Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
19-01-2021 13:05
Static task
static1
Behavioral task
behavioral1
Sample
VCS58GQMhuCYghC.exe
Resource
win7v20201028
General
-
Target
VCS58GQMhuCYghC.exe
-
Size
937KB
-
MD5
e36cffd41bac0837943e65c6e96d8f82
-
SHA1
048bdd4d332b56b10b7505800b4a869d91b4670e
-
SHA256
33f302f22ca7cfa4de06befaab200c53337b218196a9ef16ff6139d7f09a9b87
-
SHA512
7c87990fd8cc633280a85d7ab81e6a24edc89053ec58400eb5b0444276540cd4d21ce518086da8dca86fa1febf969f284dd037877ff29f357226fb25a7701dfb
Malware Config
Extracted
formbook
http://www.allismd.com/ur06/
philippebrooksdesign.com
cmoorestudio.com
profille-sarina23tammara.club
dqulxe.com
uiffinger.com
nolarapper.com
maconanimalexterminator.com
bisovka.com
loveisloveent.com
datication.com
spxo66.com
drhelpnow.com
ladybug-cle.com
macocome.com
thepoppysocks.com
eldritchparadox.com
mercadolibre.company
ismartfarm.com
kansascarlot.com
kevinld.com
p87mbu2ss.xyz
the-makery.info
untegoro.site
newyorkcityhemorrhoidcenter.com
crystalclearwholistics.com
iregentos.info
fullskis.com
promanconsortium.com
800029120.com
mummyisme.com
humpychocks.com
myfavestuff.store
naturalfemina.com
bimetalthermostatksd.com
draysehaniminciftligi.com
sf9820.com
4thop.com
24les.com
thepupcrew.com
strangephobias.com
hotmamabody.com
restaurantsilhouette.com
texasadultdayservices.com
binahaiat.com
nipseythegreat.com
pelisplusxd.net
mamborio.com
elitedigitalperformance.com
therileyretreat.com
aieqbgk.icu
corkboardit.net
katieberiont.com
telemedicinehamilton.com
imagistor.com
tekdesignltd.com
bmw-7979.com
animaliaartist.com
straightlineautoserviceerie.net
qoo10online.com
tesseracoffee.com
central-car-sales.com
thecleaningenthusiast.com
musicmercch.com
pearlpham.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/940-4-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/940-5-0x000000000041D000-mapping.dmp xloader behavioral2/memory/580-12-0x0000000002CA0000-0x0000000002CC8000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
VCS58GQMhuCYghC.exeVCS58GQMhuCYghC.exehelp.exedescription pid process target process PID 640 set thread context of 940 640 VCS58GQMhuCYghC.exe VCS58GQMhuCYghC.exe PID 940 set thread context of 3052 940 VCS58GQMhuCYghC.exe Explorer.EXE PID 580 set thread context of 3052 580 help.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 34 IoCs
Processes:
VCS58GQMhuCYghC.exehelp.exepid process 940 VCS58GQMhuCYghC.exe 940 VCS58GQMhuCYghC.exe 940 VCS58GQMhuCYghC.exe 940 VCS58GQMhuCYghC.exe 580 help.exe 580 help.exe 580 help.exe 580 help.exe 580 help.exe 580 help.exe 580 help.exe 580 help.exe 580 help.exe 580 help.exe 580 help.exe 580 help.exe 580 help.exe 580 help.exe 580 help.exe 580 help.exe 580 help.exe 580 help.exe 580 help.exe 580 help.exe 580 help.exe 580 help.exe 580 help.exe 580 help.exe 580 help.exe 580 help.exe 580 help.exe 580 help.exe 580 help.exe 580 help.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
VCS58GQMhuCYghC.exehelp.exepid process 940 VCS58GQMhuCYghC.exe 940 VCS58GQMhuCYghC.exe 940 VCS58GQMhuCYghC.exe 580 help.exe 580 help.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
VCS58GQMhuCYghC.exehelp.exedescription pid process Token: SeDebugPrivilege 940 VCS58GQMhuCYghC.exe Token: SeDebugPrivilege 580 help.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
VCS58GQMhuCYghC.exeExplorer.EXEhelp.exedescription pid process target process PID 640 wrote to memory of 940 640 VCS58GQMhuCYghC.exe VCS58GQMhuCYghC.exe PID 640 wrote to memory of 940 640 VCS58GQMhuCYghC.exe VCS58GQMhuCYghC.exe PID 640 wrote to memory of 940 640 VCS58GQMhuCYghC.exe VCS58GQMhuCYghC.exe PID 640 wrote to memory of 940 640 VCS58GQMhuCYghC.exe VCS58GQMhuCYghC.exe PID 640 wrote to memory of 940 640 VCS58GQMhuCYghC.exe VCS58GQMhuCYghC.exe PID 640 wrote to memory of 940 640 VCS58GQMhuCYghC.exe VCS58GQMhuCYghC.exe PID 3052 wrote to memory of 580 3052 Explorer.EXE help.exe PID 3052 wrote to memory of 580 3052 Explorer.EXE help.exe PID 3052 wrote to memory of 580 3052 Explorer.EXE help.exe PID 580 wrote to memory of 3408 580 help.exe cmd.exe PID 580 wrote to memory of 3408 580 help.exe cmd.exe PID 580 wrote to memory of 3408 580 help.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\VCS58GQMhuCYghC.exe"C:\Users\Admin\AppData\Local\Temp\VCS58GQMhuCYghC.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\VCS58GQMhuCYghC.exe"C:\Users\Admin\AppData\Local\Temp\VCS58GQMhuCYghC.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:940 -
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\VCS58GQMhuCYghC.exe"3⤵PID:3408