Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
15-01-2021 07:10
Static task
static1
Behavioral task
behavioral1
Sample
Draft FCR-HBL.exe
Resource
win7v20201028
General
-
Target
Draft FCR-HBL.exe
-
Size
642KB
-
MD5
cca5f563da874fee695fd34f35d9692a
-
SHA1
727fb4e81e190f36516432e2d3e07c22e7534ca5
-
SHA256
5cd75052c82b5ff0cc1261075c4fdb060c21062c72525508cbb75e44683f6d0b
-
SHA512
7ae58590d4540eac9cda384adb1d7fb206d4c9086cdfd5797a3add87eb60025f92824ed63ceeda578303adde0f247ca701f3904762eacda5cd9d99c22811c5f6
Malware Config
Extracted
formbook
http://www.basketballcardgame.com/mmfg/
sweetlifeandstyle.com
testhomesteaddomain.com
findersforce.com
tmobitvmall.com
wishganmet.info
shimizuvps.com
onfirecreativegroup.com
jeremyroywilliams.com
utopiabangkok.com
caiwweizipper.com
kvartira.credit
shreesakthifoods.com
redirmsg.com
ellopooch.com
casinossurveillancenetwork.com
taskso.com
aaoficial.life
jointwellscap.com
katecorc.com
talkbirds.com
adminsurancecompany.com
miralaksana.com
justfoo.com
interviewwithsteph.com
loveinspiredtees.com
ltosun.com
thejerseystar.com
discoursethis.com
kwunitedtraining.com
sjruondra.xyz
grandeislandvacations.com
pearlnourishment.com
mtmseg.com
tiendaricoffs.com
maglex.info
everydaybiophilia.com
erkekmedikal.com
winluckylotto.com
pall.info
elinjakobsson.com
diziizletv.com
criptofast.com
blurthelinestour.com
simultasking.com
vipdx.info
rakuraku-shopping.net
equineecg.com
custom-clearanceuae.com
hobubru.com
medkrt.com
aingfr.com
logotrick.com
rathapatuna.com
flywayc.com
marketerjnm.com
furppufaw.icu
aiw-abuhagar.com
mudrametrics.com
topcasinosinus.com
saudi2027.com
39echoglen.com
telamdlife.com
guitarlessonsfairfield.com
felixkrell-official.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1664-8-0x000000000041D100-mapping.dmp xloader behavioral1/memory/1664-7-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/268-9-0x0000000000000000-mapping.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1052 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Draft FCR-HBL.exeDraft FCR-HBL.execontrol.exedescription pid process target process PID 1068 set thread context of 1664 1068 Draft FCR-HBL.exe Draft FCR-HBL.exe PID 1664 set thread context of 1236 1664 Draft FCR-HBL.exe Explorer.EXE PID 268 set thread context of 1236 268 control.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
Draft FCR-HBL.execontrol.exepid process 1664 Draft FCR-HBL.exe 1664 Draft FCR-HBL.exe 268 control.exe 268 control.exe 268 control.exe 268 control.exe 268 control.exe 268 control.exe 268 control.exe 268 control.exe 268 control.exe 268 control.exe 268 control.exe 268 control.exe 268 control.exe 268 control.exe 268 control.exe 268 control.exe 268 control.exe 268 control.exe 268 control.exe 268 control.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Draft FCR-HBL.execontrol.exepid process 1664 Draft FCR-HBL.exe 1664 Draft FCR-HBL.exe 1664 Draft FCR-HBL.exe 268 control.exe 268 control.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Draft FCR-HBL.execontrol.exedescription pid process Token: SeDebugPrivilege 1664 Draft FCR-HBL.exe Token: SeDebugPrivilege 268 control.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Draft FCR-HBL.exeExplorer.EXEcontrol.exedescription pid process target process PID 1068 wrote to memory of 1664 1068 Draft FCR-HBL.exe Draft FCR-HBL.exe PID 1068 wrote to memory of 1664 1068 Draft FCR-HBL.exe Draft FCR-HBL.exe PID 1068 wrote to memory of 1664 1068 Draft FCR-HBL.exe Draft FCR-HBL.exe PID 1068 wrote to memory of 1664 1068 Draft FCR-HBL.exe Draft FCR-HBL.exe PID 1068 wrote to memory of 1664 1068 Draft FCR-HBL.exe Draft FCR-HBL.exe PID 1068 wrote to memory of 1664 1068 Draft FCR-HBL.exe Draft FCR-HBL.exe PID 1068 wrote to memory of 1664 1068 Draft FCR-HBL.exe Draft FCR-HBL.exe PID 1236 wrote to memory of 268 1236 Explorer.EXE control.exe PID 1236 wrote to memory of 268 1236 Explorer.EXE control.exe PID 1236 wrote to memory of 268 1236 Explorer.EXE control.exe PID 1236 wrote to memory of 268 1236 Explorer.EXE control.exe PID 268 wrote to memory of 1052 268 control.exe cmd.exe PID 268 wrote to memory of 1052 268 control.exe cmd.exe PID 268 wrote to memory of 1052 268 control.exe cmd.exe PID 268 wrote to memory of 1052 268 control.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Draft FCR-HBL.exe"C:\Users\Admin\AppData\Local\Temp\Draft FCR-HBL.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Draft FCR-HBL.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Draft FCR-HBL.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/268-9-0x0000000000000000-mapping.dmp
-
memory/268-10-0x00000000001A0000-0x00000000001BF000-memory.dmpFilesize
124KB
-
memory/268-12-0x0000000004250000-0x00000000043BB000-memory.dmpFilesize
1.4MB
-
memory/1052-11-0x0000000000000000-mapping.dmp
-
memory/1068-2-0x0000000074710000-0x0000000074DFE000-memory.dmpFilesize
6.9MB
-
memory/1068-3-0x0000000000A00000-0x0000000000A01000-memory.dmpFilesize
4KB
-
memory/1068-5-0x0000000000220000-0x000000000022E000-memory.dmpFilesize
56KB
-
memory/1068-6-0x00000000052B0000-0x000000000533C000-memory.dmpFilesize
560KB
-
memory/1664-8-0x000000000041D100-mapping.dmp
-
memory/1664-7-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB