Analysis
-
max time kernel
5s -
max time network
13s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
19-01-2021 12:15
Static task
static1
Behavioral task
behavioral1
Sample
7195211e786ecd993b3c6a3176942d15.exe
Resource
win7v20201028
General
-
Target
7195211e786ecd993b3c6a3176942d15.exe
-
Size
432KB
-
MD5
7195211e786ecd993b3c6a3176942d15
-
SHA1
b654f8e012d933e295b48d427d8939265d50a5e2
-
SHA256
5551c39b0838a38711babfe60b36dda8855791ce1512553858fbaff025d31122
-
SHA512
b784bce514162fa73dc1e3a9f63a6daaaac5037a636e0ab3645a1573cd5c1de1d71dbb7abed9a2ccfb50197c6d22f1102f547ae6bb87d765627ac84d53df47c2
Malware Config
Extracted
formbook
http://www.inreachpt.com/gqx2/
calusaptamiami.com
starlinkwebservices.com
lakeviewbarbershonola.com
oaklandraidersjerseyspop.com
ohiotechreport.com
eligetucafetera.com
tu4343.com
abstract-elearning.com
thebabylashes.com
athleteshive.com
fanninhomesforless.com
sembracna.com
servicesyn.com
bellairechoice.com
tmpaas.com
eyepaa.com
stickerzblvd.com
rentfs.com
nadya-shanab.com
microwgreens.net
overnaut.net
edwinstowingservices.com
bonus189.space
xn--wgbp0b73b.com
trijjadigital.com
libraspeed.com
theofficialtoluwani.com
podborauto.pro
qyhualin.com
prayerswithmary.com
donboscohistorycorner.com
enlightenedsoil.com
osteopathegagny.com
lookingglassland.com
maglex.info
foxandgraceboutique.com
yourinfluencecoach.com
com-cancel-payment-id655.com
ppspiaggio.com
dbsadv.com
teamworkdash.com
washington-election-2020.info
creativehighagency.com
artisthenewmeditation.com
qsgasia.com
unseen-vision.com
beepybox.online
shaffglowing.com
teacher-retirement-info.info
muabandatdonganh.com
shuhan.design
5200853.com
shengmixiaoji.net
spiderofthesea.com
scionoflewisville.com
tpcvirtual.com
zhjiaxiang.com
thefanexam.com
kimscraftyresale.com
housvest.com
bukmyhotel.com
lacaverne.ovh
investorspredict.com
quicklogosireland.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1496-8-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1496-9-0x000000000041D070-mapping.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
7195211e786ecd993b3c6a3176942d15.exedescription pid process target process PID 1684 set thread context of 1496 1684 7195211e786ecd993b3c6a3176942d15.exe 7195211e786ecd993b3c6a3176942d15.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1932 1684 WerFault.exe 7195211e786ecd993b3c6a3176942d15.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
7195211e786ecd993b3c6a3176942d15.exeWerFault.exepid process 1496 7195211e786ecd993b3c6a3176942d15.exe 1932 WerFault.exe 1932 WerFault.exe 1932 WerFault.exe 1932 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 1932 WerFault.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
7195211e786ecd993b3c6a3176942d15.exedescription pid process target process PID 1684 wrote to memory of 1496 1684 7195211e786ecd993b3c6a3176942d15.exe 7195211e786ecd993b3c6a3176942d15.exe PID 1684 wrote to memory of 1496 1684 7195211e786ecd993b3c6a3176942d15.exe 7195211e786ecd993b3c6a3176942d15.exe PID 1684 wrote to memory of 1496 1684 7195211e786ecd993b3c6a3176942d15.exe 7195211e786ecd993b3c6a3176942d15.exe PID 1684 wrote to memory of 1496 1684 7195211e786ecd993b3c6a3176942d15.exe 7195211e786ecd993b3c6a3176942d15.exe PID 1684 wrote to memory of 1496 1684 7195211e786ecd993b3c6a3176942d15.exe 7195211e786ecd993b3c6a3176942d15.exe PID 1684 wrote to memory of 1496 1684 7195211e786ecd993b3c6a3176942d15.exe 7195211e786ecd993b3c6a3176942d15.exe PID 1684 wrote to memory of 1496 1684 7195211e786ecd993b3c6a3176942d15.exe 7195211e786ecd993b3c6a3176942d15.exe PID 1684 wrote to memory of 1932 1684 7195211e786ecd993b3c6a3176942d15.exe WerFault.exe PID 1684 wrote to memory of 1932 1684 7195211e786ecd993b3c6a3176942d15.exe WerFault.exe PID 1684 wrote to memory of 1932 1684 7195211e786ecd993b3c6a3176942d15.exe WerFault.exe PID 1684 wrote to memory of 1932 1684 7195211e786ecd993b3c6a3176942d15.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7195211e786ecd993b3c6a3176942d15.exe"C:\Users\Admin\AppData\Local\Temp\7195211e786ecd993b3c6a3176942d15.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\7195211e786ecd993b3c6a3176942d15.exe"C:\Users\Admin\AppData\Local\Temp\7195211e786ecd993b3c6a3176942d15.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1496 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 6642⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1932