Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
17-01-2021 18:09
Static task
static1
Behavioral task
behavioral1
Sample
Scan Document 01.exe
Resource
win7v20201028
General
-
Target
Scan Document 01.exe
-
Size
435KB
-
MD5
47a3b1f5f7a8f5d342654a4e351d62ea
-
SHA1
e94eca6012b651847bfb4212c21c989041d1438e
-
SHA256
196b4470cd98c4f6d5c634170a1c6a98cf59b61c9b12a032ec9fb776b74a0527
-
SHA512
d4f4b0064830a0091a9ed070f9e43c0abb768d1fc4bf6d5a9589f2ce3b4a0908125264233a53119c914994474a30f628c04fbdb0361d2e8556094caebb0e303e
Malware Config
Extracted
formbook
http://www.elevatedenterprizes.com/h3qo/
dhflow.com
jyindex.com
ezcleanhandle.com
trungtamcongdong.online
simsprotectionagency.com
easylivemeet.com
blackvikingfashionhouse.com
52banxue.com
girlsinit.com
drhemo.com
freethefarmers.com
velvetrosephotography.com
geometricbotaniclas.com
skyandspirit.com
deltacomunicacao.com
mucademy.com
jaboilfieldsolutions.net
howtowinatblackjacknow.com
anytimegrowth.com
simranluthra.com
thefinleyshow.com
basalmeals.com
esurpluss.com
hrbjczsfs.com
tourphuquocnguyenhien.com
mxprographics.com
themetaphysicalmaster.net
directorystar.asia
thehomeofdiamonds.com
riqinxin.com
covicio.com
sciineurope.com
womensportclothes.com
celestialchimes.net
lotsmen.com
hi-rescloud.net
lewisnathaniel.com
ageonward.com
eyetownglasses.com
bingent.info
matildealvaradovera.com
otorrinonews.com
cdeg898.com
lexingtoncoorgresort.com
minidachshundpups.com
tools365-shop.com
romancingtheeras.com
residentmining.com
aquaflowsprinklers.com
crackapks.com
caffeinatedeverafter.com
sureyyapasa.net
strawberryhearts.com
ptgo.net
devyshkam.com
thethrottletherapy.com
givelyrics.com
signaturepsinc.com
mersinsudunyasi.com
fivedayskitchen.com
fefebeauty.com
long0001.com
hmm40.com
claracarbon.com
Signatures
-
Xloader Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2848-11-0x0000000003000000-0x0000000003029000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
Processes:
Scan Document 01.exeScan Document 01.exewscript.exedescription pid process target process PID 4092 set thread context of 2704 4092 Scan Document 01.exe Scan Document 01.exe PID 2704 set thread context of 2756 2704 Scan Document 01.exe Explorer.EXE PID 2704 set thread context of 2756 2704 Scan Document 01.exe Explorer.EXE PID 2848 set thread context of 2756 2848 wscript.exe Explorer.EXE -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_&Prod_HeartDisk\4&37ce57ba&0&000000\FriendlyName taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 194 IoCs
Processes:
Scan Document 01.exewscript.exetaskmgr.exepid process 2704 Scan Document 01.exe 2704 Scan Document 01.exe 2704 Scan Document 01.exe 2704 Scan Document 01.exe 2704 Scan Document 01.exe 2704 Scan Document 01.exe 2848 wscript.exe 2848 wscript.exe 2848 wscript.exe 2848 wscript.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 2848 wscript.exe 2848 wscript.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 2848 wscript.exe 2848 wscript.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 2848 wscript.exe 2848 wscript.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 2848 wscript.exe 2848 wscript.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 2848 wscript.exe 2848 wscript.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 2848 wscript.exe 2848 wscript.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 2848 wscript.exe 1544 taskmgr.exe 2848 wscript.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
Processes:
Explorer.EXEtaskmgr.exepid process 2756 Explorer.EXE 1544 taskmgr.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
Scan Document 01.exeScan Document 01.exewscript.exepid process 4092 Scan Document 01.exe 4092 Scan Document 01.exe 2704 Scan Document 01.exe 2704 Scan Document 01.exe 2704 Scan Document 01.exe 2704 Scan Document 01.exe 2848 wscript.exe 2848 wscript.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
Processes:
Scan Document 01.exeExplorer.EXEwscript.exetaskmgr.exedescription pid process Token: SeDebugPrivilege 2704 Scan Document 01.exe Token: SeShutdownPrivilege 2756 Explorer.EXE Token: SeCreatePagefilePrivilege 2756 Explorer.EXE Token: SeShutdownPrivilege 2756 Explorer.EXE Token: SeCreatePagefilePrivilege 2756 Explorer.EXE Token: SeShutdownPrivilege 2756 Explorer.EXE Token: SeCreatePagefilePrivilege 2756 Explorer.EXE Token: SeShutdownPrivilege 2756 Explorer.EXE Token: SeCreatePagefilePrivilege 2756 Explorer.EXE Token: SeShutdownPrivilege 2756 Explorer.EXE Token: SeCreatePagefilePrivilege 2756 Explorer.EXE Token: SeShutdownPrivilege 2756 Explorer.EXE Token: SeCreatePagefilePrivilege 2756 Explorer.EXE Token: SeDebugPrivilege 2848 wscript.exe Token: SeShutdownPrivilege 2756 Explorer.EXE Token: SeCreatePagefilePrivilege 2756 Explorer.EXE Token: SeShutdownPrivilege 2756 Explorer.EXE Token: SeCreatePagefilePrivilege 2756 Explorer.EXE Token: SeDebugPrivilege 1544 taskmgr.exe Token: SeSystemProfilePrivilege 1544 taskmgr.exe Token: SeCreateGlobalPrivilege 1544 taskmgr.exe Token: SeShutdownPrivilege 2756 Explorer.EXE Token: SeCreatePagefilePrivilege 2756 Explorer.EXE Token: SeShutdownPrivilege 2756 Explorer.EXE Token: SeCreatePagefilePrivilege 2756 Explorer.EXE Token: SeShutdownPrivilege 2756 Explorer.EXE Token: SeCreatePagefilePrivilege 2756 Explorer.EXE Token: SeShutdownPrivilege 2756 Explorer.EXE Token: SeCreatePagefilePrivilege 2756 Explorer.EXE Token: SeShutdownPrivilege 2756 Explorer.EXE Token: SeCreatePagefilePrivilege 2756 Explorer.EXE Token: SeShutdownPrivilege 2756 Explorer.EXE Token: SeCreatePagefilePrivilege 2756 Explorer.EXE Token: SeShutdownPrivilege 2756 Explorer.EXE Token: SeCreatePagefilePrivilege 2756 Explorer.EXE -
Suspicious use of FindShellTrayWindow 28 IoCs
Processes:
taskmgr.exepid process 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe -
Suspicious use of SendNotifyMessage 27 IoCs
Processes:
taskmgr.exepid process 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe 1544 taskmgr.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 2756 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Scan Document 01.exeExplorer.EXEwscript.exedescription pid process target process PID 4092 wrote to memory of 2704 4092 Scan Document 01.exe Scan Document 01.exe PID 4092 wrote to memory of 2704 4092 Scan Document 01.exe Scan Document 01.exe PID 4092 wrote to memory of 2704 4092 Scan Document 01.exe Scan Document 01.exe PID 4092 wrote to memory of 2704 4092 Scan Document 01.exe Scan Document 01.exe PID 2756 wrote to memory of 2848 2756 Explorer.EXE wscript.exe PID 2756 wrote to memory of 2848 2756 Explorer.EXE wscript.exe PID 2756 wrote to memory of 2848 2756 Explorer.EXE wscript.exe PID 2848 wrote to memory of 4000 2848 wscript.exe cmd.exe PID 2848 wrote to memory of 4000 2848 wscript.exe cmd.exe PID 2848 wrote to memory of 4000 2848 wscript.exe cmd.exe PID 2756 wrote to memory of 1544 2756 Explorer.EXE taskmgr.exe PID 2756 wrote to memory of 1544 2756 Explorer.EXE taskmgr.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Scan Document 01.exe"C:\Users\Admin\AppData\Local\Temp\Scan Document 01.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Scan Document 01.exe"C:\Users\Admin\AppData\Local\Temp\Scan Document 01.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Scan Document 01.exe"3⤵
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /42⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1544-15-0x0000000000000000-mapping.dmp
-
memory/2704-5-0x00000000006D0000-0x00000000006E0000-memory.dmpFilesize
64KB
-
memory/2704-4-0x0000000000D90000-0x00000000010B0000-memory.dmpFilesize
3.1MB
-
memory/2704-7-0x00000000008B0000-0x00000000008C0000-memory.dmpFilesize
64KB
-
memory/2704-2-0x00000000005AD0E0-mapping.dmp
-
memory/2756-6-0x0000000002B70000-0x0000000002CD2000-memory.dmpFilesize
1.4MB
-
memory/2756-8-0x0000000006070000-0x0000000006145000-memory.dmpFilesize
852KB
-
memory/2756-16-0x00000000067D0000-0x00000000068A8000-memory.dmpFilesize
864KB
-
memory/2848-9-0x0000000000000000-mapping.dmp
-
memory/2848-13-0x00000000046B0000-0x00000000049D0000-memory.dmpFilesize
3.1MB
-
memory/2848-14-0x0000000004A60000-0x0000000004AEF000-memory.dmpFilesize
572KB
-
memory/2848-10-0x0000000000B30000-0x0000000000B57000-memory.dmpFilesize
156KB
-
memory/2848-11-0x0000000003000000-0x0000000003029000-memory.dmpFilesize
164KB
-
memory/4000-12-0x0000000000000000-mapping.dmp