Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
26-02-2021 06:43
Static task
static1
Behavioral task
behavioral1
Sample
RAQ11986.exe
Resource
win7v20201028
General
-
Target
RAQ11986.exe
-
Size
361KB
-
MD5
725cb0465119c2d5cc1412e3d555ad04
-
SHA1
d6623ecd4f819c1597392fe423d41be071a000e1
-
SHA256
b32d120bf6320cf1d2d2223ad2a797eb0c20efceb12bd0655642387452ef3b6e
-
SHA512
4b9c8d288433d18be705099752bff38020c99b5496ce66e0a2cfeb99195840c9911f9b871620abb6219a873f05c2efb4b11507db6be386ba0639e545e3d53ae6
Malware Config
Extracted
formbook
http://www.wissinkadams.com/iae2/
mainstreetswimschool.com
nhadat9chu.com
guidedcommercialloan.com
quandd.site
smittysfrontlinecarriers.com
hmas-vibrant.com
pakunok.net
jiffihosting.com
shopping-container.com
quartiercreole.net
weebflix.com
gringomexico.com
whathappensnextin6minutes.com
patchealth.com
exclusivelymarissa.com
my-glp.com
trgtbk.com
sagefemmecaluire.com
fetaldiagnosislaboratorios.com
aniversariocom-presente12.com
bharatiyacraft.com
californialp.com
covidvirusbellcurve.com
footecs.com
africabiocity.com
nano-gizmo.com
nanotradefx.com
tessalateconsulting.com
lvlyourlife.com
azhello.com
theobxdirectory.com
wuqingsong.club
indiaonyourown.com
prepa-tests.com
theroyalsoft.com
femalevegan.com
angelises.com
mysqltosnowflake.com
myworldrealtors.com
krispychix.com
kfs.ltd
modifiedbots.com
les-kappes.net
yamlperf.com
52xianju.com
whatsmodish.com
assessoriasanntacfi.com
crazyontheflavor.com
homeownerdefenders.net
highcare.store
maglex.info
listvennica-market.com
discbrakepart.com
hoa142.com
westtexasweddingvideography.com
diplomadoenturismoderomance.com
avshijia9.com
satyam-group.com
corpclubperu.net
lvnwtr.com
italiandreamweddings.com
shiyusupplychain.com
neversprayedfoods.com
truckrev.com
Signatures
-
Beds Protector Packer 1 IoCs
Detects Beds Protector packer used to load .NET malware.
Processes:
resource yara_rule behavioral2/memory/4756-5-0x0000000004DA0000-0x0000000004DF9000-memory.dmp beds_protector -
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3236-12-0x000000000041D0D0-mapping.dmp xloader behavioral2/memory/3236-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/704-21-0x0000000002AA0000-0x0000000002AC9000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
Processes:
RAQ11986.exeRAQ11986.execontrol.exedescription pid process target process PID 4756 set thread context of 3236 4756 RAQ11986.exe RAQ11986.exe PID 3236 set thread context of 3012 3236 RAQ11986.exe Explorer.EXE PID 3236 set thread context of 3012 3236 RAQ11986.exe Explorer.EXE PID 704 set thread context of 3012 704 control.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
RAQ11986.exeRAQ11986.execontrol.exepid process 4756 RAQ11986.exe 4756 RAQ11986.exe 4756 RAQ11986.exe 4756 RAQ11986.exe 3236 RAQ11986.exe 3236 RAQ11986.exe 3236 RAQ11986.exe 3236 RAQ11986.exe 3236 RAQ11986.exe 3236 RAQ11986.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe 704 control.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
RAQ11986.execontrol.exepid process 3236 RAQ11986.exe 3236 RAQ11986.exe 3236 RAQ11986.exe 3236 RAQ11986.exe 704 control.exe 704 control.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
Processes:
RAQ11986.exeRAQ11986.execontrol.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 4756 RAQ11986.exe Token: SeDebugPrivilege 3236 RAQ11986.exe Token: SeDebugPrivilege 704 control.exe Token: SeShutdownPrivilege 3012 Explorer.EXE Token: SeCreatePagefilePrivilege 3012 Explorer.EXE Token: SeShutdownPrivilege 3012 Explorer.EXE Token: SeCreatePagefilePrivilege 3012 Explorer.EXE Token: SeShutdownPrivilege 3012 Explorer.EXE Token: SeCreatePagefilePrivilege 3012 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
RAQ11986.exeRAQ11986.execontrol.exedescription pid process target process PID 4756 wrote to memory of 4264 4756 RAQ11986.exe RAQ11986.exe PID 4756 wrote to memory of 4264 4756 RAQ11986.exe RAQ11986.exe PID 4756 wrote to memory of 4264 4756 RAQ11986.exe RAQ11986.exe PID 4756 wrote to memory of 4376 4756 RAQ11986.exe RAQ11986.exe PID 4756 wrote to memory of 4376 4756 RAQ11986.exe RAQ11986.exe PID 4756 wrote to memory of 4376 4756 RAQ11986.exe RAQ11986.exe PID 4756 wrote to memory of 3236 4756 RAQ11986.exe RAQ11986.exe PID 4756 wrote to memory of 3236 4756 RAQ11986.exe RAQ11986.exe PID 4756 wrote to memory of 3236 4756 RAQ11986.exe RAQ11986.exe PID 4756 wrote to memory of 3236 4756 RAQ11986.exe RAQ11986.exe PID 4756 wrote to memory of 3236 4756 RAQ11986.exe RAQ11986.exe PID 4756 wrote to memory of 3236 4756 RAQ11986.exe RAQ11986.exe PID 3236 wrote to memory of 704 3236 RAQ11986.exe control.exe PID 3236 wrote to memory of 704 3236 RAQ11986.exe control.exe PID 3236 wrote to memory of 704 3236 RAQ11986.exe control.exe PID 704 wrote to memory of 1128 704 control.exe cmd.exe PID 704 wrote to memory of 1128 704 control.exe cmd.exe PID 704 wrote to memory of 1128 704 control.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\RAQ11986.exe"C:\Users\Admin\AppData\Local\Temp\RAQ11986.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\RAQ11986.exe"C:\Users\Admin\AppData\Local\Temp\RAQ11986.exe"3⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\RAQ11986.exe"C:\Users\Admin\AppData\Local\Temp\RAQ11986.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\RAQ11986.exe"5⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\RAQ11986.exe"C:\Users\Admin\AppData\Local\Temp\RAQ11986.exe"3⤵PID:4376
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/704-24-0x0000000004270000-0x00000000042FF000-memory.dmpFilesize
572KB
-
memory/704-23-0x0000000004510000-0x0000000004830000-memory.dmpFilesize
3.1MB
-
memory/704-20-0x0000000000230000-0x0000000000250000-memory.dmpFilesize
128KB
-
memory/704-21-0x0000000002AA0000-0x0000000002AC9000-memory.dmpFilesize
164KB
-
memory/704-19-0x0000000000000000-mapping.dmp
-
memory/1128-22-0x0000000000000000-mapping.dmp
-
memory/3012-16-0x00000000058F0000-0x0000000005A96000-memory.dmpFilesize
1.6MB
-
memory/3012-25-0x00000000030E0000-0x0000000003179000-memory.dmpFilesize
612KB
-
memory/3012-18-0x00000000065E0000-0x00000000066F9000-memory.dmpFilesize
1.1MB
-
memory/3236-14-0x00000000010B0000-0x00000000013D0000-memory.dmpFilesize
3.1MB
-
memory/3236-11-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3236-15-0x00000000007F0000-0x0000000000800000-memory.dmpFilesize
64KB
-
memory/3236-17-0x0000000000B60000-0x0000000000B70000-memory.dmpFilesize
64KB
-
memory/3236-12-0x000000000041D0D0-mapping.dmp
-
memory/4756-2-0x0000000073150000-0x000000007383E000-memory.dmpFilesize
6.9MB
-
memory/4756-9-0x0000000000E50000-0x0000000000E51000-memory.dmpFilesize
4KB
-
memory/4756-10-0x0000000004E20000-0x0000000004E2F000-memory.dmpFilesize
60KB
-
memory/4756-8-0x0000000004F80000-0x0000000004F81000-memory.dmpFilesize
4KB
-
memory/4756-7-0x0000000005480000-0x0000000005481000-memory.dmpFilesize
4KB
-
memory/4756-6-0x0000000004EE0000-0x0000000004EE1000-memory.dmpFilesize
4KB
-
memory/4756-5-0x0000000004DA0000-0x0000000004DF9000-memory.dmpFilesize
356KB
-
memory/4756-3-0x0000000000510000-0x0000000000511000-memory.dmpFilesize
4KB