Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
15-01-2021 15:57
Static task
static1
Behavioral task
behavioral1
Sample
Invoice_20210115122010.scr
Resource
win7v20201028
General
-
Target
Invoice_20210115122010.scr
-
Size
295KB
-
MD5
ca4bbc7aa2c2cd0bf193b1fe0bbd2d49
-
SHA1
dd82900ef5f0023ebee0c44a7fd0d8bdfea6f635
-
SHA256
5b895b1fe7b66a92588a06eba17a83022da0b539dd9c2eaafbf6082a656f7b57
-
SHA512
0968a8deed84c3d6b7b8a77ade86582f67fc276450268414d695c17d7eb78f091e18107185fbb0f3bc269f928aa8763903c5fa37ece68af4863869b63ef040cd
Malware Config
Extracted
formbook
http://www.elevatedenterprizes.com/h3qo/
dhflow.com
jyindex.com
ezcleanhandle.com
trungtamcongdong.online
simsprotectionagency.com
easylivemeet.com
blackvikingfashionhouse.com
52banxue.com
girlsinit.com
drhemo.com
freethefarmers.com
velvetrosephotography.com
geometricbotaniclas.com
skyandspirit.com
deltacomunicacao.com
mucademy.com
jaboilfieldsolutions.net
howtowinatblackjacknow.com
anytimegrowth.com
simranluthra.com
thefinleyshow.com
basalmeals.com
esurpluss.com
hrbjczsfs.com
tourphuquocnguyenhien.com
mxprographics.com
themetaphysicalmaster.net
directorystar.asia
thehomeofdiamonds.com
riqinxin.com
covicio.com
sciineurope.com
womensportclothes.com
celestialchimes.net
lotsmen.com
hi-rescloud.net
lewisnathaniel.com
ageonward.com
eyetownglasses.com
bingent.info
matildealvaradovera.com
otorrinonews.com
cdeg898.com
lexingtoncoorgresort.com
minidachshundpups.com
tools365-shop.com
romancingtheeras.com
residentmining.com
aquaflowsprinklers.com
crackapks.com
caffeinatedeverafter.com
sureyyapasa.net
strawberryhearts.com
ptgo.net
devyshkam.com
thethrottletherapy.com
givelyrics.com
signaturepsinc.com
mersinsudunyasi.com
fivedayskitchen.com
fefebeauty.com
long0001.com
hmm40.com
claracarbon.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3824-4-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3824-5-0x000000000041D0E0-mapping.dmp xloader behavioral2/memory/668-7-0x0000000000000000-mapping.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Invoice_20210115122010.scrInvoice_20210115122010.scrraserver.exedescription pid process target process PID 988 set thread context of 3824 988 Invoice_20210115122010.scr Invoice_20210115122010.scr PID 3824 set thread context of 2784 3824 Invoice_20210115122010.scr Explorer.EXE PID 668 set thread context of 2784 668 raserver.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 62 IoCs
Processes:
Invoice_20210115122010.scrraserver.exepid process 3824 Invoice_20210115122010.scr 3824 Invoice_20210115122010.scr 3824 Invoice_20210115122010.scr 3824 Invoice_20210115122010.scr 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe 668 raserver.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
Invoice_20210115122010.scrInvoice_20210115122010.scrraserver.exepid process 988 Invoice_20210115122010.scr 3824 Invoice_20210115122010.scr 3824 Invoice_20210115122010.scr 3824 Invoice_20210115122010.scr 668 raserver.exe 668 raserver.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
Invoice_20210115122010.scrraserver.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 3824 Invoice_20210115122010.scr Token: SeDebugPrivilege 668 raserver.exe Token: SeShutdownPrivilege 2784 Explorer.EXE Token: SeCreatePagefilePrivilege 2784 Explorer.EXE Token: SeShutdownPrivilege 2784 Explorer.EXE Token: SeCreatePagefilePrivilege 2784 Explorer.EXE Token: SeShutdownPrivilege 2784 Explorer.EXE Token: SeCreatePagefilePrivilege 2784 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 2784 Explorer.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
Invoice_20210115122010.scrExplorer.EXEraserver.exedescription pid process target process PID 988 wrote to memory of 2392 988 Invoice_20210115122010.scr cmd.exe PID 988 wrote to memory of 2392 988 Invoice_20210115122010.scr cmd.exe PID 988 wrote to memory of 2392 988 Invoice_20210115122010.scr cmd.exe PID 988 wrote to memory of 2880 988 Invoice_20210115122010.scr cmd.exe PID 988 wrote to memory of 2880 988 Invoice_20210115122010.scr cmd.exe PID 988 wrote to memory of 2880 988 Invoice_20210115122010.scr cmd.exe PID 988 wrote to memory of 3824 988 Invoice_20210115122010.scr Invoice_20210115122010.scr PID 988 wrote to memory of 3824 988 Invoice_20210115122010.scr Invoice_20210115122010.scr PID 988 wrote to memory of 3824 988 Invoice_20210115122010.scr Invoice_20210115122010.scr PID 988 wrote to memory of 3824 988 Invoice_20210115122010.scr Invoice_20210115122010.scr PID 2784 wrote to memory of 668 2784 Explorer.EXE raserver.exe PID 2784 wrote to memory of 668 2784 Explorer.EXE raserver.exe PID 2784 wrote to memory of 668 2784 Explorer.EXE raserver.exe PID 668 wrote to memory of 3580 668 raserver.exe cmd.exe PID 668 wrote to memory of 3580 668 raserver.exe cmd.exe PID 668 wrote to memory of 3580 668 raserver.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Invoice_20210115122010.scr"C:\Users\Admin\AppData\Local\Temp\Invoice_20210115122010.scr" /S2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵
-
C:\Users\Admin\AppData\Local\Temp\Invoice_20210115122010.scr"C:\Users\Admin\AppData\Local\Temp\Invoice_20210115122010.scr" /S3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Invoice_20210115122010.scr"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/668-7-0x0000000000000000-mapping.dmp
-
memory/668-8-0x00000000011F0000-0x000000000120F000-memory.dmpFilesize
124KB
-
memory/668-9-0x00000000011F0000-0x000000000120F000-memory.dmpFilesize
124KB
-
memory/668-11-0x0000000006700000-0x000000000685E000-memory.dmpFilesize
1.4MB
-
memory/2392-2-0x0000000000000000-mapping.dmp
-
memory/2880-3-0x0000000000000000-mapping.dmp
-
memory/3580-10-0x0000000000000000-mapping.dmp
-
memory/3824-4-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3824-5-0x000000000041D0E0-mapping.dmp