Analysis
-
max time kernel
147s -
max time network
9s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
19-01-2021 10:14
Static task
static1
Behavioral task
behavioral1
Sample
Invoice Payment Details.exe
Resource
win7v20201028
General
-
Target
Invoice Payment Details.exe
-
Size
892KB
-
MD5
9570c6d8cef329a8984dc89ecc786c28
-
SHA1
f318481b2fa2cc222bb783974c917f7c2b352c8f
-
SHA256
a55e49e3dffd386fbe1b8cfdafb4bcca81264b48e1fa2f9d68a7b8b12ec2bc7e
-
SHA512
3f1a3827be7daa886136c039b22a91d8c577e18f651cb414a2f9ebae258e45772533f17253f58a600c05b1307ef618ec6dd49ceebc5128333f53f83068293251
Malware Config
Extracted
formbook
http://www.smallcoloradoweddings.com/kio8/
greeaircondition.com
thewilmingtonguide.com
cbluedotlivewdmall.com
globalcrime24.com
heightsplace.com
ghar.pro
asosbira.com
melolandia.com
velactun.com
erniesimms.com
nutbullet.com
drizzerstr.com
hnqym888.com
ghorowaseba.com
1317efoxchasedrive.info
stjudetroop623.com
facestaj.com
airpromaskaccessories.com
wolfetailors.com
56ohdc2016.com
estedindustries.com
magmaplant.net
tf-iot.com
jtkqmz.com
helmihendrahasilbumi.com
audiencetrust.sucks
thespiritualabolitionist.com
lauratoots.com
fantasticsgelato.com
allinoncrypto.site
youremsys.com
awesome-veganism.com
tsunrp.net
systizen.com
73gardinerdrive.com
legamedary.com
newyorkcityhemorrhoidclinic.com
ffhcompany.com
angermgmtathome.com
plantationrevival.com
utopicvibes.net
envirocare-ss.com
domentemenegi20.com
gropedais.club
thaibizgermany.com
noimagreece.com
yogabizhelp.com
sanrenzong.com
bingent.info
chinhphucphaidep.online
dubojx.com
jennaloren.com
thedesigneryshop.com
opera-historica.com
pizzaterry.com
the-aviate.com
perteprampram01.net
pastormariorondon.com
dream-case.com
ocleanwholesaler.com
masdimensiones.com
fireworkstycoons.com
porntvh.com
fixedpriceelectrician.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1656-8-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1656-9-0x000000000041D0B0-mapping.dmp xloader behavioral1/memory/764-18-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1348 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Invoice Payment Details.exeInvoice Payment Details.exeexplorer.exedescription pid process target process PID 292 set thread context of 1656 292 Invoice Payment Details.exe Invoice Payment Details.exe PID 1656 set thread context of 1268 1656 Invoice Payment Details.exe Explorer.EXE PID 764 set thread context of 1268 764 explorer.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 19 IoCs
Processes:
Invoice Payment Details.exeexplorer.exepid process 1656 Invoice Payment Details.exe 1656 Invoice Payment Details.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe 764 explorer.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Invoice Payment Details.exeexplorer.exepid process 1656 Invoice Payment Details.exe 1656 Invoice Payment Details.exe 1656 Invoice Payment Details.exe 764 explorer.exe 764 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Invoice Payment Details.exeexplorer.exedescription pid process Token: SeDebugPrivilege 1656 Invoice Payment Details.exe Token: SeDebugPrivilege 764 explorer.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE 1268 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Invoice Payment Details.exeExplorer.EXEexplorer.exedescription pid process target process PID 292 wrote to memory of 1656 292 Invoice Payment Details.exe Invoice Payment Details.exe PID 292 wrote to memory of 1656 292 Invoice Payment Details.exe Invoice Payment Details.exe PID 292 wrote to memory of 1656 292 Invoice Payment Details.exe Invoice Payment Details.exe PID 292 wrote to memory of 1656 292 Invoice Payment Details.exe Invoice Payment Details.exe PID 292 wrote to memory of 1656 292 Invoice Payment Details.exe Invoice Payment Details.exe PID 292 wrote to memory of 1656 292 Invoice Payment Details.exe Invoice Payment Details.exe PID 292 wrote to memory of 1656 292 Invoice Payment Details.exe Invoice Payment Details.exe PID 1268 wrote to memory of 764 1268 Explorer.EXE explorer.exe PID 1268 wrote to memory of 764 1268 Explorer.EXE explorer.exe PID 1268 wrote to memory of 764 1268 Explorer.EXE explorer.exe PID 1268 wrote to memory of 764 1268 Explorer.EXE explorer.exe PID 764 wrote to memory of 1348 764 explorer.exe cmd.exe PID 764 wrote to memory of 1348 764 explorer.exe cmd.exe PID 764 wrote to memory of 1348 764 explorer.exe cmd.exe PID 764 wrote to memory of 1348 764 explorer.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\Invoice Payment Details.exe"C:\Users\Admin\AppData\Local\Temp\Invoice Payment Details.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Users\Admin\AppData\Local\Temp\Invoice Payment Details.exe"C:\Users\Admin\AppData\Local\Temp\Invoice Payment Details.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1656 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Invoice Payment Details.exe"3⤵
- Deletes itself
PID:1348