Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
19-01-2021 07:38
Static task
static1
Behavioral task
behavioral1
Sample
Bank details.exe
Resource
win7v20201028
General
-
Target
Bank details.exe
-
Size
887KB
-
MD5
3eec66e80f478d2730d7e128d393460d
-
SHA1
b86c0705c6b9cf3101f7d5fa17d094ec7cb3d3da
-
SHA256
6acec5800bb6a457e47029754e9eb7d6bf405ff56ea9f074741dabfdac141c18
-
SHA512
5a9425722539d2053b39962ee2b6f3df61c896946664638b180723979a6b024f8c3d5c7d48dcba5eb00bc93f1498744919f9d1790662e851c9bfd3f45905cdfa
Malware Config
Extracted
formbook
http://www.lensinlens.com/ehxh/
financialaccompany.com
face2bouk.com
blazedisinfecting.com
providaconsultinggroup.com
distriautosdelpacifico.com
myaduhelm.com
thangmaygiatot.com
nuevasantatecla.com
endpedophiles.com
alwanps.com
anzi-studio.com
twoswinginghammers.com
curbedinc.com
purecleantn.com
4levelsplit.com
talklinecall.com
egypte-vakanties.com
xzntfwof.icu
sosyoclassic.com
adjoalearningacademy.com
alphacinema.net
lady2lover.com
eleanorandhick.com
kimsfist.com
pemasangangipsum.com
mrkabaadiwala.com
alltechengwork.com
marvitrans.net
islamicwatchdogmovement.net
fortunefoundrydesign.com
911strongerlife.com
cb13xxx.com
ameriloans.info
grantmohnphotography.com
iregentos.info
tubeknows.com
clarkacademiccoaching.com
hongzhifreight.com
sparkletosprinkles.com
sprtncloud.com
goegoldenretrievers.com
highstreetwear.com
channel22newz.com
jmuboprivacy.com
ayurvedayogasardinia.com
resethire.com
simplyrita.com
fatlosszone4u.com
brian.productions
qoogaloo.com
aubreyntaylor.com
jorgianamarlowe.com
onemilliondollarsapp.com
kontenery-pawilony.site
navinkhumui.xyz
lacroixandkress.com
luxlectric.net
haypr.com
lusomarkets.com
laplumebodas.com
leadhorn.com
masksthatsmile.com
suoxqxnnoj.net
xiamen8.xyz
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1504-13-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/1504-14-0x000000000041D050-mapping.dmp xloader behavioral2/memory/4084-21-0x0000000000810000-0x0000000000838000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Bank details.exeBank details.exewlanext.exedescription pid process target process PID 3884 set thread context of 1504 3884 Bank details.exe Bank details.exe PID 1504 set thread context of 2092 1504 Bank details.exe Explorer.EXE PID 4084 set thread context of 2092 4084 wlanext.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 40 IoCs
Processes:
Bank details.exewlanext.exepid process 1504 Bank details.exe 1504 Bank details.exe 1504 Bank details.exe 1504 Bank details.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe 4084 wlanext.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Bank details.exewlanext.exepid process 1504 Bank details.exe 1504 Bank details.exe 1504 Bank details.exe 4084 wlanext.exe 4084 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Bank details.exewlanext.exedescription pid process Token: SeDebugPrivilege 1504 Bank details.exe Token: SeDebugPrivilege 4084 wlanext.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 2092 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Bank details.exeExplorer.EXEwlanext.exedescription pid process target process PID 3884 wrote to memory of 1504 3884 Bank details.exe Bank details.exe PID 3884 wrote to memory of 1504 3884 Bank details.exe Bank details.exe PID 3884 wrote to memory of 1504 3884 Bank details.exe Bank details.exe PID 3884 wrote to memory of 1504 3884 Bank details.exe Bank details.exe PID 3884 wrote to memory of 1504 3884 Bank details.exe Bank details.exe PID 3884 wrote to memory of 1504 3884 Bank details.exe Bank details.exe PID 2092 wrote to memory of 4084 2092 Explorer.EXE wlanext.exe PID 2092 wrote to memory of 4084 2092 Explorer.EXE wlanext.exe PID 2092 wrote to memory of 4084 2092 Explorer.EXE wlanext.exe PID 4084 wrote to memory of 2400 4084 wlanext.exe cmd.exe PID 4084 wrote to memory of 2400 4084 wlanext.exe cmd.exe PID 4084 wrote to memory of 2400 4084 wlanext.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\Bank details.exe"C:\Users\Admin\AppData\Local\Temp\Bank details.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\Bank details.exe"C:\Users\Admin\AppData\Local\Temp\Bank details.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1504 -
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Bank details.exe"3⤵PID:2400