Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
19-01-2021 10:14
Static task
static1
Behavioral task
behavioral1
Sample
Invoice Payment Details.exe
Resource
win7v20201028
General
-
Target
Invoice Payment Details.exe
-
Size
892KB
-
MD5
9570c6d8cef329a8984dc89ecc786c28
-
SHA1
f318481b2fa2cc222bb783974c917f7c2b352c8f
-
SHA256
a55e49e3dffd386fbe1b8cfdafb4bcca81264b48e1fa2f9d68a7b8b12ec2bc7e
-
SHA512
3f1a3827be7daa886136c039b22a91d8c577e18f651cb414a2f9ebae258e45772533f17253f58a600c05b1307ef618ec6dd49ceebc5128333f53f83068293251
Malware Config
Extracted
formbook
http://www.smallcoloradoweddings.com/kio8/
greeaircondition.com
thewilmingtonguide.com
cbluedotlivewdmall.com
globalcrime24.com
heightsplace.com
ghar.pro
asosbira.com
melolandia.com
velactun.com
erniesimms.com
nutbullet.com
drizzerstr.com
hnqym888.com
ghorowaseba.com
1317efoxchasedrive.info
stjudetroop623.com
facestaj.com
airpromaskaccessories.com
wolfetailors.com
56ohdc2016.com
estedindustries.com
magmaplant.net
tf-iot.com
jtkqmz.com
helmihendrahasilbumi.com
audiencetrust.sucks
thespiritualabolitionist.com
lauratoots.com
fantasticsgelato.com
allinoncrypto.site
youremsys.com
awesome-veganism.com
tsunrp.net
systizen.com
73gardinerdrive.com
legamedary.com
newyorkcityhemorrhoidclinic.com
ffhcompany.com
angermgmtathome.com
plantationrevival.com
utopicvibes.net
envirocare-ss.com
domentemenegi20.com
gropedais.club
thaibizgermany.com
noimagreece.com
yogabizhelp.com
sanrenzong.com
bingent.info
chinhphucphaidep.online
dubojx.com
jennaloren.com
thedesigneryshop.com
opera-historica.com
pizzaterry.com
the-aviate.com
perteprampram01.net
pastormariorondon.com
dream-case.com
ocleanwholesaler.com
masdimensiones.com
fireworkstycoons.com
porntvh.com
fixedpriceelectrician.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/836-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/836-14-0x000000000041D0B0-mapping.dmp xloader behavioral2/memory/2732-21-0x0000000002CE0000-0x0000000002D09000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Invoice Payment Details.exeInvoice Payment Details.exeNETSTAT.EXEdescription pid process target process PID 1192 set thread context of 836 1192 Invoice Payment Details.exe Invoice Payment Details.exe PID 836 set thread context of 2588 836 Invoice Payment Details.exe Explorer.EXE PID 2732 set thread context of 2588 2732 NETSTAT.EXE Explorer.EXE -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
NETSTAT.EXEpid process 2732 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 40 IoCs
Processes:
Invoice Payment Details.exeNETSTAT.EXEpid process 836 Invoice Payment Details.exe 836 Invoice Payment Details.exe 836 Invoice Payment Details.exe 836 Invoice Payment Details.exe 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE 2732 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Invoice Payment Details.exeNETSTAT.EXEpid process 836 Invoice Payment Details.exe 836 Invoice Payment Details.exe 836 Invoice Payment Details.exe 2732 NETSTAT.EXE 2732 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Invoice Payment Details.exeNETSTAT.EXEdescription pid process Token: SeDebugPrivilege 836 Invoice Payment Details.exe Token: SeDebugPrivilege 2732 NETSTAT.EXE -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 2588 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Invoice Payment Details.exeExplorer.EXENETSTAT.EXEdescription pid process target process PID 1192 wrote to memory of 836 1192 Invoice Payment Details.exe Invoice Payment Details.exe PID 1192 wrote to memory of 836 1192 Invoice Payment Details.exe Invoice Payment Details.exe PID 1192 wrote to memory of 836 1192 Invoice Payment Details.exe Invoice Payment Details.exe PID 1192 wrote to memory of 836 1192 Invoice Payment Details.exe Invoice Payment Details.exe PID 1192 wrote to memory of 836 1192 Invoice Payment Details.exe Invoice Payment Details.exe PID 1192 wrote to memory of 836 1192 Invoice Payment Details.exe Invoice Payment Details.exe PID 2588 wrote to memory of 2732 2588 Explorer.EXE NETSTAT.EXE PID 2588 wrote to memory of 2732 2588 Explorer.EXE NETSTAT.EXE PID 2588 wrote to memory of 2732 2588 Explorer.EXE NETSTAT.EXE PID 2732 wrote to memory of 884 2732 NETSTAT.EXE cmd.exe PID 2732 wrote to memory of 884 2732 NETSTAT.EXE cmd.exe PID 2732 wrote to memory of 884 2732 NETSTAT.EXE cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\Invoice Payment Details.exe"C:\Users\Admin\AppData\Local\Temp\Invoice Payment Details.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\Invoice Payment Details.exe"C:\Users\Admin\AppData\Local\Temp\Invoice Payment Details.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:836 -
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Invoice Payment Details.exe"3⤵PID:884