Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
19-01-2021 07:38
Static task
static1
Behavioral task
behavioral1
Sample
Request for Quotation.exe
Resource
win7v20201028
General
-
Target
Request for Quotation.exe
-
Size
1.0MB
-
MD5
7f2ab7a73897ef184b2b2f88c441f7b2
-
SHA1
ba88609508657b04c665d15b9fec27565810aec9
-
SHA256
ae8f3d13092dbd9ac0a490c691eefafe0026e44148a9df896d6b5b8edceb5284
-
SHA512
6aa465396a70f43812e2b19da321ce02bd2a018108dd8fd29c1b9beac0d787979a15d8cebf5d62b38cc38eadada54a6b0c7a2aa0977ceedf9caef1229edd81d8
Malware Config
Extracted
formbook
http://www.outtheframecustoms.com/9t6k/
parklineemployerperks.com
container-hq.com
harzproductions.com
wweebtedge.com
sandiegosalesandleasing.com
ri-web-dev.com
ufomars.com
countrybarndogkennel.com
imakestuff.xyz
lnmqjy.com
martialarttemple.com
jermaine-williams.com
ahomedokita.com
buttsliders.com
3344cq.com
umkxmhopi.icu
houstonlasertreatment.com
makingdoathome.com
ladysativamarketing.com
shroomgiant.com
disconight.net
pocketspacer.com
kamizex.com
asunshinenotary.com
downtowndentaloffice.com
pvrarts.xyz
rodgroup.net
chrismyersinterview.com
dainikamarsomoy.com
detagtives.com
rdhar1976.com
sportsbookmatcher.com
fiqueonline.com
a-great-migraine-relief-fr.fyi
wellageing.info
mlselections.com
hillcrestcapmgtonline.com
mall0734.com
samapti.com
cia3mega.info
2-wochen-transformation.com
sowaxgroup.com
customer-id-9822.com
nu-pack.com
kingdomwinecommunity.com
deliverourdaughters.com
hyperionquote.com
theyolokart.com
wearethefactcheckers.com
lundhomeinspections.com
rociosegura.com
workplaceplanning.com
thcmealprep.com
thanksforlove.com
shopd1baseball.com
starshinebujihotel.com
vbuckdpower.com
kjose122.com
skendermc.com
replacementspartsinc.com
binhlygiunhiet.com
higherthan75.com
518suzhou1.com
renabbeauty.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1020-15-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/1020-16-0x000000000041CAC0-mapping.dmp xloader behavioral2/memory/1076-24-0x00000000006B0000-0x00000000006D8000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Request for Quotation.exeRequest for Quotation.exesvchost.exedescription pid process target process PID 508 set thread context of 1020 508 Request for Quotation.exe Request for Quotation.exe PID 1020 set thread context of 3048 1020 Request for Quotation.exe Explorer.EXE PID 1076 set thread context of 3048 1076 svchost.exe Explorer.EXE -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 36 IoCs
Processes:
Request for Quotation.exesvchost.exepid process 1020 Request for Quotation.exe 1020 Request for Quotation.exe 1020 Request for Quotation.exe 1020 Request for Quotation.exe 1076 svchost.exe 1076 svchost.exe 1076 svchost.exe 1076 svchost.exe 1076 svchost.exe 1076 svchost.exe 1076 svchost.exe 1076 svchost.exe 1076 svchost.exe 1076 svchost.exe 1076 svchost.exe 1076 svchost.exe 1076 svchost.exe 1076 svchost.exe 1076 svchost.exe 1076 svchost.exe 1076 svchost.exe 1076 svchost.exe 1076 svchost.exe 1076 svchost.exe 1076 svchost.exe 1076 svchost.exe 1076 svchost.exe 1076 svchost.exe 1076 svchost.exe 1076 svchost.exe 1076 svchost.exe 1076 svchost.exe 1076 svchost.exe 1076 svchost.exe 1076 svchost.exe 1076 svchost.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Request for Quotation.exesvchost.exepid process 1020 Request for Quotation.exe 1020 Request for Quotation.exe 1020 Request for Quotation.exe 1076 svchost.exe 1076 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Request for Quotation.exesvchost.exedescription pid process Token: SeDebugPrivilege 1020 Request for Quotation.exe Token: SeDebugPrivilege 1076 svchost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Request for Quotation.exeExplorer.EXEsvchost.exedescription pid process target process PID 508 wrote to memory of 2972 508 Request for Quotation.exe schtasks.exe PID 508 wrote to memory of 2972 508 Request for Quotation.exe schtasks.exe PID 508 wrote to memory of 2972 508 Request for Quotation.exe schtasks.exe PID 508 wrote to memory of 1020 508 Request for Quotation.exe Request for Quotation.exe PID 508 wrote to memory of 1020 508 Request for Quotation.exe Request for Quotation.exe PID 508 wrote to memory of 1020 508 Request for Quotation.exe Request for Quotation.exe PID 508 wrote to memory of 1020 508 Request for Quotation.exe Request for Quotation.exe PID 508 wrote to memory of 1020 508 Request for Quotation.exe Request for Quotation.exe PID 508 wrote to memory of 1020 508 Request for Quotation.exe Request for Quotation.exe PID 3048 wrote to memory of 1076 3048 Explorer.EXE svchost.exe PID 3048 wrote to memory of 1076 3048 Explorer.EXE svchost.exe PID 3048 wrote to memory of 1076 3048 Explorer.EXE svchost.exe PID 1076 wrote to memory of 3136 1076 svchost.exe cmd.exe PID 1076 wrote to memory of 3136 1076 svchost.exe cmd.exe PID 1076 wrote to memory of 3136 1076 svchost.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\OrxfuWwhEehOge" /XML "C:\Users\Admin\AppData\Local\Temp\tmp416F.tmp"3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Request for Quotation.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp416F.tmpMD5
f85c5df6d19abebbaa2a6ab5032529a9
SHA1de8eb85d4c088bf6315c150fa828c6379daeb34a
SHA2569d9facc42de6e9932a774932230b8c715bc3606debfd80a0a09a445d08380db5
SHA5123d9362ec16c75c4682a667cfe573f80f7108d33fed4fc1e9901a48cb6a13cc0963ef7f065589ecb51414a2cb613b7e5a98c92b090c26868f36d80934c7d13df3
-
memory/508-3-0x0000000000E90000-0x0000000000E91000-memory.dmpFilesize
4KB
-
memory/508-5-0x00000000057C0000-0x00000000057C1000-memory.dmpFilesize
4KB
-
memory/508-6-0x0000000005D60000-0x0000000005D61000-memory.dmpFilesize
4KB
-
memory/508-7-0x0000000005900000-0x0000000005901000-memory.dmpFilesize
4KB
-
memory/508-8-0x0000000005750000-0x0000000005751000-memory.dmpFilesize
4KB
-
memory/508-9-0x0000000005860000-0x0000000005861000-memory.dmpFilesize
4KB
-
memory/508-10-0x0000000005A60000-0x0000000005A61000-memory.dmpFilesize
4KB
-
memory/508-11-0x00000000058A0000-0x00000000058C3000-memory.dmpFilesize
140KB
-
memory/508-12-0x00000000065D0000-0x0000000006631000-memory.dmpFilesize
388KB
-
memory/508-2-0x0000000073360000-0x0000000073A4E000-memory.dmpFilesize
6.9MB
-
memory/1020-15-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1020-16-0x000000000041CAC0-mapping.dmp
-
memory/1020-19-0x00000000010C0000-0x00000000013E0000-memory.dmpFilesize
3.1MB
-
memory/1020-20-0x0000000000C50000-0x0000000000C60000-memory.dmpFilesize
64KB
-
memory/1076-22-0x0000000000000000-mapping.dmp
-
memory/1076-23-0x0000000000D60000-0x0000000000D6C000-memory.dmpFilesize
48KB
-
memory/1076-24-0x00000000006B0000-0x00000000006D8000-memory.dmpFilesize
160KB
-
memory/1076-25-0x0000000003090000-0x00000000033B0000-memory.dmpFilesize
3.1MB
-
memory/1076-27-0x0000000002D70000-0x0000000002DFF000-memory.dmpFilesize
572KB
-
memory/2972-13-0x0000000000000000-mapping.dmp
-
memory/3048-21-0x0000000003060000-0x0000000003124000-memory.dmpFilesize
784KB
-
memory/3048-28-0x00000000064E0000-0x00000000065C5000-memory.dmpFilesize
916KB
-
memory/3136-26-0x0000000000000000-mapping.dmp