Analysis
-
max time kernel
151s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
20-04-2021 06:04
Static task
static1
Behavioral task
behavioral1
Sample
Bank Details.exe
Resource
win7v20210410
General
-
Target
Bank Details.exe
-
Size
1.1MB
-
MD5
bfb651eda6ae35c7faf71897ea5957fe
-
SHA1
53b0a31eda2c480b1c193a318a69a00a619ff071
-
SHA256
67ad3d12a1b7bbca0e3f0d809156aaf250cde5ea7e626d32787670e6358a9b85
-
SHA512
4d5e0ce641ba73eed1132a19726e3843f042effab62c912823c35ffd071cfc4f26c52c8023187c431c83989d1d278fa618a621088d8327b8ed952cc9d2ddace8
Malware Config
Extracted
xloader
2.3
http://www.baseballisland.com/oop8/
beidafu.net
negociosejogos.com
operation-eskimo.wtf
construccionesap.com
pitpi.net
indasc.com
kunleizz.com
dichvusocial.net
xn--80azfm8d.net
radfw.com
rahmatdigitalpro.online
osswestpoint.com
suelorefrigerante.com
cantevencandles.com
markdicas.com
thasaas.com
stclairneighbourrep.com
wzbtlm.com
clinicointegralbcn.info
lactpeel-konyu.club
prasadmadv.info
berbens.com
eric-mathieu.com
baldizbalkonda.com
baransuaritma.com
whatareyoulookingfor.info
bkadvisor.solutions
subsoloart.com
vearteq.com
charliekidswear.com
oknamovies.com
holy-academy.com
oceaniacoconuts.com
digitalprintbook.com
sneeson.com
barochia.xyz
pascoexplorers.net
oilsuite.com
craveableweed.com
manongioalaha.com
americaradioshow.com
fleybo.com
sebicoin.net
zipreps.com
baythemoon.com
ivygcollection.com
bestcbdhempgrower.com
qqsgbtnny.icu
thedowscones.com
gutterklean.com
hempiscottonsdaddy.com
tomoward.com
moojeb.com
refrigeratorrepairinhialeah.com
castalandgroup.com
thegati.com
glenr0y.com
twochildhood.com
digitalmarketingmoves.com
poolandspaexpress.com
kuppers.info
alllivesport.com
flaviestyle.com
jordihako.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3396-126-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/3396-127-0x000000000041D040-mapping.dmp xloader behavioral2/memory/1536-134-0x0000000000E10000-0x0000000000E38000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Bank Details.exeBank Details.execolorcpl.exedescription pid process target process PID 996 set thread context of 3396 996 Bank Details.exe Bank Details.exe PID 3396 set thread context of 2180 3396 Bank Details.exe Explorer.EXE PID 1536 set thread context of 2180 1536 colorcpl.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
Bank Details.exeBank Details.execolorcpl.exepid process 996 Bank Details.exe 996 Bank Details.exe 996 Bank Details.exe 3396 Bank Details.exe 3396 Bank Details.exe 3396 Bank Details.exe 3396 Bank Details.exe 1536 colorcpl.exe 1536 colorcpl.exe 1536 colorcpl.exe 1536 colorcpl.exe 1536 colorcpl.exe 1536 colorcpl.exe 1536 colorcpl.exe 1536 colorcpl.exe 1536 colorcpl.exe 1536 colorcpl.exe 1536 colorcpl.exe 1536 colorcpl.exe 1536 colorcpl.exe 1536 colorcpl.exe 1536 colorcpl.exe 1536 colorcpl.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Bank Details.execolorcpl.exepid process 3396 Bank Details.exe 3396 Bank Details.exe 3396 Bank Details.exe 1536 colorcpl.exe 1536 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Bank Details.exeBank Details.execolorcpl.exedescription pid process Token: SeDebugPrivilege 996 Bank Details.exe Token: SeDebugPrivilege 3396 Bank Details.exe Token: SeDebugPrivilege 1536 colorcpl.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Bank Details.exeExplorer.EXEcolorcpl.exedescription pid process target process PID 996 wrote to memory of 3396 996 Bank Details.exe Bank Details.exe PID 996 wrote to memory of 3396 996 Bank Details.exe Bank Details.exe PID 996 wrote to memory of 3396 996 Bank Details.exe Bank Details.exe PID 996 wrote to memory of 3396 996 Bank Details.exe Bank Details.exe PID 996 wrote to memory of 3396 996 Bank Details.exe Bank Details.exe PID 996 wrote to memory of 3396 996 Bank Details.exe Bank Details.exe PID 2180 wrote to memory of 1536 2180 Explorer.EXE colorcpl.exe PID 2180 wrote to memory of 1536 2180 Explorer.EXE colorcpl.exe PID 2180 wrote to memory of 1536 2180 Explorer.EXE colorcpl.exe PID 1536 wrote to memory of 1648 1536 colorcpl.exe cmd.exe PID 1536 wrote to memory of 1648 1536 colorcpl.exe cmd.exe PID 1536 wrote to memory of 1648 1536 colorcpl.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\Bank Details.exe"C:\Users\Admin\AppData\Local\Temp\Bank Details.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Users\Admin\AppData\Local\Temp\Bank Details.exe"C:\Users\Admin\AppData\Local\Temp\Bank Details.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3396
-
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Bank Details.exe"3⤵PID:1648
-
-