Analysis
-
max time kernel
151s -
max time network
92s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
19-01-2021 07:38
Static task
static1
Behavioral task
behavioral1
Sample
BEF20201801.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
BEF20201801.exe
Resource
win10v20201028
General
-
Target
BEF20201801.exe
-
Size
1.2MB
-
MD5
06e4d811d6a0234e3c4ef9eba38fd5a1
-
SHA1
bbbd38280ad7fa5e36ba27a16873941613ae6e52
-
SHA256
337be490c64d6bf931577dd90ea28277392a46ea541b61f1574dcd75aab02b0f
-
SHA512
52223bef10103e10d56b3054c67baf088f70b6a88c13ac525d79f11ff385680288d1184c89da92a7aa9c9bcbdf1f8eb23881df1e9a9c3439236f77809953e209
Malware Config
Extracted
formbook
http://www.a-emeservice.com/m8ec/
thomascraigwealth.com
melbournemedicalhealth.net
tdxcoin.com
lukassbprojects.net
aldemallc.com
moqawalat-kuwait.com
txcsco.com
jobcarepro.com
sedotwcmedanmurah.com
niconthenine.com
radliffrehab.com
infiniteechogroup.com
stellantis-luxury-rent.com
ibusehat.info
resellerauctions.com
softwarexprogrammers.com
bumpnlifestyle.com
mintmacher.com
partapprintercare.com
justrightinsurance.com
beyond-ml.com
mikrotandborste.com
madisonmeadowsseniorliving.com
smart14day.com
fiftyfivetwelve.com
respectinvestadvance.com
shelleylutherfortexas.com
kunst-stueck-chen.com
adastraperaspera.xyz
aletheaastraea.info
zhghzlg.com
cameroncooperar.com
inrushconsulting.com
oldeny.com
foggardens.com
bubbygoobers.com
apartmentnegotiator.com
iregentos.info
charlesadoptionhome.com
sugawara-garasu.com
insidescripps.net
offerlamp.com
flagpeel.com
tb1919.com
estherneil.com
greatunsearchablethings.com
jeunetherapie.com
ricardoinman.com
sbq58.com
morifan.com
foodpukka.com
onewaytaxi.club
ksolves-vendor.com
ashleighemmaboyle.com
hbseelong.com
vanotti-watches.com
faizulrahmanmusafir.com
cb5677.com
gcasservices.com
perteprampram01.com
308hamlinloop.com
machkind.com
cwpdhambers.xyz
glenwoodsteak.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1660-6-0x000000000041D0A0-mapping.dmp xloader behavioral1/memory/1660-5-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/284-15-0x00000000000F0000-0x0000000000119000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 528 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
BEF20201801.exeBEF20201801.exemsiexec.exedescription pid process target process PID 1924 set thread context of 1660 1924 BEF20201801.exe BEF20201801.exe PID 1660 set thread context of 1276 1660 BEF20201801.exe Explorer.EXE PID 284 set thread context of 1276 284 msiexec.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
BEF20201801.exemsiexec.exepid process 1660 BEF20201801.exe 1660 BEF20201801.exe 284 msiexec.exe 284 msiexec.exe 284 msiexec.exe 284 msiexec.exe 284 msiexec.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
BEF20201801.exemsiexec.exepid process 1660 BEF20201801.exe 1660 BEF20201801.exe 1660 BEF20201801.exe 284 msiexec.exe 284 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
BEF20201801.exemsiexec.exedescription pid process Token: SeDebugPrivilege 1660 BEF20201801.exe Token: SeDebugPrivilege 284 msiexec.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
BEF20201801.exeExplorer.EXEmsiexec.exedescription pid process target process PID 1924 wrote to memory of 1660 1924 BEF20201801.exe BEF20201801.exe PID 1924 wrote to memory of 1660 1924 BEF20201801.exe BEF20201801.exe PID 1924 wrote to memory of 1660 1924 BEF20201801.exe BEF20201801.exe PID 1924 wrote to memory of 1660 1924 BEF20201801.exe BEF20201801.exe PID 1924 wrote to memory of 1660 1924 BEF20201801.exe BEF20201801.exe PID 1924 wrote to memory of 1660 1924 BEF20201801.exe BEF20201801.exe PID 1924 wrote to memory of 1660 1924 BEF20201801.exe BEF20201801.exe PID 1276 wrote to memory of 284 1276 Explorer.EXE msiexec.exe PID 1276 wrote to memory of 284 1276 Explorer.EXE msiexec.exe PID 1276 wrote to memory of 284 1276 Explorer.EXE msiexec.exe PID 1276 wrote to memory of 284 1276 Explorer.EXE msiexec.exe PID 1276 wrote to memory of 284 1276 Explorer.EXE msiexec.exe PID 1276 wrote to memory of 284 1276 Explorer.EXE msiexec.exe PID 1276 wrote to memory of 284 1276 Explorer.EXE msiexec.exe PID 284 wrote to memory of 528 284 msiexec.exe cmd.exe PID 284 wrote to memory of 528 284 msiexec.exe cmd.exe PID 284 wrote to memory of 528 284 msiexec.exe cmd.exe PID 284 wrote to memory of 528 284 msiexec.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\BEF20201801.exe"C:\Users\Admin\AppData\Local\Temp\BEF20201801.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\BEF20201801.exe"C:\Users\Admin\AppData\Local\Temp\BEF20201801.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1660 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:284 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\BEF20201801.exe"3⤵
- Deletes itself
PID:528