Analysis
-
max time kernel
151s -
max time network
195s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
27-07-2021 15:43
Static task
static1
Behavioral task
behavioral1
Sample
0ictba3ik3lrJnW.exe
Resource
win7v20210408
General
-
Target
0ictba3ik3lrJnW.exe
-
Size
859KB
-
MD5
6e77fe0eb26c4834a5411e66a78a3e69
-
SHA1
5c9768be8ed60c6190e68deeebc5f3c1cdbf531a
-
SHA256
fbeb9b62ff737a87fe38709d075f3fee34502b01262480cf5a014efaab4f7075
-
SHA512
dc466d692eee548dbcc161904527a27b2a80ebc0ae4a366a8d08a21ec627fd6ef127db3aaf0b1ec567e7ac0a5aae71374a285d1aba5cb5bb59d24d3d65a51eef
Malware Config
Extracted
xloader
2.3
http://www.hokutiki.com/cogt/
britechsoft.com
vitortedeschi.com
nittwittridge.net
nblianger.com
fs133.net
theprairiesky.com
mylexinova.com
loveiscomingbook.com
thehouseoflightning.com
gulbahorfoodblogger.online
exploringanddiscovering.com
edyscleaning.com
jihalbroskorea.com
sammys-cafe.com
smallbluer.com
voglioincontri.com
aaareplicamall.com
empireofglam.com
4hu5555.com
cookiescalofornia.com
bikeazon.com
e9daa9c-2z.com
crucialprintz.com
catnapperspgh.com
newsletteramy.com
myewallet999.com
innovoramr.com
protonmedicalcare.net
loismiachapman.com
chapterpaper.guru
aiwop.com
infinityjewelrypr.com
pwnyc-wnph.xyz
priyanshisikchi.com
jalhucaperu.com
tonyhumberstone.com
thecorecoffeeroastery.com
sbahandbook.com
zgzbl168.com
cooperunica.com
destek-taleplerimiz.com
signobrations.com
blyadikieva.com
myqanon.com
landfilltoken.com
suburbanjuice.com
giftbasketsandmorebytina.com
inexcreativefloors.com
hccaster.com
tottenvillshs.com
serversregistered.com
cubiclesanddragons.com
crispychickenmerrylands.com
buntunm3.com
pnrlen.today
jocodroneco.com
littlehico.com
tryseasonal.com
thehomefitness.com
taxsite.icu
taksazsanat.com
kaseratechnologies.com
cocinacolectiva.com
klikkananstudio.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/520-66-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/520-67-0x000000000041CFF0-mapping.dmp xloader behavioral1/memory/1632-76-0x0000000000090000-0x00000000000B8000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1652 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
0ictba3ik3lrJnW.exe0ictba3ik3lrJnW.execmstp.exedescription pid process target process PID 1100 set thread context of 520 1100 0ictba3ik3lrJnW.exe 0ictba3ik3lrJnW.exe PID 520 set thread context of 1196 520 0ictba3ik3lrJnW.exe Explorer.EXE PID 520 set thread context of 1196 520 0ictba3ik3lrJnW.exe Explorer.EXE PID 1632 set thread context of 1196 1632 cmstp.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
0ictba3ik3lrJnW.execmstp.exepid process 520 0ictba3ik3lrJnW.exe 520 0ictba3ik3lrJnW.exe 520 0ictba3ik3lrJnW.exe 1632 cmstp.exe 1632 cmstp.exe 1632 cmstp.exe 1632 cmstp.exe 1632 cmstp.exe 1632 cmstp.exe 1632 cmstp.exe 1632 cmstp.exe 1632 cmstp.exe 1632 cmstp.exe 1632 cmstp.exe 1632 cmstp.exe 1632 cmstp.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
0ictba3ik3lrJnW.execmstp.exepid process 520 0ictba3ik3lrJnW.exe 520 0ictba3ik3lrJnW.exe 520 0ictba3ik3lrJnW.exe 520 0ictba3ik3lrJnW.exe 1632 cmstp.exe 1632 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
0ictba3ik3lrJnW.execmstp.exedescription pid process Token: SeDebugPrivilege 520 0ictba3ik3lrJnW.exe Token: SeDebugPrivilege 1632 cmstp.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
0ictba3ik3lrJnW.exeExplorer.EXEcmstp.exedescription pid process target process PID 1100 wrote to memory of 520 1100 0ictba3ik3lrJnW.exe 0ictba3ik3lrJnW.exe PID 1100 wrote to memory of 520 1100 0ictba3ik3lrJnW.exe 0ictba3ik3lrJnW.exe PID 1100 wrote to memory of 520 1100 0ictba3ik3lrJnW.exe 0ictba3ik3lrJnW.exe PID 1100 wrote to memory of 520 1100 0ictba3ik3lrJnW.exe 0ictba3ik3lrJnW.exe PID 1100 wrote to memory of 520 1100 0ictba3ik3lrJnW.exe 0ictba3ik3lrJnW.exe PID 1100 wrote to memory of 520 1100 0ictba3ik3lrJnW.exe 0ictba3ik3lrJnW.exe PID 1100 wrote to memory of 520 1100 0ictba3ik3lrJnW.exe 0ictba3ik3lrJnW.exe PID 1196 wrote to memory of 1632 1196 Explorer.EXE cmstp.exe PID 1196 wrote to memory of 1632 1196 Explorer.EXE cmstp.exe PID 1196 wrote to memory of 1632 1196 Explorer.EXE cmstp.exe PID 1196 wrote to memory of 1632 1196 Explorer.EXE cmstp.exe PID 1196 wrote to memory of 1632 1196 Explorer.EXE cmstp.exe PID 1196 wrote to memory of 1632 1196 Explorer.EXE cmstp.exe PID 1196 wrote to memory of 1632 1196 Explorer.EXE cmstp.exe PID 1632 wrote to memory of 1652 1632 cmstp.exe cmd.exe PID 1632 wrote to memory of 1652 1632 cmstp.exe cmd.exe PID 1632 wrote to memory of 1652 1632 cmstp.exe cmd.exe PID 1632 wrote to memory of 1652 1632 cmstp.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\0ictba3ik3lrJnW.exe"C:\Users\Admin\AppData\Local\Temp\0ictba3ik3lrJnW.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\0ictba3ik3lrJnW.exe"C:\Users\Admin\AppData\Local\Temp\0ictba3ik3lrJnW.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\0ictba3ik3lrJnW.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/520-66-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/520-67-0x000000000041CFF0-mapping.dmp
-
memory/520-69-0x00000000000F0000-0x0000000000100000-memory.dmpFilesize
64KB
-
memory/520-68-0x0000000000AE0000-0x0000000000DE3000-memory.dmpFilesize
3.0MB
-
memory/520-71-0x00000000001B0000-0x00000000001C0000-memory.dmpFilesize
64KB
-
memory/1100-60-0x0000000000A00000-0x0000000000A01000-memory.dmpFilesize
4KB
-
memory/1100-62-0x0000000002290000-0x0000000002291000-memory.dmpFilesize
4KB
-
memory/1100-63-0x00000000004C0000-0x00000000004DB000-memory.dmpFilesize
108KB
-
memory/1100-64-0x0000000002220000-0x0000000002290000-memory.dmpFilesize
448KB
-
memory/1100-65-0x00000000022D0000-0x00000000022FE000-memory.dmpFilesize
184KB
-
memory/1196-72-0x0000000006A40000-0x0000000006BB5000-memory.dmpFilesize
1.5MB
-
memory/1196-70-0x0000000004910000-0x00000000049DA000-memory.dmpFilesize
808KB
-
memory/1196-80-0x00000000091F0000-0x000000000932D000-memory.dmpFilesize
1.2MB
-
memory/1632-73-0x0000000000000000-mapping.dmp
-
memory/1632-74-0x0000000075B31000-0x0000000075B33000-memory.dmpFilesize
8KB
-
memory/1632-75-0x00000000004D0000-0x00000000004E8000-memory.dmpFilesize
96KB
-
memory/1632-76-0x0000000000090000-0x00000000000B8000-memory.dmpFilesize
160KB
-
memory/1632-78-0x0000000002160000-0x0000000002463000-memory.dmpFilesize
3.0MB
-
memory/1632-79-0x0000000000400000-0x000000000048F000-memory.dmpFilesize
572KB
-
memory/1652-77-0x0000000000000000-mapping.dmp