Analysis
-
max time kernel
36s -
max time network
115s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
19-01-2021 12:15
Static task
static1
Behavioral task
behavioral1
Sample
b75247013200d602f98dc3801d2bde2f.exe
Resource
win7v20201028
General
-
Target
b75247013200d602f98dc3801d2bde2f.exe
-
Size
931KB
-
MD5
b75247013200d602f98dc3801d2bde2f
-
SHA1
3327c5cd3ecd636b72c335166fe709b955a32285
-
SHA256
8fe13da45a5732ae42c27687b9cf9105a3f2028857729bdfbe3ae31514a6b298
-
SHA512
aa0b977c81b0e97433e61e21cc1e13cbc8821b5ff4d0b3e7554519051139dc661b4c9c0d8e99a6ff4148968d9f04653c85b411944f42fec29bdd4c70228229f9
Malware Config
Extracted
formbook
http://www.learnhour.net/eaud/
modshiro.com
mademarketingoss.com
austinjourls.info
wayupteam.com
crossingfinger.com
interseptors.com
gigashit.com
livetigo.com
halamankuningindonesia.com
windhammills.com
aylinahmet.com
mbacexonan.website
shopboxbarcelona.com
youyeslive.com
coonlinesportsbooks.com
guorunme.com
putlocker2.site
pencueaidnetwork.com
likevector.com
vulcanudachi-proclub.com
bestcollegelms.online
bosman-smm.online
maglex.info
tolentinestore.com
layaliskincare.com
pensionbackup.com
mettyapp.com
sun-microsoft.com
cheapcialisffx.com
egio.digital
syndicatesportspicks.com
pinnacle.international
realestatejewel.com
dajiankang.love
acaijunglegroup.com
youraircases.com
cdxxcenter.com
ndblife.com
mersinsimsek.com
modernofficeaccessories.com
opioidfactswalgreens.com
yesmywigs.com
lebaronfuneraire.com
missfoxie.com
minbarlibya.com
themalaysialife.com
glz-cc.com
go892.com
eriesbestcaterer.com
geraldreed.com
casinocerto.com
beambitioussummit.com
rfs.company
juliandehaas.com
enooga.com
sulpher.network
toords.com
breaking-news4u.com
erkdigitalmarketing.com
blazorstore.com
weoneqa.com
coalitionsentiment.win
atoidejuger.com
cumbiamba.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1816-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/1816-13-0x000000000041D030-mapping.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b75247013200d602f98dc3801d2bde2f.exedescription pid process target process PID 4092 set thread context of 1816 4092 b75247013200d602f98dc3801d2bde2f.exe b75247013200d602f98dc3801d2bde2f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
b75247013200d602f98dc3801d2bde2f.exepid process 1816 b75247013200d602f98dc3801d2bde2f.exe 1816 b75247013200d602f98dc3801d2bde2f.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
b75247013200d602f98dc3801d2bde2f.exedescription pid process target process PID 4092 wrote to memory of 1816 4092 b75247013200d602f98dc3801d2bde2f.exe b75247013200d602f98dc3801d2bde2f.exe PID 4092 wrote to memory of 1816 4092 b75247013200d602f98dc3801d2bde2f.exe b75247013200d602f98dc3801d2bde2f.exe PID 4092 wrote to memory of 1816 4092 b75247013200d602f98dc3801d2bde2f.exe b75247013200d602f98dc3801d2bde2f.exe PID 4092 wrote to memory of 1816 4092 b75247013200d602f98dc3801d2bde2f.exe b75247013200d602f98dc3801d2bde2f.exe PID 4092 wrote to memory of 1816 4092 b75247013200d602f98dc3801d2bde2f.exe b75247013200d602f98dc3801d2bde2f.exe PID 4092 wrote to memory of 1816 4092 b75247013200d602f98dc3801d2bde2f.exe b75247013200d602f98dc3801d2bde2f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b75247013200d602f98dc3801d2bde2f.exe"C:\Users\Admin\AppData\Local\Temp\b75247013200d602f98dc3801d2bde2f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\b75247013200d602f98dc3801d2bde2f.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1816