Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
18-01-2021 08:49
Static task
static1
Behavioral task
behavioral1
Sample
SKM_C221200706052800.exe
Resource
win7v20201028
General
-
Target
SKM_C221200706052800.exe
-
Size
273KB
-
MD5
3c51788968fa6ed67bde7511b1868b08
-
SHA1
194e63c851406e2ac39ef09d48ab35871e041ccc
-
SHA256
0baedfe6121c3fdc3438625335a05080f6e347bf6ff29910d2ff35b2aa02d4d5
-
SHA512
2f872cd65df657e420c8d47e4b9ef2919ecc4b8170855751f8b26faec02fe59df949cb9c3306327250911292d52261a1a28970c2ba41044e47e4f7cb8a3e4467
Malware Config
Extracted
formbook
http://www.destinny.com/s9zh/
paintedinafrica.com
electrumfix.download
edlange.com
tqiawy.xyz
satiscenter.xyz
nc-affiliates.com
agencybuilderforum.com
testabcde.net
venisseturf.net
rubenvdsande.com
nzmatrimony.com
mdthriftsandflips.com
virtualfxstudio.com
communityinsuranceut.com
qqbokep.com
copeva.net
bookedupdaily.com
houstongrowmyairway.com
fortunapublishing.com
empireplumbingandheating.com
globalefactory.com
alfrednelson.com
kernwide.com
soulwaves.info
iregentos.info
emfirstchoice.com
popvoc.com
clubdeproyectos.com
nathanlaube.net
davaresoon.com
girlsnightoutcollection.net
alchemdiagnostics.com
intlgrowcap.com
northeasttnrentalproperties.com
1971265.com
yobingo.ltd
comunityassn.com
pupupe.com
physicianmedspa.com
forestloretour.com
tauntongo.com
elegancescent.com
traumatotrust.com
blkdenim.com
b-taking.com
naturalhealthadvisery.com
fight-box.com
socia1security.net
prestondelnorteapartments.com
peaclbgju.icu
thegolfclubatcirclec.com
westqueenwestlofts.com
elitedesignzink.com
czpeixun.com
blossomenterpriseuganda.com
danettesgifts.com
psikometriums.com
rainbowbanks.com
deshbari.com
movementspecialistslv.com
amkcar.com
contractorsan.com
onurtel.com
dotalogy.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1768-4-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1768-5-0x000000000041D060-mapping.dmp xloader behavioral1/memory/268-13-0x0000000000090000-0x00000000000B9000-memory.dmp xloader -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
SKM_C221200706052800.exevbc.exemsiexec.exedescription pid process target process PID 1864 set thread context of 1768 1864 SKM_C221200706052800.exe vbc.exe PID 1768 set thread context of 1220 1768 vbc.exe Explorer.EXE PID 268 set thread context of 1220 268 msiexec.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
SKM_C221200706052800.exevbc.exemsiexec.exepid process 1864 SKM_C221200706052800.exe 1864 SKM_C221200706052800.exe 1864 SKM_C221200706052800.exe 1768 vbc.exe 1768 vbc.exe 268 msiexec.exe 268 msiexec.exe 268 msiexec.exe 268 msiexec.exe 268 msiexec.exe 268 msiexec.exe 268 msiexec.exe 268 msiexec.exe 268 msiexec.exe 268 msiexec.exe 268 msiexec.exe 268 msiexec.exe 268 msiexec.exe 268 msiexec.exe 268 msiexec.exe 268 msiexec.exe 268 msiexec.exe 268 msiexec.exe 268 msiexec.exe 268 msiexec.exe 268 msiexec.exe 268 msiexec.exe 268 msiexec.exe 268 msiexec.exe 268 msiexec.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
vbc.exemsiexec.exepid process 1768 vbc.exe 1768 vbc.exe 1768 vbc.exe 268 msiexec.exe 268 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
SKM_C221200706052800.exevbc.exemsiexec.exedescription pid process Token: SeDebugPrivilege 1864 SKM_C221200706052800.exe Token: SeDebugPrivilege 1768 vbc.exe Token: SeDebugPrivilege 268 msiexec.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE 1220 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
SKM_C221200706052800.exeExplorer.EXEmsiexec.exedescription pid process target process PID 1864 wrote to memory of 1768 1864 SKM_C221200706052800.exe vbc.exe PID 1864 wrote to memory of 1768 1864 SKM_C221200706052800.exe vbc.exe PID 1864 wrote to memory of 1768 1864 SKM_C221200706052800.exe vbc.exe PID 1864 wrote to memory of 1768 1864 SKM_C221200706052800.exe vbc.exe PID 1864 wrote to memory of 1768 1864 SKM_C221200706052800.exe vbc.exe PID 1864 wrote to memory of 1768 1864 SKM_C221200706052800.exe vbc.exe PID 1864 wrote to memory of 1768 1864 SKM_C221200706052800.exe vbc.exe PID 1220 wrote to memory of 268 1220 Explorer.EXE msiexec.exe PID 1220 wrote to memory of 268 1220 Explorer.EXE msiexec.exe PID 1220 wrote to memory of 268 1220 Explorer.EXE msiexec.exe PID 1220 wrote to memory of 268 1220 Explorer.EXE msiexec.exe PID 1220 wrote to memory of 268 1220 Explorer.EXE msiexec.exe PID 1220 wrote to memory of 268 1220 Explorer.EXE msiexec.exe PID 1220 wrote to memory of 268 1220 Explorer.EXE msiexec.exe PID 268 wrote to memory of 1156 268 msiexec.exe cmd.exe PID 268 wrote to memory of 1156 268 msiexec.exe cmd.exe PID 268 wrote to memory of 1156 268 msiexec.exe cmd.exe PID 268 wrote to memory of 1156 268 msiexec.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\SKM_C221200706052800.exe"C:\Users\Admin\AppData\Local\Temp\SKM_C221200706052800.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/268-10-0x0000000000000000-mapping.dmp
-
memory/268-16-0x00000000020D0000-0x0000000002160000-memory.dmpFilesize
576KB
-
memory/268-14-0x0000000002280000-0x0000000002583000-memory.dmpFilesize
3.0MB
-
memory/268-13-0x0000000000090000-0x00000000000B9000-memory.dmpFilesize
164KB
-
memory/268-12-0x0000000000600000-0x0000000000614000-memory.dmpFilesize
80KB
-
memory/1156-15-0x0000000000000000-mapping.dmp
-
memory/1220-9-0x0000000006390000-0x00000000064BF000-memory.dmpFilesize
1.2MB
-
memory/1220-17-0x0000000004F10000-0x000000000502E000-memory.dmpFilesize
1.1MB
-
memory/1768-7-0x0000000000700000-0x0000000000A03000-memory.dmpFilesize
3.0MB
-
memory/1768-8-0x0000000000580000-0x0000000000591000-memory.dmpFilesize
68KB
-
memory/1768-5-0x000000000041D060-mapping.dmp
-
memory/1768-4-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1864-2-0x00000000760B1000-0x00000000760B3000-memory.dmpFilesize
8KB
-
memory/1864-3-0x0000000000B10000-0x0000000000B11000-memory.dmpFilesize
4KB