Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
19-01-2021 13:06
Static task
static1
Behavioral task
behavioral1
Sample
PO81053.exe
Resource
win7v20201028
General
-
Target
PO81053.exe
-
Size
189KB
-
MD5
133bddae88916c0016892d2cf55b6d8a
-
SHA1
5eaa43928a9a569fb807f5e8c1ecf9a54da79515
-
SHA256
f5a88909c2272b7ddba37b210ca2bbf79c4baf80e51f883a36e5887183b84d3b
-
SHA512
8dc23a5e14f031eaff4ee1096a8f427783b9f9a9ce83f635bf8fd712e78b9f36327b42fba6ffd696684e398fc8794e9a5dd87ffdf8ff533c98ce14856ee23697
Malware Config
Extracted
formbook
http://www.wissinkadams.com/iae2/
mainstreetswimschool.com
nhadat9chu.com
guidedcommercialloan.com
quandd.site
smittysfrontlinecarriers.com
hmas-vibrant.com
pakunok.net
jiffihosting.com
shopping-container.com
quartiercreole.net
weebflix.com
gringomexico.com
whathappensnextin6minutes.com
patchealth.com
exclusivelymarissa.com
my-glp.com
trgtbk.com
sagefemmecaluire.com
fetaldiagnosislaboratorios.com
aniversariocom-presente12.com
bharatiyacraft.com
californialp.com
covidvirusbellcurve.com
footecs.com
africabiocity.com
nano-gizmo.com
nanotradefx.com
tessalateconsulting.com
lvlyourlife.com
azhello.com
theobxdirectory.com
wuqingsong.club
indiaonyourown.com
prepa-tests.com
theroyalsoft.com
femalevegan.com
angelises.com
mysqltosnowflake.com
myworldrealtors.com
krispychix.com
kfs.ltd
modifiedbots.com
les-kappes.net
yamlperf.com
52xianju.com
whatsmodish.com
assessoriasanntacfi.com
crazyontheflavor.com
homeownerdefenders.net
highcare.store
maglex.info
listvennica-market.com
discbrakepart.com
hoa142.com
westtexasweddingvideography.com
diplomadoenturismoderomance.com
avshijia9.com
satyam-group.com
corpclubperu.net
lvnwtr.com
italiandreamweddings.com
shiyusupplychain.com
neversprayedfoods.com
truckrev.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4968-3-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3224-12-0x0000000002620000-0x0000000002649000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
Processes:
PO81053.exePO81053.exemstsc.exedescription pid process target process PID 4704 set thread context of 4968 4704 PO81053.exe PO81053.exe PID 4968 set thread context of 2300 4968 PO81053.exe Explorer.EXE PID 4968 set thread context of 2300 4968 PO81053.exe Explorer.EXE PID 3224 set thread context of 2300 3224 mstsc.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 62 IoCs
Processes:
PO81053.exemstsc.exepid process 4968 PO81053.exe 4968 PO81053.exe 4968 PO81053.exe 4968 PO81053.exe 4968 PO81053.exe 4968 PO81053.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe 3224 mstsc.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
PO81053.exePO81053.exemstsc.exepid process 4704 PO81053.exe 4968 PO81053.exe 4968 PO81053.exe 4968 PO81053.exe 4968 PO81053.exe 3224 mstsc.exe 3224 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
PO81053.exemstsc.exedescription pid process Token: SeDebugPrivilege 4968 PO81053.exe Token: SeDebugPrivilege 3224 mstsc.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 2300 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
PO81053.exeExplorer.EXEmstsc.exedescription pid process target process PID 4704 wrote to memory of 4968 4704 PO81053.exe PO81053.exe PID 4704 wrote to memory of 4968 4704 PO81053.exe PO81053.exe PID 4704 wrote to memory of 4968 4704 PO81053.exe PO81053.exe PID 4704 wrote to memory of 4968 4704 PO81053.exe PO81053.exe PID 2300 wrote to memory of 3224 2300 Explorer.EXE mstsc.exe PID 2300 wrote to memory of 3224 2300 Explorer.EXE mstsc.exe PID 2300 wrote to memory of 3224 2300 Explorer.EXE mstsc.exe PID 3224 wrote to memory of 3860 3224 mstsc.exe cmd.exe PID 3224 wrote to memory of 3860 3224 mstsc.exe cmd.exe PID 3224 wrote to memory of 3860 3224 mstsc.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\PO81053.exe"C:\Users\Admin\AppData\Local\Temp\PO81053.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\PO81053.exe"C:\Users\Admin\AppData\Local\Temp\PO81053.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4968 -
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PO81053.exe"3⤵PID:3860