Analysis
-
max time kernel
150s -
max time network
179s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
27-07-2021 22:21
Static task
static1
Behavioral task
behavioral1
Sample
klSsrzxwsbxeJQh.exe
Resource
win7v20210408
General
-
Target
klSsrzxwsbxeJQh.exe
-
Size
818KB
-
MD5
3be1fa609b4f6efa9d30b5c75810f863
-
SHA1
61dcd8a4bd4641a7cc4800b5aea9ecaf7c6609bf
-
SHA256
27572043b01a99f3901af4bd40faf03cd04e722e3fb7ba866ccdb3b2d3fabb11
-
SHA512
b5d36a463c8eca050b3db941449d79b91c870990685b20bc192f09037231a17c2939c74b2312820a09aa54e553e61a6ab0320ea7b5f9ee60a92331ccf79b7911
Malware Config
Extracted
xloader
2.3
http://www.arogyanlife.com/b82a/
annguyet.net
parkwood.tech
readysetmortgage.net
betraywithdraw.com
incmagazine.xyz
dentistinpimplesaudagar.com
lianhx.com
prodrelease0827b.com
safehavenwellbeing.com
gehdeinweg.club
sondaggio123.space
prospecx.report
remediate.info
savylash.com
puppornstar.com
coaching-romand.com
boozeshops.com
team316media.com
ldgawydtl.icu
trezteez.com
hhtgd.com
jugoon.xyz
bsafetexting.com
imaycom.com
fakihgroups.com
pfarfour.com
organowantcreator.com
profesyoneltemizlikantalya.com
kustomdiapercakes.com
repealpna.com
seraby.com
eventsshowleads.com
naturallybossed.com
twxgbmbdkxczd.net
gahterwisdom.com
bautec-euregio.com
sarelawadisangh.com
gimedor.com
revolutionofwork.com
zpwizso.com
livinglavidalocaltexas.com
yenidea.com
smugfantasyfootball.com
myprofitvideo.com
inseparablehearts.com
dalebutano.com
bluecatsubs.com
nationwaves.com
theplantwitch.com
ffntc.com
188yyw.com
thejulington.com
timelessthots.com
homesstory.com
breauxsauto.com
quittytime.com
bainrix.com
eurofiregroup.com
paralelogram.com
nodefind.net
mastercommunications.xyz
lovelyeses.com
social-clarity.com
westvisionconsult.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
Processes:
resource yara_rule behavioral1/memory/752-63-0x0000000000270000-0x000000000027B000-memory.dmp CustAttr -
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/612-66-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/612-67-0x000000000041CFC0-mapping.dmp xloader behavioral1/memory/1100-75-0x0000000000080000-0x00000000000A8000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1828 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
klSsrzxwsbxeJQh.exeklSsrzxwsbxeJQh.exesvchost.exedescription pid process target process PID 752 set thread context of 612 752 klSsrzxwsbxeJQh.exe klSsrzxwsbxeJQh.exe PID 612 set thread context of 1200 612 klSsrzxwsbxeJQh.exe Explorer.EXE PID 612 set thread context of 1200 612 klSsrzxwsbxeJQh.exe Explorer.EXE PID 1100 set thread context of 1200 1100 svchost.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
klSsrzxwsbxeJQh.exeklSsrzxwsbxeJQh.exesvchost.exepid process 752 klSsrzxwsbxeJQh.exe 752 klSsrzxwsbxeJQh.exe 612 klSsrzxwsbxeJQh.exe 612 klSsrzxwsbxeJQh.exe 612 klSsrzxwsbxeJQh.exe 1100 svchost.exe 1100 svchost.exe 1100 svchost.exe 1100 svchost.exe 1100 svchost.exe 1100 svchost.exe 1100 svchost.exe 1100 svchost.exe 1100 svchost.exe 1100 svchost.exe 1100 svchost.exe 1100 svchost.exe 1100 svchost.exe 1100 svchost.exe 1100 svchost.exe 1100 svchost.exe 1100 svchost.exe 1100 svchost.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
klSsrzxwsbxeJQh.exesvchost.exepid process 612 klSsrzxwsbxeJQh.exe 612 klSsrzxwsbxeJQh.exe 612 klSsrzxwsbxeJQh.exe 612 klSsrzxwsbxeJQh.exe 1100 svchost.exe 1100 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
klSsrzxwsbxeJQh.exeklSsrzxwsbxeJQh.exesvchost.exedescription pid process Token: SeDebugPrivilege 752 klSsrzxwsbxeJQh.exe Token: SeDebugPrivilege 612 klSsrzxwsbxeJQh.exe Token: SeDebugPrivilege 1100 svchost.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
klSsrzxwsbxeJQh.exeExplorer.EXEsvchost.exedescription pid process target process PID 752 wrote to memory of 472 752 klSsrzxwsbxeJQh.exe klSsrzxwsbxeJQh.exe PID 752 wrote to memory of 472 752 klSsrzxwsbxeJQh.exe klSsrzxwsbxeJQh.exe PID 752 wrote to memory of 472 752 klSsrzxwsbxeJQh.exe klSsrzxwsbxeJQh.exe PID 752 wrote to memory of 472 752 klSsrzxwsbxeJQh.exe klSsrzxwsbxeJQh.exe PID 752 wrote to memory of 612 752 klSsrzxwsbxeJQh.exe klSsrzxwsbxeJQh.exe PID 752 wrote to memory of 612 752 klSsrzxwsbxeJQh.exe klSsrzxwsbxeJQh.exe PID 752 wrote to memory of 612 752 klSsrzxwsbxeJQh.exe klSsrzxwsbxeJQh.exe PID 752 wrote to memory of 612 752 klSsrzxwsbxeJQh.exe klSsrzxwsbxeJQh.exe PID 752 wrote to memory of 612 752 klSsrzxwsbxeJQh.exe klSsrzxwsbxeJQh.exe PID 752 wrote to memory of 612 752 klSsrzxwsbxeJQh.exe klSsrzxwsbxeJQh.exe PID 752 wrote to memory of 612 752 klSsrzxwsbxeJQh.exe klSsrzxwsbxeJQh.exe PID 1200 wrote to memory of 1100 1200 Explorer.EXE svchost.exe PID 1200 wrote to memory of 1100 1200 Explorer.EXE svchost.exe PID 1200 wrote to memory of 1100 1200 Explorer.EXE svchost.exe PID 1200 wrote to memory of 1100 1200 Explorer.EXE svchost.exe PID 1100 wrote to memory of 1828 1100 svchost.exe cmd.exe PID 1100 wrote to memory of 1828 1100 svchost.exe cmd.exe PID 1100 wrote to memory of 1828 1100 svchost.exe cmd.exe PID 1100 wrote to memory of 1828 1100 svchost.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\klSsrzxwsbxeJQh.exe"C:\Users\Admin\AppData\Local\Temp\klSsrzxwsbxeJQh.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\klSsrzxwsbxeJQh.exe"C:\Users\Admin\AppData\Local\Temp\klSsrzxwsbxeJQh.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\klSsrzxwsbxeJQh.exe"C:\Users\Admin\AppData\Local\Temp\klSsrzxwsbxeJQh.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\klSsrzxwsbxeJQh.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/612-71-0x0000000000350000-0x0000000000360000-memory.dmpFilesize
64KB
-
memory/612-68-0x00000000006E0000-0x00000000009E3000-memory.dmpFilesize
3.0MB
-
memory/612-66-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/612-67-0x000000000041CFC0-mapping.dmp
-
memory/612-69-0x0000000000310000-0x0000000000320000-memory.dmpFilesize
64KB
-
memory/752-63-0x0000000000270000-0x000000000027B000-memory.dmpFilesize
44KB
-
memory/752-64-0x0000000004F10000-0x0000000004F84000-memory.dmpFilesize
464KB
-
memory/752-65-0x0000000000560000-0x000000000058F000-memory.dmpFilesize
188KB
-
memory/752-60-0x00000000010B0000-0x00000000010B1000-memory.dmpFilesize
4KB
-
memory/752-62-0x0000000004D20000-0x0000000004D21000-memory.dmpFilesize
4KB
-
memory/1100-78-0x0000000000540000-0x00000000005CF000-memory.dmpFilesize
572KB
-
memory/1100-73-0x0000000000000000-mapping.dmp
-
memory/1100-75-0x0000000000080000-0x00000000000A8000-memory.dmpFilesize
160KB
-
memory/1100-76-0x0000000000990000-0x0000000000C93000-memory.dmpFilesize
3.0MB
-
memory/1100-74-0x0000000000350000-0x0000000000358000-memory.dmpFilesize
32KB
-
memory/1100-80-0x0000000075451000-0x0000000075453000-memory.dmpFilesize
8KB
-
memory/1200-72-0x0000000006270000-0x00000000063B8000-memory.dmpFilesize
1.3MB
-
memory/1200-70-0x0000000003D70000-0x0000000003E20000-memory.dmpFilesize
704KB
-
memory/1200-79-0x0000000005ED0000-0x0000000005F84000-memory.dmpFilesize
720KB
-
memory/1828-77-0x0000000000000000-mapping.dmp