Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
19-01-2021 07:38
Static task
static1
Behavioral task
behavioral1
Sample
Bank details.exe
Resource
win7v20201028
General
-
Target
Bank details.exe
-
Size
887KB
-
MD5
3eec66e80f478d2730d7e128d393460d
-
SHA1
b86c0705c6b9cf3101f7d5fa17d094ec7cb3d3da
-
SHA256
6acec5800bb6a457e47029754e9eb7d6bf405ff56ea9f074741dabfdac141c18
-
SHA512
5a9425722539d2053b39962ee2b6f3df61c896946664638b180723979a6b024f8c3d5c7d48dcba5eb00bc93f1498744919f9d1790662e851c9bfd3f45905cdfa
Malware Config
Extracted
formbook
http://www.lensinlens.com/ehxh/
financialaccompany.com
face2bouk.com
blazedisinfecting.com
providaconsultinggroup.com
distriautosdelpacifico.com
myaduhelm.com
thangmaygiatot.com
nuevasantatecla.com
endpedophiles.com
alwanps.com
anzi-studio.com
twoswinginghammers.com
curbedinc.com
purecleantn.com
4levelsplit.com
talklinecall.com
egypte-vakanties.com
xzntfwof.icu
sosyoclassic.com
adjoalearningacademy.com
alphacinema.net
lady2lover.com
eleanorandhick.com
kimsfist.com
pemasangangipsum.com
mrkabaadiwala.com
alltechengwork.com
marvitrans.net
islamicwatchdogmovement.net
fortunefoundrydesign.com
911strongerlife.com
cb13xxx.com
ameriloans.info
grantmohnphotography.com
iregentos.info
tubeknows.com
clarkacademiccoaching.com
hongzhifreight.com
sparkletosprinkles.com
sprtncloud.com
goegoldenretrievers.com
highstreetwear.com
channel22newz.com
jmuboprivacy.com
ayurvedayogasardinia.com
resethire.com
simplyrita.com
fatlosszone4u.com
brian.productions
qoogaloo.com
aubreyntaylor.com
jorgianamarlowe.com
onemilliondollarsapp.com
kontenery-pawilony.site
navinkhumui.xyz
lacroixandkress.com
luxlectric.net
haypr.com
lusomarkets.com
laplumebodas.com
leadhorn.com
masksthatsmile.com
suoxqxnnoj.net
xiamen8.xyz
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1516-8-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/1516-9-0x000000000041D050-mapping.dmp xloader behavioral1/memory/296-16-0x0000000000080000-0x00000000000A8000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1048 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Bank details.exeBank details.exesvchost.exedescription pid process target process PID 1832 set thread context of 1516 1832 Bank details.exe Bank details.exe PID 1516 set thread context of 1196 1516 Bank details.exe Explorer.EXE PID 296 set thread context of 1196 296 svchost.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
Bank details.exesvchost.exepid process 1516 Bank details.exe 1516 Bank details.exe 296 svchost.exe 296 svchost.exe 296 svchost.exe 296 svchost.exe 296 svchost.exe 296 svchost.exe 296 svchost.exe 296 svchost.exe 296 svchost.exe 296 svchost.exe 296 svchost.exe 296 svchost.exe 296 svchost.exe 296 svchost.exe 296 svchost.exe 296 svchost.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Bank details.exesvchost.exepid process 1516 Bank details.exe 1516 Bank details.exe 1516 Bank details.exe 296 svchost.exe 296 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Bank details.exesvchost.exedescription pid process Token: SeDebugPrivilege 1516 Bank details.exe Token: SeDebugPrivilege 296 svchost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Bank details.exeExplorer.EXEsvchost.exedescription pid process target process PID 1832 wrote to memory of 1516 1832 Bank details.exe Bank details.exe PID 1832 wrote to memory of 1516 1832 Bank details.exe Bank details.exe PID 1832 wrote to memory of 1516 1832 Bank details.exe Bank details.exe PID 1832 wrote to memory of 1516 1832 Bank details.exe Bank details.exe PID 1832 wrote to memory of 1516 1832 Bank details.exe Bank details.exe PID 1832 wrote to memory of 1516 1832 Bank details.exe Bank details.exe PID 1832 wrote to memory of 1516 1832 Bank details.exe Bank details.exe PID 1196 wrote to memory of 296 1196 Explorer.EXE svchost.exe PID 1196 wrote to memory of 296 1196 Explorer.EXE svchost.exe PID 1196 wrote to memory of 296 1196 Explorer.EXE svchost.exe PID 1196 wrote to memory of 296 1196 Explorer.EXE svchost.exe PID 296 wrote to memory of 1048 296 svchost.exe cmd.exe PID 296 wrote to memory of 1048 296 svchost.exe cmd.exe PID 296 wrote to memory of 1048 296 svchost.exe cmd.exe PID 296 wrote to memory of 1048 296 svchost.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\Bank details.exe"C:\Users\Admin\AppData\Local\Temp\Bank details.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\Bank details.exe"C:\Users\Admin\AppData\Local\Temp\Bank details.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1516 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:296 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Bank details.exe"3⤵
- Deletes itself
PID:1048