Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
27-07-2021 16:03
Static task
static1
Behavioral task
behavioral1
Sample
Order_15078.exe
Resource
win7v20210408
General
-
Target
Order_15078.exe
-
Size
685KB
-
MD5
c50b491461d89171d660abcc9c654171
-
SHA1
e1cc6e9512546b2a8eefd3741f52c30121be3dea
-
SHA256
6db6324fe282260a224e77fff9bdad3240a63d48ac587f2a701785ea69c317a5
-
SHA512
7589ece7798fa6affec99655d301cb23acd8a25654c0411ad6e871247a24b31653ea8b6249b6440124acb5fad5f390f73e8cbb7ee76be1970ee12f4ad27e52e0
Malware Config
Extracted
xloader
2.3
http://www.steveblexrud.com/rqe8/
bjft.net
abrosnm3.com
badlistens.com
signal-japan.com
schaka.com
kingdompersonalbranding.com
sewmenship.com
lzproperty.com
mojoimpacthosting.com
carinsurancecoverage.care
corporatemercadona.com
mobileswash.com
forevercelebration2026.com
co-het.com
bellesherlou.com
commentsoldgolf.com
onlytwod.group
utesco.info
martstrip.com
onszdgu.icu
progress-ai.com
flood-pictures.com
theyerpa.com
roicjhy.icu
have-boyscout-yg.com
neosimplerack.com
foofloin.com
nielsentrust.com
digitalwt.com
astaxanthinsaveme.com
hashseries.com
asesoriasyh.com
sun5new.com
domain-here.com
joshuasklarvoices.com
thecoregr.com
dreamstatebedding.com
archostekton.com
10612crestondr.com
wallfeez.com
azamdairy.com
allied-products.com
jingxinlt.com
sometingwild.com
timhafun.net
meesowell.com
betteryou999.com
theslut.net
lifewithken.com
workhardrrhh.com
meatbeoff.com
influencerflywheel.com
qzzstz.com
toewsontherun.com
esperienzahotels.com
codemybm.com
medanchess.com
greenfeltfox.com
towinggodfreyil.net
gamersgangbd.com
move-views.com
spezialitat.com
dreammyteepe.com
sheltoncannabis.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
Processes:
resource yara_rule behavioral2/memory/3916-121-0x0000000007370000-0x000000000737B000-memory.dmp CustAttr -
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2036-124-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/2036-125-0x000000000041CFE0-mapping.dmp xloader behavioral2/memory/1344-131-0x0000000000A50000-0x0000000000A78000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Order_15078.exeOrder_15078.exewlanext.exedescription pid process target process PID 3916 set thread context of 2036 3916 Order_15078.exe Order_15078.exe PID 2036 set thread context of 3052 2036 Order_15078.exe Explorer.EXE PID 1344 set thread context of 3052 1344 wlanext.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 44 IoCs
Processes:
Order_15078.exewlanext.exepid process 2036 Order_15078.exe 2036 Order_15078.exe 2036 Order_15078.exe 2036 Order_15078.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe 1344 wlanext.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3052 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Order_15078.exewlanext.exepid process 2036 Order_15078.exe 2036 Order_15078.exe 2036 Order_15078.exe 1344 wlanext.exe 1344 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Order_15078.exewlanext.exedescription pid process Token: SeDebugPrivilege 2036 Order_15078.exe Token: SeDebugPrivilege 1344 wlanext.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3052 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Order_15078.exeExplorer.EXEwlanext.exedescription pid process target process PID 3916 wrote to memory of 2036 3916 Order_15078.exe Order_15078.exe PID 3916 wrote to memory of 2036 3916 Order_15078.exe Order_15078.exe PID 3916 wrote to memory of 2036 3916 Order_15078.exe Order_15078.exe PID 3916 wrote to memory of 2036 3916 Order_15078.exe Order_15078.exe PID 3916 wrote to memory of 2036 3916 Order_15078.exe Order_15078.exe PID 3916 wrote to memory of 2036 3916 Order_15078.exe Order_15078.exe PID 3052 wrote to memory of 1344 3052 Explorer.EXE wlanext.exe PID 3052 wrote to memory of 1344 3052 Explorer.EXE wlanext.exe PID 3052 wrote to memory of 1344 3052 Explorer.EXE wlanext.exe PID 1344 wrote to memory of 3584 1344 wlanext.exe cmd.exe PID 1344 wrote to memory of 3584 1344 wlanext.exe cmd.exe PID 1344 wrote to memory of 3584 1344 wlanext.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Order_15078.exe"C:\Users\Admin\AppData\Local\Temp\Order_15078.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Order_15078.exe"C:\Users\Admin\AppData\Local\Temp\Order_15078.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Order_15078.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1344-129-0x0000000000000000-mapping.dmp
-
memory/1344-134-0x0000000003400000-0x000000000348F000-memory.dmpFilesize
572KB
-
memory/1344-133-0x00000000030E0000-0x0000000003400000-memory.dmpFilesize
3.1MB
-
memory/1344-131-0x0000000000A50000-0x0000000000A78000-memory.dmpFilesize
160KB
-
memory/1344-130-0x0000000000F20000-0x0000000000F37000-memory.dmpFilesize
92KB
-
memory/2036-125-0x000000000041CFE0-mapping.dmp
-
memory/2036-126-0x0000000001760000-0x0000000001A80000-memory.dmpFilesize
3.1MB
-
memory/2036-127-0x0000000001170000-0x0000000001180000-memory.dmpFilesize
64KB
-
memory/2036-124-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/3052-128-0x0000000008B80000-0x0000000008D13000-memory.dmpFilesize
1.6MB
-
memory/3052-135-0x0000000006800000-0x0000000006920000-memory.dmpFilesize
1.1MB
-
memory/3584-132-0x0000000000000000-mapping.dmp
-
memory/3916-123-0x0000000007650000-0x000000000767F000-memory.dmpFilesize
188KB
-
memory/3916-114-0x0000000000940000-0x0000000000941000-memory.dmpFilesize
4KB
-
memory/3916-122-0x0000000008CD0000-0x0000000008D42000-memory.dmpFilesize
456KB
-
memory/3916-121-0x0000000007370000-0x000000000737B000-memory.dmpFilesize
44KB
-
memory/3916-120-0x0000000005180000-0x0000000005212000-memory.dmpFilesize
584KB
-
memory/3916-119-0x0000000005230000-0x0000000005231000-memory.dmpFilesize
4KB
-
memory/3916-118-0x0000000005310000-0x0000000005311000-memory.dmpFilesize
4KB
-
memory/3916-117-0x0000000005270000-0x0000000005271000-memory.dmpFilesize
4KB
-
memory/3916-116-0x0000000005770000-0x0000000005771000-memory.dmpFilesize
4KB