Analysis
-
max time kernel
149s -
max time network
12s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
14-01-2021 06:53
Static task
static1
Behavioral task
behavioral1
Sample
PRS TT copy_pdf.exe
Resource
win7v20201028
General
-
Target
PRS TT copy_pdf.exe
-
Size
297KB
-
MD5
c19720396e3a0517b1c3e9c75dcab551
-
SHA1
ceb4ae7e086ebfed538632b9413b7f61c23f6151
-
SHA256
147690957c45aafb5929325a902f5c45e9b3a9845f0c9b273bd1e08f5e327d12
-
SHA512
a16e89c0a6112c1bd0eb75b61337e99ccd68b19b89e6cbbfcc6baa0bcaaffe6cabc209662240d0c929205c67d0ae5822e85b43be5f9d3b7cb62b947b890f00fc
Malware Config
Extracted
formbook
http://www.destinny.com/s9zh/
paintedinafrica.com
electrumfix.download
edlange.com
tqiawy.xyz
satiscenter.xyz
nc-affiliates.com
agencybuilderforum.com
testabcde.net
venisseturf.net
rubenvdsande.com
nzmatrimony.com
mdthriftsandflips.com
virtualfxstudio.com
communityinsuranceut.com
qqbokep.com
copeva.net
bookedupdaily.com
houstongrowmyairway.com
fortunapublishing.com
empireplumbingandheating.com
globalefactory.com
alfrednelson.com
kernwide.com
soulwaves.info
iregentos.info
emfirstchoice.com
popvoc.com
clubdeproyectos.com
nathanlaube.net
davaresoon.com
girlsnightoutcollection.net
alchemdiagnostics.com
intlgrowcap.com
northeasttnrentalproperties.com
1971265.com
yobingo.ltd
comunityassn.com
pupupe.com
physicianmedspa.com
forestloretour.com
tauntongo.com
elegancescent.com
traumatotrust.com
blkdenim.com
b-taking.com
naturalhealthadvisery.com
fight-box.com
socia1security.net
prestondelnorteapartments.com
peaclbgju.icu
thegolfclubatcirclec.com
westqueenwestlofts.com
elitedesignzink.com
czpeixun.com
blossomenterpriseuganda.com
danettesgifts.com
psikometriums.com
rainbowbanks.com
deshbari.com
movementspecialistslv.com
amkcar.com
contractorsan.com
onurtel.com
dotalogy.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1400-2-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1400-3-0x000000000041D060-mapping.dmp xloader behavioral1/memory/1356-4-0x0000000000000000-mapping.dmp xloader -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 4 IoCs
Processes:
PRS TT copy_pdf.exevbc.exehelp.exedescription pid process target process PID 1584 set thread context of 1400 1584 PRS TT copy_pdf.exe vbc.exe PID 1400 set thread context of 1276 1400 vbc.exe Explorer.EXE PID 1400 set thread context of 1276 1400 vbc.exe Explorer.EXE PID 1356 set thread context of 1276 1356 help.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
PRS TT copy_pdf.exevbc.exehelp.exepid process 1584 PRS TT copy_pdf.exe 1584 PRS TT copy_pdf.exe 1584 PRS TT copy_pdf.exe 1400 vbc.exe 1400 vbc.exe 1400 vbc.exe 1356 help.exe 1356 help.exe 1356 help.exe 1356 help.exe 1356 help.exe 1356 help.exe 1356 help.exe 1356 help.exe 1356 help.exe 1356 help.exe 1356 help.exe 1356 help.exe 1356 help.exe 1356 help.exe 1356 help.exe 1356 help.exe 1356 help.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
vbc.exehelp.exepid process 1400 vbc.exe 1400 vbc.exe 1400 vbc.exe 1400 vbc.exe 1356 help.exe 1356 help.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
PRS TT copy_pdf.exevbc.exehelp.exedescription pid process Token: SeDebugPrivilege 1584 PRS TT copy_pdf.exe Token: SeDebugPrivilege 1400 vbc.exe Token: SeDebugPrivilege 1356 help.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
PRS TT copy_pdf.exevbc.exehelp.exedescription pid process target process PID 1584 wrote to memory of 1400 1584 PRS TT copy_pdf.exe vbc.exe PID 1584 wrote to memory of 1400 1584 PRS TT copy_pdf.exe vbc.exe PID 1584 wrote to memory of 1400 1584 PRS TT copy_pdf.exe vbc.exe PID 1584 wrote to memory of 1400 1584 PRS TT copy_pdf.exe vbc.exe PID 1584 wrote to memory of 1400 1584 PRS TT copy_pdf.exe vbc.exe PID 1584 wrote to memory of 1400 1584 PRS TT copy_pdf.exe vbc.exe PID 1584 wrote to memory of 1400 1584 PRS TT copy_pdf.exe vbc.exe PID 1400 wrote to memory of 1356 1400 vbc.exe help.exe PID 1400 wrote to memory of 1356 1400 vbc.exe help.exe PID 1400 wrote to memory of 1356 1400 vbc.exe help.exe PID 1400 wrote to memory of 1356 1400 vbc.exe help.exe PID 1356 wrote to memory of 1388 1356 help.exe cmd.exe PID 1356 wrote to memory of 1388 1356 help.exe cmd.exe PID 1356 wrote to memory of 1388 1356 help.exe cmd.exe PID 1356 wrote to memory of 1388 1356 help.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\PRS TT copy_pdf.exe"C:\Users\Admin\AppData\Local\Temp\PRS TT copy_pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"5⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1356-4-0x0000000000000000-mapping.dmp
-
memory/1356-5-0x00000000005C0000-0x00000000005C6000-memory.dmpFilesize
24KB
-
memory/1356-7-0x0000000004A50000-0x0000000004BA5000-memory.dmpFilesize
1.3MB
-
memory/1388-6-0x0000000000000000-mapping.dmp
-
memory/1400-2-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1400-3-0x000000000041D060-mapping.dmp