Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
27-07-2021 15:43
Static task
static1
Behavioral task
behavioral1
Sample
0ictba3ik3lrJnW.exe
Resource
win7v20210408
General
-
Target
0ictba3ik3lrJnW.exe
-
Size
859KB
-
MD5
6e77fe0eb26c4834a5411e66a78a3e69
-
SHA1
5c9768be8ed60c6190e68deeebc5f3c1cdbf531a
-
SHA256
fbeb9b62ff737a87fe38709d075f3fee34502b01262480cf5a014efaab4f7075
-
SHA512
dc466d692eee548dbcc161904527a27b2a80ebc0ae4a366a8d08a21ec627fd6ef127db3aaf0b1ec567e7ac0a5aae71374a285d1aba5cb5bb59d24d3d65a51eef
Malware Config
Extracted
xloader
2.3
http://www.hokutiki.com/cogt/
britechsoft.com
vitortedeschi.com
nittwittridge.net
nblianger.com
fs133.net
theprairiesky.com
mylexinova.com
loveiscomingbook.com
thehouseoflightning.com
gulbahorfoodblogger.online
exploringanddiscovering.com
edyscleaning.com
jihalbroskorea.com
sammys-cafe.com
smallbluer.com
voglioincontri.com
aaareplicamall.com
empireofglam.com
4hu5555.com
cookiescalofornia.com
bikeazon.com
e9daa9c-2z.com
crucialprintz.com
catnapperspgh.com
newsletteramy.com
myewallet999.com
innovoramr.com
protonmedicalcare.net
loismiachapman.com
chapterpaper.guru
aiwop.com
infinityjewelrypr.com
pwnyc-wnph.xyz
priyanshisikchi.com
jalhucaperu.com
tonyhumberstone.com
thecorecoffeeroastery.com
sbahandbook.com
zgzbl168.com
cooperunica.com
destek-taleplerimiz.com
signobrations.com
blyadikieva.com
myqanon.com
landfilltoken.com
suburbanjuice.com
giftbasketsandmorebytina.com
inexcreativefloors.com
hccaster.com
tottenvillshs.com
serversregistered.com
cubiclesanddragons.com
crispychickenmerrylands.com
buntunm3.com
pnrlen.today
jocodroneco.com
littlehico.com
tryseasonal.com
thehomefitness.com
taxsite.icu
taksazsanat.com
kaseratechnologies.com
cocinacolectiva.com
klikkananstudio.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3292-124-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/3292-125-0x000000000041CFF0-mapping.dmp xloader behavioral2/memory/3396-132-0x0000000002E80000-0x0000000002EA8000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
0ictba3ik3lrJnW.exe0ictba3ik3lrJnW.exemstsc.exedescription pid process target process PID 2388 set thread context of 3292 2388 0ictba3ik3lrJnW.exe 0ictba3ik3lrJnW.exe PID 3292 set thread context of 3020 3292 0ictba3ik3lrJnW.exe Explorer.EXE PID 3396 set thread context of 3020 3396 mstsc.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 40 IoCs
Processes:
0ictba3ik3lrJnW.exe0ictba3ik3lrJnW.exemstsc.exepid process 2388 0ictba3ik3lrJnW.exe 2388 0ictba3ik3lrJnW.exe 2388 0ictba3ik3lrJnW.exe 2388 0ictba3ik3lrJnW.exe 3292 0ictba3ik3lrJnW.exe 3292 0ictba3ik3lrJnW.exe 3292 0ictba3ik3lrJnW.exe 3292 0ictba3ik3lrJnW.exe 3396 mstsc.exe 3396 mstsc.exe 3396 mstsc.exe 3396 mstsc.exe 3396 mstsc.exe 3396 mstsc.exe 3396 mstsc.exe 3396 mstsc.exe 3396 mstsc.exe 3396 mstsc.exe 3396 mstsc.exe 3396 mstsc.exe 3396 mstsc.exe 3396 mstsc.exe 3396 mstsc.exe 3396 mstsc.exe 3396 mstsc.exe 3396 mstsc.exe 3396 mstsc.exe 3396 mstsc.exe 3396 mstsc.exe 3396 mstsc.exe 3396 mstsc.exe 3396 mstsc.exe 3396 mstsc.exe 3396 mstsc.exe 3396 mstsc.exe 3396 mstsc.exe 3396 mstsc.exe 3396 mstsc.exe 3396 mstsc.exe 3396 mstsc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3020 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
0ictba3ik3lrJnW.exemstsc.exepid process 3292 0ictba3ik3lrJnW.exe 3292 0ictba3ik3lrJnW.exe 3292 0ictba3ik3lrJnW.exe 3396 mstsc.exe 3396 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
0ictba3ik3lrJnW.exe0ictba3ik3lrJnW.exemstsc.exedescription pid process Token: SeDebugPrivilege 2388 0ictba3ik3lrJnW.exe Token: SeDebugPrivilege 3292 0ictba3ik3lrJnW.exe Token: SeDebugPrivilege 3396 mstsc.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
0ictba3ik3lrJnW.exeExplorer.EXEmstsc.exedescription pid process target process PID 2388 wrote to memory of 3288 2388 0ictba3ik3lrJnW.exe 0ictba3ik3lrJnW.exe PID 2388 wrote to memory of 3288 2388 0ictba3ik3lrJnW.exe 0ictba3ik3lrJnW.exe PID 2388 wrote to memory of 3288 2388 0ictba3ik3lrJnW.exe 0ictba3ik3lrJnW.exe PID 2388 wrote to memory of 3464 2388 0ictba3ik3lrJnW.exe 0ictba3ik3lrJnW.exe PID 2388 wrote to memory of 3464 2388 0ictba3ik3lrJnW.exe 0ictba3ik3lrJnW.exe PID 2388 wrote to memory of 3464 2388 0ictba3ik3lrJnW.exe 0ictba3ik3lrJnW.exe PID 2388 wrote to memory of 3292 2388 0ictba3ik3lrJnW.exe 0ictba3ik3lrJnW.exe PID 2388 wrote to memory of 3292 2388 0ictba3ik3lrJnW.exe 0ictba3ik3lrJnW.exe PID 2388 wrote to memory of 3292 2388 0ictba3ik3lrJnW.exe 0ictba3ik3lrJnW.exe PID 2388 wrote to memory of 3292 2388 0ictba3ik3lrJnW.exe 0ictba3ik3lrJnW.exe PID 2388 wrote to memory of 3292 2388 0ictba3ik3lrJnW.exe 0ictba3ik3lrJnW.exe PID 2388 wrote to memory of 3292 2388 0ictba3ik3lrJnW.exe 0ictba3ik3lrJnW.exe PID 3020 wrote to memory of 3396 3020 Explorer.EXE mstsc.exe PID 3020 wrote to memory of 3396 3020 Explorer.EXE mstsc.exe PID 3020 wrote to memory of 3396 3020 Explorer.EXE mstsc.exe PID 3396 wrote to memory of 2152 3396 mstsc.exe cmd.exe PID 3396 wrote to memory of 2152 3396 mstsc.exe cmd.exe PID 3396 wrote to memory of 2152 3396 mstsc.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\0ictba3ik3lrJnW.exe"C:\Users\Admin\AppData\Local\Temp\0ictba3ik3lrJnW.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\0ictba3ik3lrJnW.exe"C:\Users\Admin\AppData\Local\Temp\0ictba3ik3lrJnW.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\0ictba3ik3lrJnW.exe"C:\Users\Admin\AppData\Local\Temp\0ictba3ik3lrJnW.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\0ictba3ik3lrJnW.exe"C:\Users\Admin\AppData\Local\Temp\0ictba3ik3lrJnW.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\0ictba3ik3lrJnW.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2152-130-0x0000000000000000-mapping.dmp
-
memory/2388-120-0x0000000004C60000-0x0000000004C61000-memory.dmpFilesize
4KB
-
memory/2388-123-0x00000000069C0000-0x00000000069EE000-memory.dmpFilesize
184KB
-
memory/2388-118-0x0000000004C20000-0x0000000004C21000-memory.dmpFilesize
4KB
-
memory/2388-119-0x0000000004E80000-0x0000000004E81000-memory.dmpFilesize
4KB
-
memory/2388-114-0x0000000000310000-0x0000000000311000-memory.dmpFilesize
4KB
-
memory/2388-121-0x00000000066F0000-0x000000000670B000-memory.dmpFilesize
108KB
-
memory/2388-122-0x0000000008120000-0x0000000008190000-memory.dmpFilesize
448KB
-
memory/2388-116-0x0000000005180000-0x0000000005181000-memory.dmpFilesize
4KB
-
memory/2388-117-0x0000000004C80000-0x0000000004C81000-memory.dmpFilesize
4KB
-
memory/3020-135-0x0000000005810000-0x0000000005941000-memory.dmpFilesize
1.2MB
-
memory/3020-128-0x0000000003000000-0x000000000316E000-memory.dmpFilesize
1.4MB
-
memory/3292-124-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/3292-125-0x000000000041CFF0-mapping.dmp
-
memory/3292-126-0x00000000018F0000-0x0000000001C10000-memory.dmpFilesize
3.1MB
-
memory/3292-127-0x00000000015D0000-0x00000000015E0000-memory.dmpFilesize
64KB
-
memory/3396-133-0x00000000046F0000-0x0000000004A10000-memory.dmpFilesize
3.1MB
-
memory/3396-131-0x00000000003A0000-0x000000000069C000-memory.dmpFilesize
3.0MB
-
memory/3396-132-0x0000000002E80000-0x0000000002EA8000-memory.dmpFilesize
160KB
-
memory/3396-129-0x0000000000000000-mapping.dmp
-
memory/3396-134-0x0000000004530000-0x00000000045BF000-memory.dmpFilesize
572KB