Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
19-01-2021 12:52
Static task
static1
Behavioral task
behavioral1
Sample
SKM_C221200706052800n.exe
Resource
win7v20201028
General
-
Target
SKM_C221200706052800n.exe
-
Size
263KB
-
MD5
428a6aceb56f682b4b95685dd56f805f
-
SHA1
20549710f386a134b7fac0db3dbe4bb1118908f1
-
SHA256
8bb4cdfefd9caae6291347842048859a0f44a3cd6a3313004506f939541ce0a3
-
SHA512
1a65bba17b0730bc6a7453fabb55367a06a4ff247944f5621c9137c3266ffb6853a6d3f0af5432751c1b22d990b9a5af2208afaae2cf19118f2f9b22414e33c6
Malware Config
Extracted
formbook
http://www.destinny.com/s9zh/
paintedinafrica.com
electrumfix.download
edlange.com
tqiawy.xyz
satiscenter.xyz
nc-affiliates.com
agencybuilderforum.com
testabcde.net
venisseturf.net
rubenvdsande.com
nzmatrimony.com
mdthriftsandflips.com
virtualfxstudio.com
communityinsuranceut.com
qqbokep.com
copeva.net
bookedupdaily.com
houstongrowmyairway.com
fortunapublishing.com
empireplumbingandheating.com
globalefactory.com
alfrednelson.com
kernwide.com
soulwaves.info
iregentos.info
emfirstchoice.com
popvoc.com
clubdeproyectos.com
nathanlaube.net
davaresoon.com
girlsnightoutcollection.net
alchemdiagnostics.com
intlgrowcap.com
northeasttnrentalproperties.com
1971265.com
yobingo.ltd
comunityassn.com
pupupe.com
physicianmedspa.com
forestloretour.com
tauntongo.com
elegancescent.com
traumatotrust.com
blkdenim.com
b-taking.com
naturalhealthadvisery.com
fight-box.com
socia1security.net
prestondelnorteapartments.com
peaclbgju.icu
thegolfclubatcirclec.com
westqueenwestlofts.com
elitedesignzink.com
czpeixun.com
blossomenterpriseuganda.com
danettesgifts.com
psikometriums.com
rainbowbanks.com
deshbari.com
movementspecialistslv.com
amkcar.com
contractorsan.com
onurtel.com
dotalogy.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1332-4-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1332-5-0x000000000041D060-mapping.dmp xloader behavioral1/memory/888-13-0x0000000000090000-0x00000000000B9000-memory.dmp xloader -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
SKM_C221200706052800n.exevbc.execmstp.exedescription pid process target process PID 1684 set thread context of 1332 1684 SKM_C221200706052800n.exe vbc.exe PID 1332 set thread context of 1276 1332 vbc.exe Explorer.EXE PID 888 set thread context of 1276 888 cmstp.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 32 IoCs
Processes:
SKM_C221200706052800n.exevbc.execmstp.exepid process 1684 SKM_C221200706052800n.exe 1684 SKM_C221200706052800n.exe 1684 SKM_C221200706052800n.exe 1332 vbc.exe 1332 vbc.exe 888 cmstp.exe 888 cmstp.exe 888 cmstp.exe 888 cmstp.exe 888 cmstp.exe 888 cmstp.exe 888 cmstp.exe 888 cmstp.exe 888 cmstp.exe 888 cmstp.exe 888 cmstp.exe 888 cmstp.exe 888 cmstp.exe 888 cmstp.exe 888 cmstp.exe 888 cmstp.exe 888 cmstp.exe 888 cmstp.exe 888 cmstp.exe 888 cmstp.exe 888 cmstp.exe 888 cmstp.exe 888 cmstp.exe 888 cmstp.exe 888 cmstp.exe 888 cmstp.exe 888 cmstp.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
vbc.execmstp.exepid process 1332 vbc.exe 1332 vbc.exe 1332 vbc.exe 888 cmstp.exe 888 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
SKM_C221200706052800n.exevbc.execmstp.exedescription pid process Token: SeDebugPrivilege 1684 SKM_C221200706052800n.exe Token: SeDebugPrivilege 1332 vbc.exe Token: SeDebugPrivilege 888 cmstp.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE 1276 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
SKM_C221200706052800n.exeExplorer.EXEcmstp.exedescription pid process target process PID 1684 wrote to memory of 1332 1684 SKM_C221200706052800n.exe vbc.exe PID 1684 wrote to memory of 1332 1684 SKM_C221200706052800n.exe vbc.exe PID 1684 wrote to memory of 1332 1684 SKM_C221200706052800n.exe vbc.exe PID 1684 wrote to memory of 1332 1684 SKM_C221200706052800n.exe vbc.exe PID 1684 wrote to memory of 1332 1684 SKM_C221200706052800n.exe vbc.exe PID 1684 wrote to memory of 1332 1684 SKM_C221200706052800n.exe vbc.exe PID 1684 wrote to memory of 1332 1684 SKM_C221200706052800n.exe vbc.exe PID 1276 wrote to memory of 888 1276 Explorer.EXE cmstp.exe PID 1276 wrote to memory of 888 1276 Explorer.EXE cmstp.exe PID 1276 wrote to memory of 888 1276 Explorer.EXE cmstp.exe PID 1276 wrote to memory of 888 1276 Explorer.EXE cmstp.exe PID 1276 wrote to memory of 888 1276 Explorer.EXE cmstp.exe PID 1276 wrote to memory of 888 1276 Explorer.EXE cmstp.exe PID 1276 wrote to memory of 888 1276 Explorer.EXE cmstp.exe PID 888 wrote to memory of 1540 888 cmstp.exe cmd.exe PID 888 wrote to memory of 1540 888 cmstp.exe cmd.exe PID 888 wrote to memory of 1540 888 cmstp.exe cmd.exe PID 888 wrote to memory of 1540 888 cmstp.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\SKM_C221200706052800n.exe"C:\Users\Admin\AppData\Local\Temp\SKM_C221200706052800n.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1332 -
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"3⤵PID:1540