Analysis
-
max time kernel
150s -
max time network
92s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
18-01-2021 07:44
Static task
static1
Behavioral task
behavioral1
Sample
ec93682406cb590651215da741f3c8d1.exe
Resource
win7v20201028
General
-
Target
ec93682406cb590651215da741f3c8d1.exe
-
Size
475KB
-
MD5
ec93682406cb590651215da741f3c8d1
-
SHA1
cc6243df7e6b835bf476a41023b8ff4ebb66b9ac
-
SHA256
b88d84be2994a05ac716dac99a689356d8c7ecbd541989a5339be403da909430
-
SHA512
8bcacb9f570546494d0c0c7c301f1d5e6ddf0b20d3af6d2652241e35aaf905e7c46598344413b59ec41f517f6515488749e7df9e5705d523a755013fe6199934
Malware Config
Extracted
formbook
http://www.inreachpt.com/gqx2/
calusaptamiami.com
starlinkwebservices.com
lakeviewbarbershonola.com
oaklandraidersjerseyspop.com
ohiotechreport.com
eligetucafetera.com
tu4343.com
abstract-elearning.com
thebabylashes.com
athleteshive.com
fanninhomesforless.com
sembracna.com
servicesyn.com
bellairechoice.com
tmpaas.com
eyepaa.com
stickerzblvd.com
rentfs.com
nadya-shanab.com
microwgreens.net
overnaut.net
edwinstowingservices.com
bonus189.space
xn--wgbp0b73b.com
trijjadigital.com
libraspeed.com
theofficialtoluwani.com
podborauto.pro
qyhualin.com
prayerswithmary.com
donboscohistorycorner.com
enlightenedsoil.com
osteopathegagny.com
lookingglassland.com
maglex.info
foxandgraceboutique.com
yourinfluencecoach.com
com-cancel-payment-id655.com
ppspiaggio.com
dbsadv.com
teamworkdash.com
washington-election-2020.info
creativehighagency.com
artisthenewmeditation.com
qsgasia.com
unseen-vision.com
beepybox.online
shaffglowing.com
teacher-retirement-info.info
muabandatdonganh.com
shuhan.design
5200853.com
shengmixiaoji.net
spiderofthesea.com
scionoflewisville.com
tpcvirtual.com
zhjiaxiang.com
thefanexam.com
kimscraftyresale.com
housvest.com
bukmyhotel.com
lacaverne.ovh
investorspredict.com
quicklogosireland.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1264-7-0x000000000041D070-mapping.dmp xloader behavioral1/memory/1264-6-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ec93682406cb590651215da741f3c8d1.exedescription pid process target process PID 1096 set thread context of 1264 1096 ec93682406cb590651215da741f3c8d1.exe ec93682406cb590651215da741f3c8d1.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1968 1096 WerFault.exe ec93682406cb590651215da741f3c8d1.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
ec93682406cb590651215da741f3c8d1.exeWerFault.exepid process 1264 ec93682406cb590651215da741f3c8d1.exe 1968 WerFault.exe 1968 WerFault.exe 1968 WerFault.exe 1968 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 1968 WerFault.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
ec93682406cb590651215da741f3c8d1.exedescription pid process target process PID 1096 wrote to memory of 1264 1096 ec93682406cb590651215da741f3c8d1.exe ec93682406cb590651215da741f3c8d1.exe PID 1096 wrote to memory of 1264 1096 ec93682406cb590651215da741f3c8d1.exe ec93682406cb590651215da741f3c8d1.exe PID 1096 wrote to memory of 1264 1096 ec93682406cb590651215da741f3c8d1.exe ec93682406cb590651215da741f3c8d1.exe PID 1096 wrote to memory of 1264 1096 ec93682406cb590651215da741f3c8d1.exe ec93682406cb590651215da741f3c8d1.exe PID 1096 wrote to memory of 1264 1096 ec93682406cb590651215da741f3c8d1.exe ec93682406cb590651215da741f3c8d1.exe PID 1096 wrote to memory of 1264 1096 ec93682406cb590651215da741f3c8d1.exe ec93682406cb590651215da741f3c8d1.exe PID 1096 wrote to memory of 1264 1096 ec93682406cb590651215da741f3c8d1.exe ec93682406cb590651215da741f3c8d1.exe PID 1096 wrote to memory of 1968 1096 ec93682406cb590651215da741f3c8d1.exe WerFault.exe PID 1096 wrote to memory of 1968 1096 ec93682406cb590651215da741f3c8d1.exe WerFault.exe PID 1096 wrote to memory of 1968 1096 ec93682406cb590651215da741f3c8d1.exe WerFault.exe PID 1096 wrote to memory of 1968 1096 ec93682406cb590651215da741f3c8d1.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec93682406cb590651215da741f3c8d1.exe"C:\Users\Admin\AppData\Local\Temp\ec93682406cb590651215da741f3c8d1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ec93682406cb590651215da741f3c8d1.exe"C:\Users\Admin\AppData\Local\Temp\ec93682406cb590651215da741f3c8d1.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1096 -s 8402⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1096-2-0x0000000074CF0000-0x00000000753DE000-memory.dmpFilesize
6.9MB
-
memory/1096-3-0x0000000001200000-0x0000000001201000-memory.dmpFilesize
4KB
-
memory/1096-4-0x00000000004E0000-0x0000000000536000-memory.dmpFilesize
344KB
-
memory/1096-5-0x0000000000220000-0x000000000022F000-memory.dmpFilesize
60KB
-
memory/1096-8-0x0000000004A90000-0x0000000004A91000-memory.dmpFilesize
4KB
-
memory/1264-7-0x000000000041D070-mapping.dmp
-
memory/1264-6-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1264-12-0x0000000000910000-0x0000000000C13000-memory.dmpFilesize
3.0MB
-
memory/1968-9-0x0000000000000000-mapping.dmp
-
memory/1968-11-0x0000000001DA0000-0x0000000001DB1000-memory.dmpFilesize
68KB
-
memory/1968-13-0x0000000002240000-0x0000000002241000-memory.dmpFilesize
4KB