Shipping Documents PL&BL Draft.scr" /S3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Shipping Documents PL&BL Draft.scr"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2752-2-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2752-3-0x000000000041D0E0-mapping.dmp
-
memory/3372-8-0x0000000000000000-mapping.dmp
-
memory/4016-6-0x0000000000C90000-0x0000000000E03000-memory.dmpFilesize
1.4MB
-
memory/4016-5-0x0000000000000000-mapping.dmp
-
memory/4016-7-0x0000000000C90000-0x0000000000E03000-memory.dmpFilesize
1.4MB