Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
27-07-2021 16:03
Static task
static1
Behavioral task
behavioral1
Sample
Order_15078.exe
Resource
win7v20210408
General
-
Target
Order_15078.exe
-
Size
685KB
-
MD5
c50b491461d89171d660abcc9c654171
-
SHA1
e1cc6e9512546b2a8eefd3741f52c30121be3dea
-
SHA256
6db6324fe282260a224e77fff9bdad3240a63d48ac587f2a701785ea69c317a5
-
SHA512
7589ece7798fa6affec99655d301cb23acd8a25654c0411ad6e871247a24b31653ea8b6249b6440124acb5fad5f390f73e8cbb7ee76be1970ee12f4ad27e52e0
Malware Config
Extracted
xloader
2.3
http://www.steveblexrud.com/rqe8/
bjft.net
abrosnm3.com
badlistens.com
signal-japan.com
schaka.com
kingdompersonalbranding.com
sewmenship.com
lzproperty.com
mojoimpacthosting.com
carinsurancecoverage.care
corporatemercadona.com
mobileswash.com
forevercelebration2026.com
co-het.com
bellesherlou.com
commentsoldgolf.com
onlytwod.group
utesco.info
martstrip.com
onszdgu.icu
progress-ai.com
flood-pictures.com
theyerpa.com
roicjhy.icu
have-boyscout-yg.com
neosimplerack.com
foofloin.com
nielsentrust.com
digitalwt.com
astaxanthinsaveme.com
hashseries.com
asesoriasyh.com
sun5new.com
domain-here.com
joshuasklarvoices.com
thecoregr.com
dreamstatebedding.com
archostekton.com
10612crestondr.com
wallfeez.com
azamdairy.com
allied-products.com
jingxinlt.com
sometingwild.com
timhafun.net
meesowell.com
betteryou999.com
theslut.net
lifewithken.com
workhardrrhh.com
meatbeoff.com
influencerflywheel.com
qzzstz.com
toewsontherun.com
esperienzahotels.com
codemybm.com
medanchess.com
greenfeltfox.com
towinggodfreyil.net
gamersgangbd.com
move-views.com
spezialitat.com
dreammyteepe.com
sheltoncannabis.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
Processes:
resource yara_rule behavioral1/memory/1848-63-0x00000000001D0000-0x00000000001DB000-memory.dmp CustAttr -
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1692-67-0x000000000041CFE0-mapping.dmp xloader behavioral1/memory/1692-66-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/440-75-0x0000000000080000-0x00000000000A8000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 348 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
Order_15078.exeOrder_15078.exewlanext.exedescription pid process target process PID 1848 set thread context of 1692 1848 Order_15078.exe Order_15078.exe PID 1692 set thread context of 1200 1692 Order_15078.exe Explorer.EXE PID 1692 set thread context of 1200 1692 Order_15078.exe Explorer.EXE PID 440 set thread context of 1200 440 wlanext.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
Order_15078.exewlanext.exepid process 1692 Order_15078.exe 1692 Order_15078.exe 1692 Order_15078.exe 440 wlanext.exe 440 wlanext.exe 440 wlanext.exe 440 wlanext.exe 440 wlanext.exe 440 wlanext.exe 440 wlanext.exe 440 wlanext.exe 440 wlanext.exe 440 wlanext.exe 440 wlanext.exe 440 wlanext.exe 440 wlanext.exe 440 wlanext.exe 440 wlanext.exe 440 wlanext.exe 440 wlanext.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
Order_15078.exewlanext.exepid process 1692 Order_15078.exe 1692 Order_15078.exe 1692 Order_15078.exe 1692 Order_15078.exe 440 wlanext.exe 440 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Order_15078.exewlanext.exedescription pid process Token: SeDebugPrivilege 1692 Order_15078.exe Token: SeDebugPrivilege 440 wlanext.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Order_15078.exeOrder_15078.exewlanext.exedescription pid process target process PID 1848 wrote to memory of 1692 1848 Order_15078.exe Order_15078.exe PID 1848 wrote to memory of 1692 1848 Order_15078.exe Order_15078.exe PID 1848 wrote to memory of 1692 1848 Order_15078.exe Order_15078.exe PID 1848 wrote to memory of 1692 1848 Order_15078.exe Order_15078.exe PID 1848 wrote to memory of 1692 1848 Order_15078.exe Order_15078.exe PID 1848 wrote to memory of 1692 1848 Order_15078.exe Order_15078.exe PID 1848 wrote to memory of 1692 1848 Order_15078.exe Order_15078.exe PID 1692 wrote to memory of 440 1692 Order_15078.exe wlanext.exe PID 1692 wrote to memory of 440 1692 Order_15078.exe wlanext.exe PID 1692 wrote to memory of 440 1692 Order_15078.exe wlanext.exe PID 1692 wrote to memory of 440 1692 Order_15078.exe wlanext.exe PID 440 wrote to memory of 348 440 wlanext.exe cmd.exe PID 440 wrote to memory of 348 440 wlanext.exe cmd.exe PID 440 wrote to memory of 348 440 wlanext.exe cmd.exe PID 440 wrote to memory of 348 440 wlanext.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\Order_15078.exe"C:\Users\Admin\AppData\Local\Temp\Order_15078.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Order_15078.exe"C:\Users\Admin\AppData\Local\Temp\Order_15078.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Order_15078.exe"5⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/348-77-0x0000000000000000-mapping.dmp
-
memory/440-78-0x0000000001D40000-0x0000000001DCF000-memory.dmpFilesize
572KB
-
memory/440-76-0x0000000001F80000-0x0000000002283000-memory.dmpFilesize
3.0MB
-
memory/440-74-0x00000000000F0000-0x0000000000106000-memory.dmpFilesize
88KB
-
memory/440-75-0x0000000000080000-0x00000000000A8000-memory.dmpFilesize
160KB
-
memory/440-73-0x0000000000000000-mapping.dmp
-
memory/1200-70-0x0000000004AF0000-0x0000000004C10000-memory.dmpFilesize
1.1MB
-
memory/1200-79-0x0000000009190000-0x0000000009308000-memory.dmpFilesize
1.5MB
-
memory/1200-72-0x00000000044E0000-0x0000000004598000-memory.dmpFilesize
736KB
-
memory/1692-69-0x0000000000120000-0x0000000000130000-memory.dmpFilesize
64KB
-
memory/1692-71-0x0000000000160000-0x0000000000170000-memory.dmpFilesize
64KB
-
memory/1692-68-0x0000000000B90000-0x0000000000E93000-memory.dmpFilesize
3.0MB
-
memory/1692-66-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1692-67-0x000000000041CFE0-mapping.dmp
-
memory/1848-60-0x0000000000940000-0x0000000000941000-memory.dmpFilesize
4KB
-
memory/1848-65-0x0000000000570000-0x000000000059F000-memory.dmpFilesize
188KB
-
memory/1848-64-0x0000000008000000-0x0000000008072000-memory.dmpFilesize
456KB
-
memory/1848-63-0x00000000001D0000-0x00000000001DB000-memory.dmpFilesize
44KB
-
memory/1848-62-0x00000000005A0000-0x00000000005A1000-memory.dmpFilesize
4KB