Analysis
-
max time kernel
18s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
19-01-2021 12:15
Static task
static1
Behavioral task
behavioral1
Sample
7195211e786ecd993b3c6a3176942d15.exe
Resource
win7v20201028
General
-
Target
7195211e786ecd993b3c6a3176942d15.exe
-
Size
432KB
-
MD5
7195211e786ecd993b3c6a3176942d15
-
SHA1
b654f8e012d933e295b48d427d8939265d50a5e2
-
SHA256
5551c39b0838a38711babfe60b36dda8855791ce1512553858fbaff025d31122
-
SHA512
b784bce514162fa73dc1e3a9f63a6daaaac5037a636e0ab3645a1573cd5c1de1d71dbb7abed9a2ccfb50197c6d22f1102f547ae6bb87d765627ac84d53df47c2
Malware Config
Extracted
formbook
http://www.inreachpt.com/gqx2/
calusaptamiami.com
starlinkwebservices.com
lakeviewbarbershonola.com
oaklandraidersjerseyspop.com
ohiotechreport.com
eligetucafetera.com
tu4343.com
abstract-elearning.com
thebabylashes.com
athleteshive.com
fanninhomesforless.com
sembracna.com
servicesyn.com
bellairechoice.com
tmpaas.com
eyepaa.com
stickerzblvd.com
rentfs.com
nadya-shanab.com
microwgreens.net
overnaut.net
edwinstowingservices.com
bonus189.space
xn--wgbp0b73b.com
trijjadigital.com
libraspeed.com
theofficialtoluwani.com
podborauto.pro
qyhualin.com
prayerswithmary.com
donboscohistorycorner.com
enlightenedsoil.com
osteopathegagny.com
lookingglassland.com
maglex.info
foxandgraceboutique.com
yourinfluencecoach.com
com-cancel-payment-id655.com
ppspiaggio.com
dbsadv.com
teamworkdash.com
washington-election-2020.info
creativehighagency.com
artisthenewmeditation.com
qsgasia.com
unseen-vision.com
beepybox.online
shaffglowing.com
teacher-retirement-info.info
muabandatdonganh.com
shuhan.design
5200853.com
shengmixiaoji.net
spiderofthesea.com
scionoflewisville.com
tpcvirtual.com
zhjiaxiang.com
thefanexam.com
kimscraftyresale.com
housvest.com
bukmyhotel.com
lacaverne.ovh
investorspredict.com
quicklogosireland.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3920-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3920-13-0x000000000041D070-mapping.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
7195211e786ecd993b3c6a3176942d15.exedescription pid process target process PID 644 set thread context of 3920 644 7195211e786ecd993b3c6a3176942d15.exe 7195211e786ecd993b3c6a3176942d15.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 208 644 WerFault.exe 7195211e786ecd993b3c6a3176942d15.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
7195211e786ecd993b3c6a3176942d15.exeWerFault.exepid process 3920 7195211e786ecd993b3c6a3176942d15.exe 3920 7195211e786ecd993b3c6a3176942d15.exe 208 WerFault.exe 208 WerFault.exe 208 WerFault.exe 208 WerFault.exe 208 WerFault.exe 208 WerFault.exe 208 WerFault.exe 208 WerFault.exe 208 WerFault.exe 208 WerFault.exe 208 WerFault.exe 208 WerFault.exe 208 WerFault.exe 208 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
WerFault.exedescription pid process Token: SeRestorePrivilege 208 WerFault.exe Token: SeBackupPrivilege 208 WerFault.exe Token: SeDebugPrivilege 208 WerFault.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
7195211e786ecd993b3c6a3176942d15.exedescription pid process target process PID 644 wrote to memory of 3920 644 7195211e786ecd993b3c6a3176942d15.exe 7195211e786ecd993b3c6a3176942d15.exe PID 644 wrote to memory of 3920 644 7195211e786ecd993b3c6a3176942d15.exe 7195211e786ecd993b3c6a3176942d15.exe PID 644 wrote to memory of 3920 644 7195211e786ecd993b3c6a3176942d15.exe 7195211e786ecd993b3c6a3176942d15.exe PID 644 wrote to memory of 3920 644 7195211e786ecd993b3c6a3176942d15.exe 7195211e786ecd993b3c6a3176942d15.exe PID 644 wrote to memory of 3920 644 7195211e786ecd993b3c6a3176942d15.exe 7195211e786ecd993b3c6a3176942d15.exe PID 644 wrote to memory of 3920 644 7195211e786ecd993b3c6a3176942d15.exe 7195211e786ecd993b3c6a3176942d15.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7195211e786ecd993b3c6a3176942d15.exe"C:\Users\Admin\AppData\Local\Temp\7195211e786ecd993b3c6a3176942d15.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Users\Admin\AppData\Local\Temp\7195211e786ecd993b3c6a3176942d15.exe"C:\Users\Admin\AppData\Local\Temp\7195211e786ecd993b3c6a3176942d15.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 644 -s 11722⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:208