Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
18-01-2021 08:02
Static task
static1
Behavioral task
behavioral1
Sample
7nMMSdGgCXAfKsb.exe
Resource
win7v20201028
General
-
Target
7nMMSdGgCXAfKsb.exe
-
Size
931KB
-
MD5
50439fc35eaebb32f1fdeba8ef12e7c2
-
SHA1
689a97e2c83d0e84aeca38c1330245149ef5ed0d
-
SHA256
65ca40e44ab6171794b0c81d8b80122604eff3aca4614901fcd30db1a5329cfb
-
SHA512
a80705235bbadac3c1d12d953016ddcb9ada91b28f442e61c5bc24babe7b0a39df9874fdbcc1687f28e594fc959b990a5a20be9ddb3f4540257964a1938ee9f0
Malware Config
Extracted
formbook
http://www.besteprobioticakopen.online/uszn/
animegriptape.com
pcpnetworks.com
putupmybabyforadoption.com
xn--jvrr98g37n88d.com
fertinvitro.doctor
undonethread.com
avoleague.com
sissysundays.com
guilhermeoliveiro.site
catholicon-bespeckle.info
mardesuenosfundacion.com
songkhoe24.site
shoecityindia.com
smallbathroomdecor.info
tskusa.com
prairiespringsllc.com
kegncoffee.com
clicklounge.xyz
catholicendoflifeplanning.com
steelobzee.com
xiknekiterapia.com
whereinthezooareyou.com
maglex.info
dango3.net
sqjqw4.com
theparadisogroup.com
karthikeyainfraindia.com
luewevedre.com
helpwithmynutrition.com
lengyue.cool
pbipropertiesllc.com
glidedisc.com
sz-rhwjkj.com
776fx.com
kamanantzin.com
grandwhale.com
trump2020shop.net
gentilelibri.com
jarliciouslounge.com
dgcsales.net
hypno.doctor
holidayinnindyairportnorth.com
buysellleasewithlisa.com
girishastore.com
tinynucleargenerators.com
crystalphoenixltd.com
lapplify.com
bailbondinazusa.com
michaelmery.com
tripleecoaching.com
fastenerspelosato.net
horisan-touki.com
marketingavacado.com
centrebiozeina.com
xn--3etz63bc5ck9c.com
rhemachurch4u.com
homeschoolangel.com
romeysworld.com
themixedveggies.com
queendreea.club
epedalflorida.com
blutreemg.com
nongfupingtai.com
shikshs.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2876-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2876-13-0x000000000041D0F0-mapping.dmp xloader behavioral2/memory/2828-20-0x0000000000760000-0x0000000000789000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
7nMMSdGgCXAfKsb.exe7nMMSdGgCXAfKsb.exewscript.exedescription pid process target process PID 492 set thread context of 2876 492 7nMMSdGgCXAfKsb.exe 7nMMSdGgCXAfKsb.exe PID 2876 set thread context of 3128 2876 7nMMSdGgCXAfKsb.exe Explorer.EXE PID 2828 set thread context of 3128 2828 wscript.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 49 IoCs
Processes:
7nMMSdGgCXAfKsb.exe7nMMSdGgCXAfKsb.exewscript.exepid process 492 7nMMSdGgCXAfKsb.exe 492 7nMMSdGgCXAfKsb.exe 492 7nMMSdGgCXAfKsb.exe 2876 7nMMSdGgCXAfKsb.exe 2876 7nMMSdGgCXAfKsb.exe 2876 7nMMSdGgCXAfKsb.exe 2876 7nMMSdGgCXAfKsb.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe 2828 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
7nMMSdGgCXAfKsb.exewscript.exepid process 2876 7nMMSdGgCXAfKsb.exe 2876 7nMMSdGgCXAfKsb.exe 2876 7nMMSdGgCXAfKsb.exe 2828 wscript.exe 2828 wscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
7nMMSdGgCXAfKsb.exe7nMMSdGgCXAfKsb.exewscript.exedescription pid process Token: SeDebugPrivilege 492 7nMMSdGgCXAfKsb.exe Token: SeDebugPrivilege 2876 7nMMSdGgCXAfKsb.exe Token: SeDebugPrivilege 2828 wscript.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
7nMMSdGgCXAfKsb.exeExplorer.EXEwscript.exedescription pid process target process PID 492 wrote to memory of 3052 492 7nMMSdGgCXAfKsb.exe 7nMMSdGgCXAfKsb.exe PID 492 wrote to memory of 3052 492 7nMMSdGgCXAfKsb.exe 7nMMSdGgCXAfKsb.exe PID 492 wrote to memory of 3052 492 7nMMSdGgCXAfKsb.exe 7nMMSdGgCXAfKsb.exe PID 492 wrote to memory of 2876 492 7nMMSdGgCXAfKsb.exe 7nMMSdGgCXAfKsb.exe PID 492 wrote to memory of 2876 492 7nMMSdGgCXAfKsb.exe 7nMMSdGgCXAfKsb.exe PID 492 wrote to memory of 2876 492 7nMMSdGgCXAfKsb.exe 7nMMSdGgCXAfKsb.exe PID 492 wrote to memory of 2876 492 7nMMSdGgCXAfKsb.exe 7nMMSdGgCXAfKsb.exe PID 492 wrote to memory of 2876 492 7nMMSdGgCXAfKsb.exe 7nMMSdGgCXAfKsb.exe PID 492 wrote to memory of 2876 492 7nMMSdGgCXAfKsb.exe 7nMMSdGgCXAfKsb.exe PID 3128 wrote to memory of 2828 3128 Explorer.EXE wscript.exe PID 3128 wrote to memory of 2828 3128 Explorer.EXE wscript.exe PID 3128 wrote to memory of 2828 3128 Explorer.EXE wscript.exe PID 2828 wrote to memory of 1372 2828 wscript.exe cmd.exe PID 2828 wrote to memory of 1372 2828 wscript.exe cmd.exe PID 2828 wrote to memory of 1372 2828 wscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7nMMSdGgCXAfKsb.exe"C:\Users\Admin\AppData\Local\Temp\7nMMSdGgCXAfKsb.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\7nMMSdGgCXAfKsb.exe"{path}"3⤵
-
C:\Users\Admin\AppData\Local\Temp\7nMMSdGgCXAfKsb.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\7nMMSdGgCXAfKsb.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/492-2-0x0000000073310000-0x00000000739FE000-memory.dmpFilesize
6.9MB
-
memory/492-3-0x0000000000B50000-0x0000000000B51000-memory.dmpFilesize
4KB
-
memory/492-5-0x0000000005AF0000-0x0000000005AF1000-memory.dmpFilesize
4KB
-
memory/492-6-0x00000000054B0000-0x00000000054B1000-memory.dmpFilesize
4KB
-
memory/492-7-0x0000000002FC0000-0x0000000002FC1000-memory.dmpFilesize
4KB
-
memory/492-8-0x0000000003030000-0x0000000003031000-memory.dmpFilesize
4KB
-
memory/492-9-0x00000000055D0000-0x00000000055DE000-memory.dmpFilesize
56KB
-
memory/492-10-0x00000000072F0000-0x0000000007346000-memory.dmpFilesize
344KB
-
memory/492-11-0x0000000007920000-0x0000000007921000-memory.dmpFilesize
4KB
-
memory/1372-21-0x0000000000000000-mapping.dmp
-
memory/2828-19-0x0000000000FB0000-0x0000000000FD7000-memory.dmpFilesize
156KB
-
memory/2828-18-0x0000000000000000-mapping.dmp
-
memory/2828-20-0x0000000000760000-0x0000000000789000-memory.dmpFilesize
164KB
-
memory/2828-22-0x0000000004920000-0x0000000004C40000-memory.dmpFilesize
3.1MB
-
memory/2828-24-0x0000000004770000-0x00000000047FF000-memory.dmpFilesize
572KB
-
memory/2876-15-0x00000000014E0000-0x0000000001800000-memory.dmpFilesize
3.1MB
-
memory/2876-16-0x0000000000FF0000-0x0000000001000000-memory.dmpFilesize
64KB
-
memory/2876-13-0x000000000041D0F0-mapping.dmp
-
memory/2876-12-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3128-17-0x0000000006CA0000-0x0000000006E39000-memory.dmpFilesize
1.6MB
-
memory/3128-25-0x0000000006830000-0x00000000068F6000-memory.dmpFilesize
792KB