Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
19-01-2021 07:54
Static task
static1
Behavioral task
behavioral1
Sample
3KvCNpcQ6tvwKr5.exe
Resource
win7v20201028
General
-
Target
3KvCNpcQ6tvwKr5.exe
-
Size
894KB
-
MD5
03c67a5a09e3a472b5ac1db3e64f36dd
-
SHA1
ed818f401e5d67f1351fd94d121c0a64739bcba9
-
SHA256
f1422701954b6c0116802819526ba75f414beda5419f80445d321885d8732473
-
SHA512
6d7279cfc5a9e68c1f8c9aa39d4f2208487a42bbd967337a25611513efcf10e1dd7d27a04aeae84bd1a131c068b5d5f2a121bdadbed94927bd590a8bf35412a9
Malware Config
Extracted
formbook
http://www.allismd.com/ur06/
philippebrooksdesign.com
cmoorestudio.com
profille-sarina23tammara.club
dqulxe.com
uiffinger.com
nolarapper.com
maconanimalexterminator.com
bisovka.com
loveisloveent.com
datication.com
spxo66.com
drhelpnow.com
ladybug-cle.com
macocome.com
thepoppysocks.com
eldritchparadox.com
mercadolibre.company
ismartfarm.com
kansascarlot.com
kevinld.com
p87mbu2ss.xyz
the-makery.info
untegoro.site
newyorkcityhemorrhoidcenter.com
crystalclearwholistics.com
iregentos.info
fullskis.com
promanconsortium.com
800029120.com
mummyisme.com
humpychocks.com
myfavestuff.store
naturalfemina.com
bimetalthermostatksd.com
draysehaniminciftligi.com
sf9820.com
4thop.com
24les.com
thepupcrew.com
strangephobias.com
hotmamabody.com
restaurantsilhouette.com
texasadultdayservices.com
binahaiat.com
nipseythegreat.com
pelisplusxd.net
mamborio.com
elitedigitalperformance.com
therileyretreat.com
aieqbgk.icu
corkboardit.net
katieberiont.com
telemedicinehamilton.com
imagistor.com
tekdesignltd.com
bmw-7979.com
animaliaartist.com
straightlineautoserviceerie.net
qoo10online.com
tesseracoffee.com
central-car-sales.com
thecleaningenthusiast.com
musicmercch.com
pearlpham.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4280-4-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/4280-5-0x000000000041D000-mapping.dmp xloader behavioral2/memory/452-13-0x0000000000140000-0x0000000000168000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
3KvCNpcQ6tvwKr5.exe3KvCNpcQ6tvwKr5.exerundll32.exedescription pid process target process PID 4808 set thread context of 4280 4808 3KvCNpcQ6tvwKr5.exe 3KvCNpcQ6tvwKr5.exe PID 4280 set thread context of 3152 4280 3KvCNpcQ6tvwKr5.exe Explorer.EXE PID 452 set thread context of 3152 452 rundll32.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 36 IoCs
Processes:
3KvCNpcQ6tvwKr5.exe3KvCNpcQ6tvwKr5.exerundll32.exepid process 4808 3KvCNpcQ6tvwKr5.exe 4808 3KvCNpcQ6tvwKr5.exe 4280 3KvCNpcQ6tvwKr5.exe 4280 3KvCNpcQ6tvwKr5.exe 4280 3KvCNpcQ6tvwKr5.exe 4280 3KvCNpcQ6tvwKr5.exe 452 rundll32.exe 452 rundll32.exe 452 rundll32.exe 452 rundll32.exe 452 rundll32.exe 452 rundll32.exe 452 rundll32.exe 452 rundll32.exe 452 rundll32.exe 452 rundll32.exe 452 rundll32.exe 452 rundll32.exe 452 rundll32.exe 452 rundll32.exe 452 rundll32.exe 452 rundll32.exe 452 rundll32.exe 452 rundll32.exe 452 rundll32.exe 452 rundll32.exe 452 rundll32.exe 452 rundll32.exe 452 rundll32.exe 452 rundll32.exe 452 rundll32.exe 452 rundll32.exe 452 rundll32.exe 452 rundll32.exe 452 rundll32.exe 452 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
3KvCNpcQ6tvwKr5.exerundll32.exepid process 4280 3KvCNpcQ6tvwKr5.exe 4280 3KvCNpcQ6tvwKr5.exe 4280 3KvCNpcQ6tvwKr5.exe 452 rundll32.exe 452 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
3KvCNpcQ6tvwKr5.exe3KvCNpcQ6tvwKr5.exerundll32.exedescription pid process Token: SeDebugPrivilege 4808 3KvCNpcQ6tvwKr5.exe Token: SeDebugPrivilege 4280 3KvCNpcQ6tvwKr5.exe Token: SeDebugPrivilege 452 rundll32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
3KvCNpcQ6tvwKr5.exeExplorer.EXErundll32.exedescription pid process target process PID 4808 wrote to memory of 4288 4808 3KvCNpcQ6tvwKr5.exe 3KvCNpcQ6tvwKr5.exe PID 4808 wrote to memory of 4288 4808 3KvCNpcQ6tvwKr5.exe 3KvCNpcQ6tvwKr5.exe PID 4808 wrote to memory of 4288 4808 3KvCNpcQ6tvwKr5.exe 3KvCNpcQ6tvwKr5.exe PID 4808 wrote to memory of 4280 4808 3KvCNpcQ6tvwKr5.exe 3KvCNpcQ6tvwKr5.exe PID 4808 wrote to memory of 4280 4808 3KvCNpcQ6tvwKr5.exe 3KvCNpcQ6tvwKr5.exe PID 4808 wrote to memory of 4280 4808 3KvCNpcQ6tvwKr5.exe 3KvCNpcQ6tvwKr5.exe PID 4808 wrote to memory of 4280 4808 3KvCNpcQ6tvwKr5.exe 3KvCNpcQ6tvwKr5.exe PID 4808 wrote to memory of 4280 4808 3KvCNpcQ6tvwKr5.exe 3KvCNpcQ6tvwKr5.exe PID 4808 wrote to memory of 4280 4808 3KvCNpcQ6tvwKr5.exe 3KvCNpcQ6tvwKr5.exe PID 3152 wrote to memory of 452 3152 Explorer.EXE rundll32.exe PID 3152 wrote to memory of 452 3152 Explorer.EXE rundll32.exe PID 3152 wrote to memory of 452 3152 Explorer.EXE rundll32.exe PID 452 wrote to memory of 840 452 rundll32.exe cmd.exe PID 452 wrote to memory of 840 452 rundll32.exe cmd.exe PID 452 wrote to memory of 840 452 rundll32.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\3KvCNpcQ6tvwKr5.exe"C:\Users\Admin\AppData\Local\Temp\3KvCNpcQ6tvwKr5.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\3KvCNpcQ6tvwKr5.exe"C:\Users\Admin\AppData\Local\Temp\3KvCNpcQ6tvwKr5.exe"3⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\3KvCNpcQ6tvwKr5.exe"C:\Users\Admin\AppData\Local\Temp\3KvCNpcQ6tvwKr5.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4280 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\3KvCNpcQ6tvwKr5.exe"3⤵PID:840