Analysis
-
max time kernel
151s -
max time network
144s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
26-02-2021 06:43
Static task
static1
Behavioral task
behavioral1
Sample
RAQ11986.exe
Resource
win7v20201028
General
-
Target
RAQ11986.exe
-
Size
361KB
-
MD5
725cb0465119c2d5cc1412e3d555ad04
-
SHA1
d6623ecd4f819c1597392fe423d41be071a000e1
-
SHA256
b32d120bf6320cf1d2d2223ad2a797eb0c20efceb12bd0655642387452ef3b6e
-
SHA512
4b9c8d288433d18be705099752bff38020c99b5496ce66e0a2cfeb99195840c9911f9b871620abb6219a873f05c2efb4b11507db6be386ba0639e545e3d53ae6
Malware Config
Extracted
formbook
http://www.wissinkadams.com/iae2/
mainstreetswimschool.com
nhadat9chu.com
guidedcommercialloan.com
quandd.site
smittysfrontlinecarriers.com
hmas-vibrant.com
pakunok.net
jiffihosting.com
shopping-container.com
quartiercreole.net
weebflix.com
gringomexico.com
whathappensnextin6minutes.com
patchealth.com
exclusivelymarissa.com
my-glp.com
trgtbk.com
sagefemmecaluire.com
fetaldiagnosislaboratorios.com
aniversariocom-presente12.com
bharatiyacraft.com
californialp.com
covidvirusbellcurve.com
footecs.com
africabiocity.com
nano-gizmo.com
nanotradefx.com
tessalateconsulting.com
lvlyourlife.com
azhello.com
theobxdirectory.com
wuqingsong.club
indiaonyourown.com
prepa-tests.com
theroyalsoft.com
femalevegan.com
angelises.com
mysqltosnowflake.com
myworldrealtors.com
krispychix.com
kfs.ltd
modifiedbots.com
les-kappes.net
yamlperf.com
52xianju.com
whatsmodish.com
assessoriasanntacfi.com
crazyontheflavor.com
homeownerdefenders.net
highcare.store
maglex.info
listvennica-market.com
discbrakepart.com
hoa142.com
westtexasweddingvideography.com
diplomadoenturismoderomance.com
avshijia9.com
satyam-group.com
corpclubperu.net
lvnwtr.com
italiandreamweddings.com
shiyusupplychain.com
neversprayedfoods.com
truckrev.com
Signatures
-
Beds Protector Packer 1 IoCs
Detects Beds Protector packer used to load .NET malware.
Processes:
resource yara_rule behavioral1/memory/1076-6-0x0000000001F70000-0x0000000001FC9000-memory.dmp beds_protector -
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2036-8-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2036-9-0x000000000041D0D0-mapping.dmp xloader behavioral1/memory/1220-19-0x00000000000C0000-0x00000000000E9000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1496 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
RAQ11986.exeRAQ11986.exehelp.exedescription pid process target process PID 1076 set thread context of 2036 1076 RAQ11986.exe RAQ11986.exe PID 2036 set thread context of 1236 2036 RAQ11986.exe Explorer.EXE PID 2036 set thread context of 1236 2036 RAQ11986.exe Explorer.EXE PID 1220 set thread context of 1236 1220 help.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
RAQ11986.exehelp.exepid process 2036 RAQ11986.exe 2036 RAQ11986.exe 2036 RAQ11986.exe 1220 help.exe 1220 help.exe 1220 help.exe 1220 help.exe 1220 help.exe 1220 help.exe 1220 help.exe 1220 help.exe 1220 help.exe 1220 help.exe 1220 help.exe 1220 help.exe 1220 help.exe 1220 help.exe 1220 help.exe 1220 help.exe 1220 help.exe 1220 help.exe 1220 help.exe 1220 help.exe 1220 help.exe 1220 help.exe 1220 help.exe 1220 help.exe 1220 help.exe 1220 help.exe 1220 help.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
RAQ11986.exehelp.exepid process 2036 RAQ11986.exe 2036 RAQ11986.exe 2036 RAQ11986.exe 2036 RAQ11986.exe 1220 help.exe 1220 help.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
RAQ11986.exehelp.exedescription pid process Token: SeDebugPrivilege 2036 RAQ11986.exe Token: SeDebugPrivilege 1220 help.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE 1236 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
RAQ11986.exeExplorer.EXEhelp.exedescription pid process target process PID 1076 wrote to memory of 2036 1076 RAQ11986.exe RAQ11986.exe PID 1076 wrote to memory of 2036 1076 RAQ11986.exe RAQ11986.exe PID 1076 wrote to memory of 2036 1076 RAQ11986.exe RAQ11986.exe PID 1076 wrote to memory of 2036 1076 RAQ11986.exe RAQ11986.exe PID 1076 wrote to memory of 2036 1076 RAQ11986.exe RAQ11986.exe PID 1076 wrote to memory of 2036 1076 RAQ11986.exe RAQ11986.exe PID 1076 wrote to memory of 2036 1076 RAQ11986.exe RAQ11986.exe PID 1236 wrote to memory of 1220 1236 Explorer.EXE help.exe PID 1236 wrote to memory of 1220 1236 Explorer.EXE help.exe PID 1236 wrote to memory of 1220 1236 Explorer.EXE help.exe PID 1236 wrote to memory of 1220 1236 Explorer.EXE help.exe PID 1220 wrote to memory of 1496 1220 help.exe cmd.exe PID 1220 wrote to memory of 1496 1220 help.exe cmd.exe PID 1220 wrote to memory of 1496 1220 help.exe cmd.exe PID 1220 wrote to memory of 1496 1220 help.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RAQ11986.exe"C:\Users\Admin\AppData\Local\Temp\RAQ11986.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\RAQ11986.exe"C:\Users\Admin\AppData\Local\Temp\RAQ11986.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\RAQ11986.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1076-2-0x0000000074660000-0x0000000074D4E000-memory.dmpFilesize
6.9MB
-
memory/1076-3-0x0000000000050000-0x0000000000051000-memory.dmpFilesize
4KB
-
memory/1076-5-0x0000000004900000-0x0000000004901000-memory.dmpFilesize
4KB
-
memory/1076-6-0x0000000001F70000-0x0000000001FC9000-memory.dmpFilesize
356KB
-
memory/1076-7-0x0000000000480000-0x000000000048F000-memory.dmpFilesize
60KB
-
memory/1220-16-0x0000000000000000-mapping.dmp
-
memory/1220-19-0x00000000000C0000-0x00000000000E9000-memory.dmpFilesize
164KB
-
memory/1220-21-0x00000000003F0000-0x000000000047F000-memory.dmpFilesize
572KB
-
memory/1220-18-0x0000000000A40000-0x0000000000A46000-memory.dmpFilesize
24KB
-
memory/1220-20-0x0000000000A50000-0x0000000000D53000-memory.dmpFilesize
3.0MB
-
memory/1236-13-0x00000000061B0000-0x00000000062CF000-memory.dmpFilesize
1.1MB
-
memory/1236-15-0x00000000048B0000-0x0000000004967000-memory.dmpFilesize
732KB
-
memory/1236-22-0x0000000004A30000-0x0000000004B07000-memory.dmpFilesize
860KB
-
memory/1496-17-0x0000000000000000-mapping.dmp
-
memory/2036-8-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2036-14-0x0000000000280000-0x0000000000290000-memory.dmpFilesize
64KB
-
memory/2036-9-0x000000000041D0D0-mapping.dmp
-
memory/2036-12-0x00000000000E0000-0x00000000000F0000-memory.dmpFilesize
64KB
-
memory/2036-11-0x0000000000820000-0x0000000000B23000-memory.dmpFilesize
3.0MB