Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
19-01-2021 07:54
Static task
static1
Behavioral task
behavioral1
Sample
3KvCNpcQ6tvwKr5.exe
Resource
win7v20201028
General
-
Target
3KvCNpcQ6tvwKr5.exe
-
Size
894KB
-
MD5
03c67a5a09e3a472b5ac1db3e64f36dd
-
SHA1
ed818f401e5d67f1351fd94d121c0a64739bcba9
-
SHA256
f1422701954b6c0116802819526ba75f414beda5419f80445d321885d8732473
-
SHA512
6d7279cfc5a9e68c1f8c9aa39d4f2208487a42bbd967337a25611513efcf10e1dd7d27a04aeae84bd1a131c068b5d5f2a121bdadbed94927bd590a8bf35412a9
Malware Config
Extracted
formbook
http://www.allismd.com/ur06/
philippebrooksdesign.com
cmoorestudio.com
profille-sarina23tammara.club
dqulxe.com
uiffinger.com
nolarapper.com
maconanimalexterminator.com
bisovka.com
loveisloveent.com
datication.com
spxo66.com
drhelpnow.com
ladybug-cle.com
macocome.com
thepoppysocks.com
eldritchparadox.com
mercadolibre.company
ismartfarm.com
kansascarlot.com
kevinld.com
p87mbu2ss.xyz
the-makery.info
untegoro.site
newyorkcityhemorrhoidcenter.com
crystalclearwholistics.com
iregentos.info
fullskis.com
promanconsortium.com
800029120.com
mummyisme.com
humpychocks.com
myfavestuff.store
naturalfemina.com
bimetalthermostatksd.com
draysehaniminciftligi.com
sf9820.com
4thop.com
24les.com
thepupcrew.com
strangephobias.com
hotmamabody.com
restaurantsilhouette.com
texasadultdayservices.com
binahaiat.com
nipseythegreat.com
pelisplusxd.net
mamborio.com
elitedigitalperformance.com
therileyretreat.com
aieqbgk.icu
corkboardit.net
katieberiont.com
telemedicinehamilton.com
imagistor.com
tekdesignltd.com
bmw-7979.com
animaliaartist.com
straightlineautoserviceerie.net
qoo10online.com
tesseracoffee.com
central-car-sales.com
thecleaningenthusiast.com
musicmercch.com
pearlpham.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1700-5-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/1700-6-0x000000000041D000-mapping.dmp xloader behavioral1/memory/900-14-0x0000000000080000-0x00000000000A8000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 956 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
3KvCNpcQ6tvwKr5.exe3KvCNpcQ6tvwKr5.exeraserver.exedescription pid process target process PID 1668 set thread context of 1700 1668 3KvCNpcQ6tvwKr5.exe 3KvCNpcQ6tvwKr5.exe PID 1700 set thread context of 1248 1700 3KvCNpcQ6tvwKr5.exe Explorer.EXE PID 900 set thread context of 1248 900 raserver.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 17 IoCs
Processes:
3KvCNpcQ6tvwKr5.exeraserver.exepid process 1700 3KvCNpcQ6tvwKr5.exe 1700 3KvCNpcQ6tvwKr5.exe 900 raserver.exe 900 raserver.exe 900 raserver.exe 900 raserver.exe 900 raserver.exe 900 raserver.exe 900 raserver.exe 900 raserver.exe 900 raserver.exe 900 raserver.exe 900 raserver.exe 900 raserver.exe 900 raserver.exe 900 raserver.exe 900 raserver.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
3KvCNpcQ6tvwKr5.exeraserver.exepid process 1700 3KvCNpcQ6tvwKr5.exe 1700 3KvCNpcQ6tvwKr5.exe 1700 3KvCNpcQ6tvwKr5.exe 900 raserver.exe 900 raserver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
3KvCNpcQ6tvwKr5.exeraserver.exedescription pid process Token: SeDebugPrivilege 1700 3KvCNpcQ6tvwKr5.exe Token: SeDebugPrivilege 900 raserver.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
3KvCNpcQ6tvwKr5.exeExplorer.EXEraserver.exedescription pid process target process PID 1668 wrote to memory of 1700 1668 3KvCNpcQ6tvwKr5.exe 3KvCNpcQ6tvwKr5.exe PID 1668 wrote to memory of 1700 1668 3KvCNpcQ6tvwKr5.exe 3KvCNpcQ6tvwKr5.exe PID 1668 wrote to memory of 1700 1668 3KvCNpcQ6tvwKr5.exe 3KvCNpcQ6tvwKr5.exe PID 1668 wrote to memory of 1700 1668 3KvCNpcQ6tvwKr5.exe 3KvCNpcQ6tvwKr5.exe PID 1668 wrote to memory of 1700 1668 3KvCNpcQ6tvwKr5.exe 3KvCNpcQ6tvwKr5.exe PID 1668 wrote to memory of 1700 1668 3KvCNpcQ6tvwKr5.exe 3KvCNpcQ6tvwKr5.exe PID 1668 wrote to memory of 1700 1668 3KvCNpcQ6tvwKr5.exe 3KvCNpcQ6tvwKr5.exe PID 1248 wrote to memory of 900 1248 Explorer.EXE raserver.exe PID 1248 wrote to memory of 900 1248 Explorer.EXE raserver.exe PID 1248 wrote to memory of 900 1248 Explorer.EXE raserver.exe PID 1248 wrote to memory of 900 1248 Explorer.EXE raserver.exe PID 900 wrote to memory of 956 900 raserver.exe cmd.exe PID 900 wrote to memory of 956 900 raserver.exe cmd.exe PID 900 wrote to memory of 956 900 raserver.exe cmd.exe PID 900 wrote to memory of 956 900 raserver.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\3KvCNpcQ6tvwKr5.exe"C:\Users\Admin\AppData\Local\Temp\3KvCNpcQ6tvwKr5.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\3KvCNpcQ6tvwKr5.exe"C:\Users\Admin\AppData\Local\Temp\3KvCNpcQ6tvwKr5.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1700 -
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\3KvCNpcQ6tvwKr5.exe"3⤵
- Deletes itself
PID:956