Analysis
-
max time kernel
36s -
max time network
9s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
14-01-2021 19:42
Static task
static1
Behavioral task
behavioral1
Sample
93c377f5008833ebaf3f50983084a0e5.exe
Resource
win7v20201028
General
-
Target
93c377f5008833ebaf3f50983084a0e5.exe
-
Size
561KB
-
MD5
93c377f5008833ebaf3f50983084a0e5
-
SHA1
0fe9b1de40e7f16c6b4654549a035e363f7844f5
-
SHA256
edcbf58883f09441ef7eb461421b7ec33655663420ba2722ef5c45b62600f25c
-
SHA512
ef08c4d8f766bf231b9bfaf2c7e8e6ed7470b7487886fe6859fef63040d754658b4cb6d6c05cbbfc2ddcafd03a8f61eb7530746d2df7a73c39482b2123380fa9
Malware Config
Extracted
formbook
http://www.learnhour.net/eaud/
modshiro.com
mademarketingoss.com
austinjourls.info
wayupteam.com
crossingfinger.com
interseptors.com
gigashit.com
livetigo.com
halamankuningindonesia.com
windhammills.com
aylinahmet.com
mbacexonan.website
shopboxbarcelona.com
youyeslive.com
coonlinesportsbooks.com
guorunme.com
putlocker2.site
pencueaidnetwork.com
likevector.com
vulcanudachi-proclub.com
bestcollegelms.online
bosman-smm.online
maglex.info
tolentinestore.com
layaliskincare.com
pensionbackup.com
mettyapp.com
sun-microsoft.com
cheapcialisffx.com
egio.digital
syndicatesportspicks.com
pinnacle.international
realestatejewel.com
dajiankang.love
acaijunglegroup.com
youraircases.com
cdxxcenter.com
ndblife.com
mersinsimsek.com
modernofficeaccessories.com
opioidfactswalgreens.com
yesmywigs.com
lebaronfuneraire.com
missfoxie.com
minbarlibya.com
themalaysialife.com
glz-cc.com
go892.com
eriesbestcaterer.com
geraldreed.com
casinocerto.com
beambitioussummit.com
rfs.company
juliandehaas.com
enooga.com
sulpher.network
toords.com
breaking-news4u.com
erkdigitalmarketing.com
blazorstore.com
weoneqa.com
coalitionsentiment.win
atoidejuger.com
cumbiamba.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1656-7-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/1656-8-0x000000000041D030-mapping.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
93c377f5008833ebaf3f50983084a0e5.exedescription pid process target process PID 784 set thread context of 1656 784 93c377f5008833ebaf3f50983084a0e5.exe 93c377f5008833ebaf3f50983084a0e5.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
93c377f5008833ebaf3f50983084a0e5.exepid process 1656 93c377f5008833ebaf3f50983084a0e5.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
93c377f5008833ebaf3f50983084a0e5.exedescription pid process target process PID 784 wrote to memory of 1656 784 93c377f5008833ebaf3f50983084a0e5.exe 93c377f5008833ebaf3f50983084a0e5.exe PID 784 wrote to memory of 1656 784 93c377f5008833ebaf3f50983084a0e5.exe 93c377f5008833ebaf3f50983084a0e5.exe PID 784 wrote to memory of 1656 784 93c377f5008833ebaf3f50983084a0e5.exe 93c377f5008833ebaf3f50983084a0e5.exe PID 784 wrote to memory of 1656 784 93c377f5008833ebaf3f50983084a0e5.exe 93c377f5008833ebaf3f50983084a0e5.exe PID 784 wrote to memory of 1656 784 93c377f5008833ebaf3f50983084a0e5.exe 93c377f5008833ebaf3f50983084a0e5.exe PID 784 wrote to memory of 1656 784 93c377f5008833ebaf3f50983084a0e5.exe 93c377f5008833ebaf3f50983084a0e5.exe PID 784 wrote to memory of 1656 784 93c377f5008833ebaf3f50983084a0e5.exe 93c377f5008833ebaf3f50983084a0e5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\93c377f5008833ebaf3f50983084a0e5.exe"C:\Users\Admin\AppData\Local\Temp\93c377f5008833ebaf3f50983084a0e5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Users\Admin\AppData\Local\Temp\93c377f5008833ebaf3f50983084a0e5.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1656
-