Analysis
-
max time kernel
149s -
max time network
192s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
27-07-2021 14:59
Static task
static1
Behavioral task
behavioral1
Sample
nWVjpM9ao5s78s3.exe
Resource
win7v20210408
General
-
Target
nWVjpM9ao5s78s3.exe
-
Size
875KB
-
MD5
8fc8a4252b32c8eb4b9e03b018ff72a2
-
SHA1
14a7a0b55043b430cbcb0a94b26a4f33c3f7d3d2
-
SHA256
e59a1d022c6c4f0cc7d23689004e65ea7f1f940adef98cf891a008dd9d7f66d9
-
SHA512
00b3d70f9929d76dda8c0691b394393a299446056330bf634043e88935551a49d8708a2fc0baf8ef1f5f4e3cce107ae796e4fc99ac24420052ca304e3c3f59f2
Malware Config
Extracted
xloader
2.3
http://www.panyu-qqbaby.com/weni/
sdmdwang.com
konversationswithkoshie.net
carap.club
eagldeream.com
856380585.xyz
elgallocoffee.com
magetu.info
lovertons.com
theichallenge.com
advancedautorepairsonline.com
wingsstyling.info
tapdaugusta.com
wiloasbanhsgtarewdasc.solutions
donjrisdumb.com
experienceddoctor.com
cloverhillconsultants.com
underwear.show
karensgonewild2020.com
arodsr.com
thefucktardmanual.com
712kenwood.info
telecompink.com
ebizkendra.com
kitkatmp3.com
utformehagen.com
profitsnavigator.com
kathyharvey.com
tongaoffshore.com
vrpreservation.com
hy7128.com
nicolettejohnsonphotography.com
rating.travel
visualartcr.com
nationalbarista.com
lovecartoonforever.com
koimkt.com
directpractice.pro
blockchaincloud360.com
queverenbuenosaires.com
coachmyragolden.com
awree.com
facebookipl.com
rcheapwdbuy.com
trinspinsgreen.com
voxaide.com
ecorner.online
mattvickery.com
regarta.com
fknprfct.com
theessentialstore.net
sunilpsingh.com
ovtnywveba.club
optimalgafa.com
awdjob.info
humachem.com
southeasternsteakcompany.com
centerevents.net
warrenswindowcleans.co.uk
lebullterrier.com
thecxchecker.com
formerknown.com
pupbutler.com
tincanphones.com
tgeuuy.cool
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1800-66-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/1800-67-0x000000000041D000-mapping.dmp xloader behavioral1/memory/1452-73-0x00000000000C0000-0x00000000000E8000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
nWVjpM9ao5s78s3.exeRegSvcs.exewlanext.exedescription pid process target process PID 760 set thread context of 1800 760 nWVjpM9ao5s78s3.exe RegSvcs.exe PID 1800 set thread context of 1200 1800 RegSvcs.exe Explorer.EXE PID 1452 set thread context of 1200 1452 wlanext.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
RegSvcs.exewlanext.exepid process 1800 RegSvcs.exe 1800 RegSvcs.exe 1452 wlanext.exe 1452 wlanext.exe 1452 wlanext.exe 1452 wlanext.exe 1452 wlanext.exe 1452 wlanext.exe 1452 wlanext.exe 1452 wlanext.exe 1452 wlanext.exe 1452 wlanext.exe 1452 wlanext.exe 1452 wlanext.exe 1452 wlanext.exe 1452 wlanext.exe 1452 wlanext.exe 1452 wlanext.exe 1452 wlanext.exe 1452 wlanext.exe 1452 wlanext.exe 1452 wlanext.exe 1452 wlanext.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
RegSvcs.exewlanext.exepid process 1800 RegSvcs.exe 1800 RegSvcs.exe 1800 RegSvcs.exe 1452 wlanext.exe 1452 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
nWVjpM9ao5s78s3.exeRegSvcs.exewlanext.exedescription pid process Token: SeDebugPrivilege 760 nWVjpM9ao5s78s3.exe Token: SeDebugPrivilege 1800 RegSvcs.exe Token: SeDebugPrivilege 1452 wlanext.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE 1200 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
nWVjpM9ao5s78s3.exeExplorer.EXEwlanext.exedescription pid process target process PID 760 wrote to memory of 1800 760 nWVjpM9ao5s78s3.exe RegSvcs.exe PID 760 wrote to memory of 1800 760 nWVjpM9ao5s78s3.exe RegSvcs.exe PID 760 wrote to memory of 1800 760 nWVjpM9ao5s78s3.exe RegSvcs.exe PID 760 wrote to memory of 1800 760 nWVjpM9ao5s78s3.exe RegSvcs.exe PID 760 wrote to memory of 1800 760 nWVjpM9ao5s78s3.exe RegSvcs.exe PID 760 wrote to memory of 1800 760 nWVjpM9ao5s78s3.exe RegSvcs.exe PID 760 wrote to memory of 1800 760 nWVjpM9ao5s78s3.exe RegSvcs.exe PID 760 wrote to memory of 1800 760 nWVjpM9ao5s78s3.exe RegSvcs.exe PID 760 wrote to memory of 1800 760 nWVjpM9ao5s78s3.exe RegSvcs.exe PID 760 wrote to memory of 1800 760 nWVjpM9ao5s78s3.exe RegSvcs.exe PID 1200 wrote to memory of 1452 1200 Explorer.EXE wlanext.exe PID 1200 wrote to memory of 1452 1200 Explorer.EXE wlanext.exe PID 1200 wrote to memory of 1452 1200 Explorer.EXE wlanext.exe PID 1200 wrote to memory of 1452 1200 Explorer.EXE wlanext.exe PID 1452 wrote to memory of 1432 1452 wlanext.exe cmd.exe PID 1452 wrote to memory of 1432 1452 wlanext.exe cmd.exe PID 1452 wrote to memory of 1432 1452 wlanext.exe cmd.exe PID 1452 wrote to memory of 1432 1452 wlanext.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\nWVjpM9ao5s78s3.exe"C:\Users\Admin\AppData\Local\Temp\nWVjpM9ao5s78s3.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/760-61-0x0000000000950000-0x00000000009A5000-memory.dmpFilesize
340KB
-
memory/760-62-0x0000000004640000-0x0000000004641000-memory.dmpFilesize
4KB
-
memory/760-63-0x0000000000380000-0x0000000000382000-memory.dmpFilesize
8KB
-
memory/760-64-0x0000000005EA0000-0x0000000005F16000-memory.dmpFilesize
472KB
-
memory/760-65-0x0000000004790000-0x00000000047BA000-memory.dmpFilesize
168KB
-
memory/760-59-0x0000000000C20000-0x0000000000C21000-memory.dmpFilesize
4KB
-
memory/1200-70-0x0000000004CF0000-0x0000000004DB4000-memory.dmpFilesize
784KB
-
memory/1200-77-0x00000000064B0000-0x0000000006586000-memory.dmpFilesize
856KB
-
memory/1432-74-0x0000000000000000-mapping.dmp
-
memory/1452-72-0x0000000000D00000-0x0000000000D16000-memory.dmpFilesize
88KB
-
memory/1452-71-0x0000000000000000-mapping.dmp
-
memory/1452-73-0x00000000000C0000-0x00000000000E8000-memory.dmpFilesize
160KB
-
memory/1452-75-0x0000000002120000-0x0000000002423000-memory.dmpFilesize
3.0MB
-
memory/1452-76-0x0000000000880000-0x000000000090F000-memory.dmpFilesize
572KB
-
memory/1800-69-0x0000000000130000-0x0000000000140000-memory.dmpFilesize
64KB
-
memory/1800-68-0x0000000000B40000-0x0000000000E43000-memory.dmpFilesize
3.0MB
-
memory/1800-67-0x000000000041D000-mapping.dmp
-
memory/1800-66-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB