Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
15-01-2021 07:10
Static task
static1
Behavioral task
behavioral1
Sample
Draft FCR-HBL.exe
Resource
win7v20201028
General
-
Target
Draft FCR-HBL.exe
-
Size
642KB
-
MD5
cca5f563da874fee695fd34f35d9692a
-
SHA1
727fb4e81e190f36516432e2d3e07c22e7534ca5
-
SHA256
5cd75052c82b5ff0cc1261075c4fdb060c21062c72525508cbb75e44683f6d0b
-
SHA512
7ae58590d4540eac9cda384adb1d7fb206d4c9086cdfd5797a3add87eb60025f92824ed63ceeda578303adde0f247ca701f3904762eacda5cd9d99c22811c5f6
Malware Config
Extracted
formbook
http://www.basketballcardgame.com/mmfg/
sweetlifeandstyle.com
testhomesteaddomain.com
findersforce.com
tmobitvmall.com
wishganmet.info
shimizuvps.com
onfirecreativegroup.com
jeremyroywilliams.com
utopiabangkok.com
caiwweizipper.com
kvartira.credit
shreesakthifoods.com
redirmsg.com
ellopooch.com
casinossurveillancenetwork.com
taskso.com
aaoficial.life
jointwellscap.com
katecorc.com
talkbirds.com
adminsurancecompany.com
miralaksana.com
justfoo.com
interviewwithsteph.com
loveinspiredtees.com
ltosun.com
thejerseystar.com
discoursethis.com
kwunitedtraining.com
sjruondra.xyz
grandeislandvacations.com
pearlnourishment.com
mtmseg.com
tiendaricoffs.com
maglex.info
everydaybiophilia.com
erkekmedikal.com
winluckylotto.com
pall.info
elinjakobsson.com
diziizletv.com
criptofast.com
blurthelinestour.com
simultasking.com
vipdx.info
rakuraku-shopping.net
equineecg.com
custom-clearanceuae.com
hobubru.com
medkrt.com
aingfr.com
logotrick.com
rathapatuna.com
flywayc.com
marketerjnm.com
furppufaw.icu
aiw-abuhagar.com
mudrametrics.com
topcasinosinus.com
saudi2027.com
39echoglen.com
telamdlife.com
guitarlessonsfairfield.com
felixkrell-official.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1384-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1384-12-0x000000000041D100-mapping.dmp xloader behavioral2/memory/980-14-0x0000000000000000-mapping.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
Processes:
Draft FCR-HBL.exeDraft FCR-HBL.exenetsh.exedescription pid process target process PID 1316 set thread context of 1384 1316 Draft FCR-HBL.exe Draft FCR-HBL.exe PID 1384 set thread context of 2352 1384 Draft FCR-HBL.exe Explorer.EXE PID 1384 set thread context of 2352 1384 Draft FCR-HBL.exe Explorer.EXE PID 980 set thread context of 2352 980 netsh.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 48 IoCs
Processes:
Draft FCR-HBL.exenetsh.exepid process 1384 Draft FCR-HBL.exe 1384 Draft FCR-HBL.exe 1384 Draft FCR-HBL.exe 1384 Draft FCR-HBL.exe 1384 Draft FCR-HBL.exe 1384 Draft FCR-HBL.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe 980 netsh.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
Draft FCR-HBL.exenetsh.exepid process 1384 Draft FCR-HBL.exe 1384 Draft FCR-HBL.exe 1384 Draft FCR-HBL.exe 1384 Draft FCR-HBL.exe 980 netsh.exe 980 netsh.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Draft FCR-HBL.exenetsh.exedescription pid process Token: SeDebugPrivilege 1384 Draft FCR-HBL.exe Token: SeDebugPrivilege 980 netsh.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 2352 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Draft FCR-HBL.exeExplorer.EXEnetsh.exedescription pid process target process PID 1316 wrote to memory of 1384 1316 Draft FCR-HBL.exe Draft FCR-HBL.exe PID 1316 wrote to memory of 1384 1316 Draft FCR-HBL.exe Draft FCR-HBL.exe PID 1316 wrote to memory of 1384 1316 Draft FCR-HBL.exe Draft FCR-HBL.exe PID 1316 wrote to memory of 1384 1316 Draft FCR-HBL.exe Draft FCR-HBL.exe PID 1316 wrote to memory of 1384 1316 Draft FCR-HBL.exe Draft FCR-HBL.exe PID 1316 wrote to memory of 1384 1316 Draft FCR-HBL.exe Draft FCR-HBL.exe PID 2352 wrote to memory of 980 2352 Explorer.EXE netsh.exe PID 2352 wrote to memory of 980 2352 Explorer.EXE netsh.exe PID 2352 wrote to memory of 980 2352 Explorer.EXE netsh.exe PID 980 wrote to memory of 500 980 netsh.exe cmd.exe PID 980 wrote to memory of 500 980 netsh.exe cmd.exe PID 980 wrote to memory of 500 980 netsh.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Draft FCR-HBL.exe"C:\Users\Admin\AppData\Local\Temp\Draft FCR-HBL.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Draft FCR-HBL.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Draft FCR-HBL.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/500-17-0x0000000000000000-mapping.dmp
-
memory/980-14-0x0000000000000000-mapping.dmp
-
memory/980-18-0x0000000005720000-0x00000000058A3000-memory.dmpFilesize
1.5MB
-
memory/980-16-0x0000000000980000-0x000000000099E000-memory.dmpFilesize
120KB
-
memory/980-15-0x0000000000980000-0x000000000099E000-memory.dmpFilesize
120KB
-
memory/1316-9-0x0000000007C40000-0x0000000007CCC000-memory.dmpFilesize
560KB
-
memory/1316-2-0x0000000073C50000-0x000000007433E000-memory.dmpFilesize
6.9MB
-
memory/1316-10-0x0000000007D70000-0x0000000007D71000-memory.dmpFilesize
4KB
-
memory/1316-8-0x00000000057D0000-0x00000000057DE000-memory.dmpFilesize
56KB
-
memory/1316-7-0x0000000005650000-0x0000000005651000-memory.dmpFilesize
4KB
-
memory/1316-6-0x00000000056A0000-0x00000000056A1000-memory.dmpFilesize
4KB
-
memory/1316-5-0x0000000005D00000-0x0000000005D01000-memory.dmpFilesize
4KB
-
memory/1316-3-0x0000000000D80000-0x0000000000D81000-memory.dmpFilesize
4KB
-
memory/1384-11-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1384-12-0x000000000041D100-mapping.dmp