Analysis
-
max time kernel
124s -
max time network
125s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
21-01-2021 18:29
Static task
static1
Behavioral task
behavioral1
Sample
e09bd175e140134c2d836a8c422bb3eb.exe
Resource
win7v20201028
General
-
Target
e09bd175e140134c2d836a8c422bb3eb.exe
-
Size
1.0MB
-
MD5
e09bd175e140134c2d836a8c422bb3eb
-
SHA1
a601aaaf82eb6cf0263152f6ad97a2b810924733
-
SHA256
7d47ed47853921d8afd5b66c6305421eb80b582d6e47706602d52ee367496cc1
-
SHA512
bda9f748a764db3e738e9026f364566f0dfb5e2eb34b63a52438fb021b0843c51bb95ca8196149bf4d40d6a78e90d7ff55d0c536b998625cd7cc0ddacd701fcf
Malware Config
Extracted
formbook
http://www.bodyfuelrtd.com/8rg4/
fakecostasunglasses.com
twinbrothers.pizza
jizhoujsp.com
qscrit.com
hotelmanise.com
fer-ua.online
europserver-simcloud.systems
redwap2.pro
betwalkoffame.com
latashalovemillionaire.com
8million-lr.com
tomatrader.com
modaluxcutabovefitness.com
shishijiazu.com
cckytx.com
reversehomeloansmiami.com
imaginenationnetwork.com
thecyclistshop.com
jorgegiljewelry.com
hlaprotiens.com
biblecourt.com
puzelhome.com
musicbychristina.com
iregentos.info
ephwehemeral.com
qubeeva.com
healingwithkarlee.com
giftasmile2day.com
ondesign03.net
argusproductionsus.com
tootleshook.com
sukien-freefire12.com
windmaske.com
futbolclubbarcelona.soccer
veteransc60.com
steambackpacktrade.info
zingnation.com
myfoodworldcup.com
playitaintso.net
crafteest.com
deutschekorrosionsschutz.net
streamcommunitty.com
gatehess.com
hechoenvegas.net
4037a.com
santanabeautycares.com
100feetpics.com
johnsroadantiques.com
improve-climbing.com
18shuwu.net
amazon-support-recovery.com
vibrarecovery.com
deskdonors.info
triagggroup.com
probysweden.com
helloinward.com
vvardown.com
kicksends.com
alwayadopt.com
modernappsllc.com
itswooby.com
med.vegas
chadwestconsulting.com
africanosworld.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4040-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/4040-13-0x000000000041D070-mapping.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
e09bd175e140134c2d836a8c422bb3eb.exedescription pid process target process PID 580 set thread context of 4040 580 e09bd175e140134c2d836a8c422bb3eb.exe e09bd175e140134c2d836a8c422bb3eb.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
e09bd175e140134c2d836a8c422bb3eb.exepid process 4040 e09bd175e140134c2d836a8c422bb3eb.exe 4040 e09bd175e140134c2d836a8c422bb3eb.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
e09bd175e140134c2d836a8c422bb3eb.exedescription pid process target process PID 580 wrote to memory of 4040 580 e09bd175e140134c2d836a8c422bb3eb.exe e09bd175e140134c2d836a8c422bb3eb.exe PID 580 wrote to memory of 4040 580 e09bd175e140134c2d836a8c422bb3eb.exe e09bd175e140134c2d836a8c422bb3eb.exe PID 580 wrote to memory of 4040 580 e09bd175e140134c2d836a8c422bb3eb.exe e09bd175e140134c2d836a8c422bb3eb.exe PID 580 wrote to memory of 4040 580 e09bd175e140134c2d836a8c422bb3eb.exe e09bd175e140134c2d836a8c422bb3eb.exe PID 580 wrote to memory of 4040 580 e09bd175e140134c2d836a8c422bb3eb.exe e09bd175e140134c2d836a8c422bb3eb.exe PID 580 wrote to memory of 4040 580 e09bd175e140134c2d836a8c422bb3eb.exe e09bd175e140134c2d836a8c422bb3eb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e09bd175e140134c2d836a8c422bb3eb.exe"C:\Users\Admin\AppData\Local\Temp\e09bd175e140134c2d836a8c422bb3eb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e09bd175e140134c2d836a8c422bb3eb.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/580-2-0x0000000073E00000-0x00000000744EE000-memory.dmpFilesize
6.9MB
-
memory/580-3-0x0000000000610000-0x0000000000611000-memory.dmpFilesize
4KB
-
memory/580-5-0x0000000005490000-0x0000000005491000-memory.dmpFilesize
4KB
-
memory/580-6-0x0000000005030000-0x0000000005031000-memory.dmpFilesize
4KB
-
memory/580-7-0x0000000004F40000-0x0000000004F41000-memory.dmpFilesize
4KB
-
memory/580-8-0x0000000005230000-0x0000000005231000-memory.dmpFilesize
4KB
-
memory/580-9-0x0000000005020000-0x000000000502E000-memory.dmpFilesize
56KB
-
memory/580-10-0x0000000007420000-0x00000000074A3000-memory.dmpFilesize
524KB
-
memory/580-11-0x0000000007550000-0x0000000007551000-memory.dmpFilesize
4KB
-
memory/4040-12-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/4040-13-0x000000000041D070-mapping.dmp
-
memory/4040-15-0x00000000010A0000-0x00000000013C0000-memory.dmpFilesize
3.1MB