Analysis
-
max time kernel
124s -
max time network
123s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
15-01-2021 06:45
Static task
static1
Behavioral task
behavioral1
Sample
78977c6e1352baf3e4659e10724ac05f.exe
Resource
win7v20201028
General
-
Target
78977c6e1352baf3e4659e10724ac05f.exe
-
Size
644KB
-
MD5
78977c6e1352baf3e4659e10724ac05f
-
SHA1
7a81e17504370035e70e0452b772fef857e5e169
-
SHA256
c41c3e04f58d643f5d30f52077a53a8c151d835aa44da144b9165a0297314f14
-
SHA512
f83606e8789dbc00321eb48a8521c4e75f48ca2fc0b6f60cb90ad9ff58e8b5cf3102a4382a806a4b5c30986446d7cb2b9df684e74b47f3da95eec5fd676e4559
Malware Config
Extracted
formbook
http://www.learnhour.net/eaud/
modshiro.com
mademarketingoss.com
austinjourls.info
wayupteam.com
crossingfinger.com
interseptors.com
gigashit.com
livetigo.com
halamankuningindonesia.com
windhammills.com
aylinahmet.com
mbacexonan.website
shopboxbarcelona.com
youyeslive.com
coonlinesportsbooks.com
guorunme.com
putlocker2.site
pencueaidnetwork.com
likevector.com
vulcanudachi-proclub.com
bestcollegelms.online
bosman-smm.online
maglex.info
tolentinestore.com
layaliskincare.com
pensionbackup.com
mettyapp.com
sun-microsoft.com
cheapcialisffx.com
egio.digital
syndicatesportspicks.com
pinnacle.international
realestatejewel.com
dajiankang.love
acaijunglegroup.com
youraircases.com
cdxxcenter.com
ndblife.com
mersinsimsek.com
modernofficeaccessories.com
opioidfactswalgreens.com
yesmywigs.com
lebaronfuneraire.com
missfoxie.com
minbarlibya.com
themalaysialife.com
glz-cc.com
go892.com
eriesbestcaterer.com
geraldreed.com
casinocerto.com
beambitioussummit.com
rfs.company
juliandehaas.com
enooga.com
sulpher.network
toords.com
breaking-news4u.com
erkdigitalmarketing.com
blazorstore.com
weoneqa.com
coalitionsentiment.win
atoidejuger.com
cumbiamba.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1396-7-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/1396-8-0x000000000041D030-mapping.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
78977c6e1352baf3e4659e10724ac05f.exedescription pid process target process PID 932 set thread context of 1396 932 78977c6e1352baf3e4659e10724ac05f.exe 78977c6e1352baf3e4659e10724ac05f.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
78977c6e1352baf3e4659e10724ac05f.exe78977c6e1352baf3e4659e10724ac05f.exepid process 932 78977c6e1352baf3e4659e10724ac05f.exe 932 78977c6e1352baf3e4659e10724ac05f.exe 1396 78977c6e1352baf3e4659e10724ac05f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
78977c6e1352baf3e4659e10724ac05f.exedescription pid process Token: SeDebugPrivilege 932 78977c6e1352baf3e4659e10724ac05f.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
78977c6e1352baf3e4659e10724ac05f.exedescription pid process target process PID 932 wrote to memory of 904 932 78977c6e1352baf3e4659e10724ac05f.exe 78977c6e1352baf3e4659e10724ac05f.exe PID 932 wrote to memory of 904 932 78977c6e1352baf3e4659e10724ac05f.exe 78977c6e1352baf3e4659e10724ac05f.exe PID 932 wrote to memory of 904 932 78977c6e1352baf3e4659e10724ac05f.exe 78977c6e1352baf3e4659e10724ac05f.exe PID 932 wrote to memory of 904 932 78977c6e1352baf3e4659e10724ac05f.exe 78977c6e1352baf3e4659e10724ac05f.exe PID 932 wrote to memory of 1396 932 78977c6e1352baf3e4659e10724ac05f.exe 78977c6e1352baf3e4659e10724ac05f.exe PID 932 wrote to memory of 1396 932 78977c6e1352baf3e4659e10724ac05f.exe 78977c6e1352baf3e4659e10724ac05f.exe PID 932 wrote to memory of 1396 932 78977c6e1352baf3e4659e10724ac05f.exe 78977c6e1352baf3e4659e10724ac05f.exe PID 932 wrote to memory of 1396 932 78977c6e1352baf3e4659e10724ac05f.exe 78977c6e1352baf3e4659e10724ac05f.exe PID 932 wrote to memory of 1396 932 78977c6e1352baf3e4659e10724ac05f.exe 78977c6e1352baf3e4659e10724ac05f.exe PID 932 wrote to memory of 1396 932 78977c6e1352baf3e4659e10724ac05f.exe 78977c6e1352baf3e4659e10724ac05f.exe PID 932 wrote to memory of 1396 932 78977c6e1352baf3e4659e10724ac05f.exe 78977c6e1352baf3e4659e10724ac05f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\78977c6e1352baf3e4659e10724ac05f.exe"C:\Users\Admin\AppData\Local\Temp\78977c6e1352baf3e4659e10724ac05f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\78977c6e1352baf3e4659e10724ac05f.exe"{path}"2⤵
-
C:\Users\Admin\AppData\Local\Temp\78977c6e1352baf3e4659e10724ac05f.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/932-2-0x0000000074120000-0x000000007480E000-memory.dmpFilesize
6.9MB
-
memory/932-3-0x0000000000010000-0x0000000000011000-memory.dmpFilesize
4KB
-
memory/932-5-0x00000000002E0000-0x00000000002EE000-memory.dmpFilesize
56KB
-
memory/932-6-0x00000000056C0000-0x000000000574E000-memory.dmpFilesize
568KB
-
memory/1396-7-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1396-8-0x000000000041D030-mapping.dmp