Analysis
-
max time kernel
150s -
max time network
40s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
19-01-2021 07:38
Static task
static1
Behavioral task
behavioral1
Sample
Request for Quotation.exe
Resource
win7v20201028
General
-
Target
Request for Quotation.exe
-
Size
1.0MB
-
MD5
7f2ab7a73897ef184b2b2f88c441f7b2
-
SHA1
ba88609508657b04c665d15b9fec27565810aec9
-
SHA256
ae8f3d13092dbd9ac0a490c691eefafe0026e44148a9df896d6b5b8edceb5284
-
SHA512
6aa465396a70f43812e2b19da321ce02bd2a018108dd8fd29c1b9beac0d787979a15d8cebf5d62b38cc38eadada54a6b0c7a2aa0977ceedf9caef1229edd81d8
Malware Config
Extracted
formbook
http://www.outtheframecustoms.com/9t6k/
parklineemployerperks.com
container-hq.com
harzproductions.com
wweebtedge.com
sandiegosalesandleasing.com
ri-web-dev.com
ufomars.com
countrybarndogkennel.com
imakestuff.xyz
lnmqjy.com
martialarttemple.com
jermaine-williams.com
ahomedokita.com
buttsliders.com
3344cq.com
umkxmhopi.icu
houstonlasertreatment.com
makingdoathome.com
ladysativamarketing.com
shroomgiant.com
disconight.net
pocketspacer.com
kamizex.com
asunshinenotary.com
downtowndentaloffice.com
pvrarts.xyz
rodgroup.net
chrismyersinterview.com
dainikamarsomoy.com
detagtives.com
rdhar1976.com
sportsbookmatcher.com
fiqueonline.com
a-great-migraine-relief-fr.fyi
wellageing.info
mlselections.com
hillcrestcapmgtonline.com
mall0734.com
samapti.com
cia3mega.info
2-wochen-transformation.com
sowaxgroup.com
customer-id-9822.com
nu-pack.com
kingdomwinecommunity.com
deliverourdaughters.com
hyperionquote.com
theyolokart.com
wearethefactcheckers.com
lundhomeinspections.com
rociosegura.com
workplaceplanning.com
thcmealprep.com
thanksforlove.com
shopd1baseball.com
starshinebujihotel.com
vbuckdpower.com
kjose122.com
skendermc.com
replacementspartsinc.com
binhlygiunhiet.com
higherthan75.com
518suzhou1.com
renabbeauty.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/268-10-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/268-11-0x000000000041CAC0-mapping.dmp xloader behavioral1/memory/1824-21-0x0000000000080000-0x00000000000A8000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1532 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
Request for Quotation.exeRequest for Quotation.exeipconfig.exedescription pid process target process PID 2004 set thread context of 268 2004 Request for Quotation.exe Request for Quotation.exe PID 268 set thread context of 1304 268 Request for Quotation.exe Explorer.EXE PID 268 set thread context of 1304 268 Request for Quotation.exe Explorer.EXE PID 1824 set thread context of 1304 1824 ipconfig.exe Explorer.EXE -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 1824 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
Processes:
Request for Quotation.exeipconfig.exepid process 268 Request for Quotation.exe 268 Request for Quotation.exe 268 Request for Quotation.exe 1824 ipconfig.exe 1824 ipconfig.exe 1824 ipconfig.exe 1824 ipconfig.exe 1824 ipconfig.exe 1824 ipconfig.exe 1824 ipconfig.exe 1824 ipconfig.exe 1824 ipconfig.exe 1824 ipconfig.exe 1824 ipconfig.exe 1824 ipconfig.exe 1824 ipconfig.exe 1824 ipconfig.exe 1824 ipconfig.exe 1824 ipconfig.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
Request for Quotation.exeipconfig.exepid process 268 Request for Quotation.exe 268 Request for Quotation.exe 268 Request for Quotation.exe 268 Request for Quotation.exe 1824 ipconfig.exe 1824 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Request for Quotation.exeipconfig.exedescription pid process Token: SeDebugPrivilege 268 Request for Quotation.exe Token: SeDebugPrivilege 1824 ipconfig.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1304 Explorer.EXE 1304 Explorer.EXE 1304 Explorer.EXE 1304 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1304 Explorer.EXE 1304 Explorer.EXE 1304 Explorer.EXE 1304 Explorer.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
Request for Quotation.exeRequest for Quotation.exeipconfig.exedescription pid process target process PID 2004 wrote to memory of 1928 2004 Request for Quotation.exe schtasks.exe PID 2004 wrote to memory of 1928 2004 Request for Quotation.exe schtasks.exe PID 2004 wrote to memory of 1928 2004 Request for Quotation.exe schtasks.exe PID 2004 wrote to memory of 1928 2004 Request for Quotation.exe schtasks.exe PID 2004 wrote to memory of 268 2004 Request for Quotation.exe Request for Quotation.exe PID 2004 wrote to memory of 268 2004 Request for Quotation.exe Request for Quotation.exe PID 2004 wrote to memory of 268 2004 Request for Quotation.exe Request for Quotation.exe PID 2004 wrote to memory of 268 2004 Request for Quotation.exe Request for Quotation.exe PID 2004 wrote to memory of 268 2004 Request for Quotation.exe Request for Quotation.exe PID 2004 wrote to memory of 268 2004 Request for Quotation.exe Request for Quotation.exe PID 2004 wrote to memory of 268 2004 Request for Quotation.exe Request for Quotation.exe PID 268 wrote to memory of 1824 268 Request for Quotation.exe ipconfig.exe PID 268 wrote to memory of 1824 268 Request for Quotation.exe ipconfig.exe PID 268 wrote to memory of 1824 268 Request for Quotation.exe ipconfig.exe PID 268 wrote to memory of 1824 268 Request for Quotation.exe ipconfig.exe PID 1824 wrote to memory of 1532 1824 ipconfig.exe cmd.exe PID 1824 wrote to memory of 1532 1824 ipconfig.exe cmd.exe PID 1824 wrote to memory of 1532 1824 ipconfig.exe cmd.exe PID 1824 wrote to memory of 1532 1824 ipconfig.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OrxfuWwhEehOge" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF8B.tmp"3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"4⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"5⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpF8B.tmpMD5
a91a51fc9b19f46d5b23633cbfa2bafb
SHA1ea1cc40405dc061dd779d9e409c65fd17f543d5b
SHA256d3aa11649adc5df07d95b257d5ac6eb47ca76161c2b9ea846d7ee6ed6057cade
SHA5126abc2e48e88240ba6582b6017e65c50d8cda4f685a7d4837231e3fc3f53092a06de7a99558e292f6e1d4744eee2a2543832e632cdc9084485c1df2d317097a4f
-
memory/268-13-0x0000000000810000-0x0000000000B13000-memory.dmpFilesize
3.0MB
-
memory/268-16-0x00000000003F0000-0x0000000000400000-memory.dmpFilesize
64KB
-
memory/268-14-0x00000000000F0000-0x0000000000100000-memory.dmpFilesize
64KB
-
memory/268-10-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/268-11-0x000000000041CAC0-mapping.dmp
-
memory/1304-17-0x0000000006AE0000-0x0000000006BBF000-memory.dmpFilesize
892KB
-
memory/1304-15-0x0000000004910000-0x00000000049C7000-memory.dmpFilesize
732KB
-
memory/1532-23-0x0000000000000000-mapping.dmp
-
memory/1824-19-0x0000000075EA1000-0x0000000075EA3000-memory.dmpFilesize
8KB
-
memory/1824-18-0x0000000000000000-mapping.dmp
-
memory/1824-20-0x00000000009E0000-0x00000000009EA000-memory.dmpFilesize
40KB
-
memory/1824-21-0x0000000000080000-0x00000000000A8000-memory.dmpFilesize
160KB
-
memory/1824-22-0x00000000020C0000-0x00000000023C3000-memory.dmpFilesize
3.0MB
-
memory/1824-24-0x00000000008F0000-0x000000000097F000-memory.dmpFilesize
572KB
-
memory/1928-8-0x0000000000000000-mapping.dmp
-
memory/2004-7-0x0000000005450000-0x00000000054B1000-memory.dmpFilesize
388KB
-
memory/2004-6-0x00000000005C0000-0x00000000005C1000-memory.dmpFilesize
4KB
-
memory/2004-5-0x0000000000540000-0x0000000000563000-memory.dmpFilesize
140KB
-
memory/2004-2-0x0000000073AF0000-0x00000000741DE000-memory.dmpFilesize
6.9MB
-
memory/2004-3-0x0000000000C90000-0x0000000000C91000-memory.dmpFilesize
4KB