Analysis
-
max time kernel
39s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
14-01-2021 19:42
Static task
static1
Behavioral task
behavioral1
Sample
3e3d35afbf473c5ed5aec39aba52346f.exe
Resource
win7v20201028
General
-
Target
3e3d35afbf473c5ed5aec39aba52346f.exe
-
Size
827KB
-
MD5
3e3d35afbf473c5ed5aec39aba52346f
-
SHA1
4b47ee201ab67fd115667b0d061a282ed5ffb2f4
-
SHA256
1d2cf0287f43172cf4b7e250574319fa36b733e98878622e2ea016f5c0437679
-
SHA512
2c5620c3866a7e8e065e9fb48196236d2e6e7a24e1a23fe241c20d8ae7b3d15be36d8ee5adc5faf1989138a46734cfc9572334dc8a5906f4e9a2b5c668549778
Malware Config
Extracted
formbook
http://www.stonescapes1.com/de92/
zindaginews.com
tyelevator.com
schustermaninterests.com
algemixdelchef.com
doubscollectivites.com
e-butchery.com
hellbentmask.com
jumbpprivacy.com
teeniestiedye.com
playfulartwork.com
desertvacahs.com
w5470-hed.net
nepalearningpods.com
smoothandsleek.com
thecannaglow.com
torrentkittyla.com
industrytoyou.com
raquelvargas.net
rlc-nc.net
cryptoprises.com
chinjungmom.com
blondedevil.com
associationindependence.com
tokachiashi50.xyz
cantstoptennis.com
english3s.com
flowtechblasting.com
customputtputtgolf.com
onointeriors.com
lenafive.com
jygraphics.com
plantologia.com
withatwist2016.com
bingent.info
nakedsumac.com
rosetheamazingrealtor.com
gogoivyschool.com
silhouettebodyspa.com
fomssdf4.com
goodcontractor.net
republicpc.com
zante2020.com
t-junko.com
kittens.finance
mkchemicalvina.com
quadacross.com
maemaetravelworld.com
bradforrexchange.com
fashiongomaufacturer.com
hollapac.com
qxmenye.com
neuro-robotics.com
365shared.com
dinamisapp.com
b3service.com
getyourquan.com
udothat.com
cutting21778.com
vdacouture.com
venerossala.com
thefunboxshoppe.com
indomedianewsc.com
nagansatu.com
precisionoxes.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/2760-11-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/2760-12-0x000000000041D010-mapping.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
3e3d35afbf473c5ed5aec39aba52346f.exedescription pid process target process PID 412 set thread context of 2760 412 3e3d35afbf473c5ed5aec39aba52346f.exe 3e3d35afbf473c5ed5aec39aba52346f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
3e3d35afbf473c5ed5aec39aba52346f.exepid process 2760 3e3d35afbf473c5ed5aec39aba52346f.exe 2760 3e3d35afbf473c5ed5aec39aba52346f.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
3e3d35afbf473c5ed5aec39aba52346f.exedescription pid process target process PID 412 wrote to memory of 2760 412 3e3d35afbf473c5ed5aec39aba52346f.exe 3e3d35afbf473c5ed5aec39aba52346f.exe PID 412 wrote to memory of 2760 412 3e3d35afbf473c5ed5aec39aba52346f.exe 3e3d35afbf473c5ed5aec39aba52346f.exe PID 412 wrote to memory of 2760 412 3e3d35afbf473c5ed5aec39aba52346f.exe 3e3d35afbf473c5ed5aec39aba52346f.exe PID 412 wrote to memory of 2760 412 3e3d35afbf473c5ed5aec39aba52346f.exe 3e3d35afbf473c5ed5aec39aba52346f.exe PID 412 wrote to memory of 2760 412 3e3d35afbf473c5ed5aec39aba52346f.exe 3e3d35afbf473c5ed5aec39aba52346f.exe PID 412 wrote to memory of 2760 412 3e3d35afbf473c5ed5aec39aba52346f.exe 3e3d35afbf473c5ed5aec39aba52346f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e3d35afbf473c5ed5aec39aba52346f.exe"C:\Users\Admin\AppData\Local\Temp\3e3d35afbf473c5ed5aec39aba52346f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\3e3d35afbf473c5ed5aec39aba52346f.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2760
-