Analysis
-
max time kernel
17s -
max time network
111s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
19-01-2021 09:22
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.BehavesLike.Win32.Trojan.dc.925.exe
Resource
win7v20201028
General
-
Target
SecuriteInfo.com.BehavesLike.Win32.Trojan.dc.925.exe
-
Size
276KB
-
MD5
4755bdfa1fb87c626856b33c48419201
-
SHA1
c174cf847aa3e0a06128626c13608a3a5421e0f4
-
SHA256
d81f4b6a0b8650415e2c2acfe4ee223f6826b3b6849393f4de2db4f3a814beaf
-
SHA512
d7e982eb367ee0813dcdb92604f3f444c88603dc1aa6c5c14d397d7a43dfbedc7ee9280b3674a8715c4cab8c24176f4efa24d5cf206596b5e21cdc40c467c5ca
Malware Config
Extracted
formbook
http://www.hitchhikerfab.com/qjnt/
silverlakesfootball.com
drivebymovie.com
precisedirections.com
xn--01-mlcpq1abi.xn--p1acf
landhubturkey.com
andronomicon.com
kindlyhomecare.com
tyequip.com
planfra.com
wy1197.com
blackcatbaker.com
ddhhynjy.com
sales-altigen.com
valerielimozin.com
walmamall.com
quishkambalito.com
gnbsuvm.icu
milanostorear.com
olympiaopen.com
zradydlyazhinok-ua.com
chileenswijnhuis.online
squeegeedollarclub.com
ecritech.media
jugosdelsol.com
gamersgangbd.com
globalineducation.com
newenglandredsox.com
ajackson-design.com
blupointer.com
plantfulllife.com
bebes-fertiles.com
hoqueivilasana.com
evsucks.com
ggate.club
goldiewilson.com
jtdelastomer.com
hwhrc.com
safehomeseller.com
d2clip.com
856380770.xyz
peorig.club
magnificosocial.com
masterm77.com
jejucash.com
ciancor.com
primeoneimplants.com
xn--9t4bi03a.com
vietlangcenter.com
nickelindonesia.com
crcindustrialmx.com
jswproductionsllc.com
igxadnm.icu
formationbd.net
shdajiao.com
kitamura-clinic-seta.com
racevx.xyz
xingyedk.com
misteri365.net
agedeve.com
kutuluoyun.net
yrzx61.com
6s7f8mr8yk7ji.net
sumrajuniksure.com
everlastingnewyork.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3480-3-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/3480-4-0x000000000041D030-mapping.dmp xloader behavioral2/memory/4776-6-0x0000000004DC0000-0x0000000004DEA000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SecuriteInfo.com.BehavesLike.Win32.Trojan.dc.925.exedescription pid process target process PID 4776 set thread context of 3480 4776 SecuriteInfo.com.BehavesLike.Win32.Trojan.dc.925.exe SecuriteInfo.com.BehavesLike.Win32.Trojan.dc.925.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
SecuriteInfo.com.BehavesLike.Win32.Trojan.dc.925.exepid process 3480 SecuriteInfo.com.BehavesLike.Win32.Trojan.dc.925.exe 3480 SecuriteInfo.com.BehavesLike.Win32.Trojan.dc.925.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
SecuriteInfo.com.BehavesLike.Win32.Trojan.dc.925.exedescription pid process target process PID 4776 wrote to memory of 3480 4776 SecuriteInfo.com.BehavesLike.Win32.Trojan.dc.925.exe SecuriteInfo.com.BehavesLike.Win32.Trojan.dc.925.exe PID 4776 wrote to memory of 3480 4776 SecuriteInfo.com.BehavesLike.Win32.Trojan.dc.925.exe SecuriteInfo.com.BehavesLike.Win32.Trojan.dc.925.exe PID 4776 wrote to memory of 3480 4776 SecuriteInfo.com.BehavesLike.Win32.Trojan.dc.925.exe SecuriteInfo.com.BehavesLike.Win32.Trojan.dc.925.exe PID 4776 wrote to memory of 3480 4776 SecuriteInfo.com.BehavesLike.Win32.Trojan.dc.925.exe SecuriteInfo.com.BehavesLike.Win32.Trojan.dc.925.exe PID 4776 wrote to memory of 3480 4776 SecuriteInfo.com.BehavesLike.Win32.Trojan.dc.925.exe SecuriteInfo.com.BehavesLike.Win32.Trojan.dc.925.exe PID 4776 wrote to memory of 3480 4776 SecuriteInfo.com.BehavesLike.Win32.Trojan.dc.925.exe SecuriteInfo.com.BehavesLike.Win32.Trojan.dc.925.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Trojan.dc.925.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Trojan.dc.925.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Trojan.dc.925.exe"C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Trojan.dc.925.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3480