Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
26-02-2021 11:32
Static task
static1
Behavioral task
behavioral1
Sample
scm928192.exe
Resource
win7v20201028
General
-
Target
scm928192.exe
-
Size
237KB
-
MD5
ea2aaf3a9a00cab64376035e9291c7cc
-
SHA1
28683f918a9c4195ff93ca2027642949444770c0
-
SHA256
7bd662ff22dd43bb8e23046925d83ae5125824776c6b4209cc50417205c91e6c
-
SHA512
aa50e615fb57b3ce1963b8cbdf1b561c15f72bef210e4f80e4854a98ecd4915c32636b139637c0d36b4b00e1cfbdd57418b5e2891916fb1ccc2d5ba167b4ca1d
Malware Config
Extracted
formbook
http://www.dopiel.com/s0ps/
vexura.com
xnl.xyz
lumpen.party
ourdatajourney.com
globalprofessionalsummit.com
wellnesspasssite.com
lafronteraradio.com
voterchallengeva.com
campanatv.com
militarychiro.com
cowbex.info
mosquitosolutionsalpha.com
healthykala.com
xmsealite.com
xn--ock1cjz.com
advocate-quota.com
karecfo.com
vettedwealthmanagement.com
everlein.com
lashundaclaiborn.com
globpyroclastic.com
arttemissellsaustin.com
niwghx.online
mississippiriverwood.com
natural-simplelavie.com
awecre.com
influencersdigest.com
expathotels.com
bonyadkeyhan.com
gatego.net
lostcitythrift.com
imagimindstudios.com
savantsio.com
yellowmeloon.com
littlebloomz.com
ekaurdo.com
nandagopanphotography.com
theconversion-blog.com
digitalfeedingsystems.com
faithfullyforward.today
athena.win
domentemenegi39.net
cianonsa.com
lamalikns.com
neonyang.net
danube-properties.com
limitlessunicorn.com
jaincouple.com
goldenbiscuitdogtreats.com
imtheonlyperson.network
3481579.xyz
thinkbiggerthinktank.com
citestaccnt1598532807.com
deshbari.com
lucklyvip.com
teamabllc.com
dirtypotato.party
wirelessmultisolution.com
masappil.com
elnoraadrienne.com
thegetweb.com
frideda.com
rechargegift.xyz
woodymchales.com
Signatures
-
Xloader Payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2004-5-0x0000000000550000-0x000000000058A000-memory.dmp xloader behavioral1/memory/2004-7-0x0000000000920000-0x0000000000949000-memory.dmp xloader behavioral1/memory/824-11-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/824-12-0x000000000041D000-mapping.dmp xloader behavioral1/memory/1924-19-0x0000000000080000-0x00000000000A8000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
scm928192.exesvchost.execmmon32.exedescription pid process target process PID 2004 set thread context of 824 2004 scm928192.exe svchost.exe PID 824 set thread context of 1304 824 svchost.exe Explorer.EXE PID 1924 set thread context of 1304 1924 cmmon32.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
svchost.execmmon32.exepid process 824 svchost.exe 824 svchost.exe 1924 cmmon32.exe 1924 cmmon32.exe 1924 cmmon32.exe 1924 cmmon32.exe 1924 cmmon32.exe 1924 cmmon32.exe 1924 cmmon32.exe 1924 cmmon32.exe 1924 cmmon32.exe 1924 cmmon32.exe 1924 cmmon32.exe 1924 cmmon32.exe 1924 cmmon32.exe 1924 cmmon32.exe 1924 cmmon32.exe 1924 cmmon32.exe 1924 cmmon32.exe 1924 cmmon32.exe 1924 cmmon32.exe 1924 cmmon32.exe 1924 cmmon32.exe 1924 cmmon32.exe 1924 cmmon32.exe 1924 cmmon32.exe 1924 cmmon32.exe 1924 cmmon32.exe 1924 cmmon32.exe 1924 cmmon32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
svchost.execmmon32.exepid process 824 svchost.exe 824 svchost.exe 824 svchost.exe 1924 cmmon32.exe 1924 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
svchost.execmmon32.exedescription pid process Token: SeDebugPrivilege 824 svchost.exe Token: SeDebugPrivilege 1924 cmmon32.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1304 Explorer.EXE 1304 Explorer.EXE 1304 Explorer.EXE 1304 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1304 Explorer.EXE 1304 Explorer.EXE 1304 Explorer.EXE 1304 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
scm928192.exeExplorer.EXEcmmon32.exedescription pid process target process PID 2004 wrote to memory of 824 2004 scm928192.exe svchost.exe PID 2004 wrote to memory of 824 2004 scm928192.exe svchost.exe PID 2004 wrote to memory of 824 2004 scm928192.exe svchost.exe PID 2004 wrote to memory of 824 2004 scm928192.exe svchost.exe PID 2004 wrote to memory of 824 2004 scm928192.exe svchost.exe PID 2004 wrote to memory of 824 2004 scm928192.exe svchost.exe PID 2004 wrote to memory of 824 2004 scm928192.exe svchost.exe PID 1304 wrote to memory of 1924 1304 Explorer.EXE cmmon32.exe PID 1304 wrote to memory of 1924 1304 Explorer.EXE cmmon32.exe PID 1304 wrote to memory of 1924 1304 Explorer.EXE cmmon32.exe PID 1304 wrote to memory of 1924 1304 Explorer.EXE cmmon32.exe PID 1924 wrote to memory of 972 1924 cmmon32.exe cmd.exe PID 1924 wrote to memory of 972 1924 cmmon32.exe cmd.exe PID 1924 wrote to memory of 972 1924 cmmon32.exe cmd.exe PID 1924 wrote to memory of 972 1924 cmmon32.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\scm928192.exe"C:\Users\Admin\AppData\Local\Temp\scm928192.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWow64\svchost.exe"C:\\Windows\\SysWow64\\svchost.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:824
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWow64\svchost.exe"3⤵PID:972
-
-