Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
20-04-2021 13:01
Static task
static1
Behavioral task
behavioral1
Sample
RE New order.exe
Resource
win7v20210408
General
-
Target
RE New order.exe
-
Size
774KB
-
MD5
752c086496f2301ef7e95cc0a710c786
-
SHA1
9cb8456136462d69dfd073b43707fa9eee7d09a7
-
SHA256
beb1862a3b194a840605b7f030f0285fff18fadfc4199c3da007f44b7ad19292
-
SHA512
d9a4a2bce07b613ce55f1cfe085faa5a1381cb0fb60f7d80c0eb7c279bbadb5e2f949adab5ed488ffaf238f5963b3978d4483bca40dac556ccb1aed4f2002a39
Malware Config
Extracted
xloader
2.3
http://www.mipecvinh-heritage.com/bfak/
beautifulhairbabe.com
smartlegal.info
posgradeadunica.com
suitefleetdms.com
dlxlcarbon.com
wongtangstore9.host
saintsimonsparkneighborhood.com
racevx.xyz
mooniswap.farm
healthymantra.store
igualandocaminos.com
eclecticblerd.com
reasonofsmilefoundation.com
thechallenge.party
smallbusinessesforgolden.com
yihuyifu.com
escalategear.com
lnanhhealthcareers.com
makeupkacie.com
gccrewauction.com
kcosmoprof.com
dreamfocuslove.com
smsstm.com
warwickhouseofpizzamenu.com
comfortplusindia.com
defiswaponline.com
soundbathclass.com
lazyfears.com
canopus-strategy.com
terreatoir.com
efficiencyexpertstt.com
environmentologyblog.com
ogdenbankruptcylawyer.com
9iyg.com
miawezon.com
anjuliesmusic.com
trucksinrochester.com
para-learning.com
1frivgames.com
citii-groupss.site
doesthecatdie.com
suckhoevangnvp.site
connectionsacademy.sucks
caminosviajeros.com
acadiananetwork.com
longlife.online
rattankw.com
campoyabolivia.com
mymindismyown.com
hansa-logistics.com
1transformationstation.com
prometheumcapital.com
artagayne.com
faneciecloset.com
tarynlaakso.com
jevcic.com
t2t-hprc-2020conference.com
arsitastudio.com
ahoradoacs.com
keyboarding-typing.com
acgtea.club
thehouseluxury.com
eatmybet.com
sakshamsacademy.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1464-125-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1464-126-0x000000000041D100-mapping.dmp xloader behavioral2/memory/2716-133-0x0000000000A60000-0x0000000000A89000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
RE New order.exeRE New order.execmstp.exedescription pid process target process PID 808 set thread context of 1464 808 RE New order.exe RE New order.exe PID 1464 set thread context of 3060 1464 RE New order.exe Explorer.EXE PID 2716 set thread context of 3060 2716 cmstp.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 46 IoCs
Processes:
RE New order.execmstp.exepid process 1464 RE New order.exe 1464 RE New order.exe 1464 RE New order.exe 1464 RE New order.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe 2716 cmstp.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3060 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
RE New order.execmstp.exepid process 1464 RE New order.exe 1464 RE New order.exe 1464 RE New order.exe 2716 cmstp.exe 2716 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
RE New order.execmstp.exedescription pid process Token: SeDebugPrivilege 1464 RE New order.exe Token: SeDebugPrivilege 2716 cmstp.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3060 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
RE New order.exeExplorer.EXEcmstp.exedescription pid process target process PID 808 wrote to memory of 1464 808 RE New order.exe RE New order.exe PID 808 wrote to memory of 1464 808 RE New order.exe RE New order.exe PID 808 wrote to memory of 1464 808 RE New order.exe RE New order.exe PID 808 wrote to memory of 1464 808 RE New order.exe RE New order.exe PID 808 wrote to memory of 1464 808 RE New order.exe RE New order.exe PID 808 wrote to memory of 1464 808 RE New order.exe RE New order.exe PID 3060 wrote to memory of 2716 3060 Explorer.EXE cmstp.exe PID 3060 wrote to memory of 2716 3060 Explorer.EXE cmstp.exe PID 3060 wrote to memory of 2716 3060 Explorer.EXE cmstp.exe PID 2716 wrote to memory of 1260 2716 cmstp.exe cmd.exe PID 2716 wrote to memory of 1260 2716 cmstp.exe cmd.exe PID 2716 wrote to memory of 1260 2716 cmstp.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\RE New order.exe"C:\Users\Admin\AppData\Local\Temp\RE New order.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\RE New order.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1464
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\RE New order.exe"3⤵PID:1260
-
-