Analysis
-
max time kernel
153s -
max time network
160s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
02-09-2021 10:20
Static task
static1
Behavioral task
behavioral1
Sample
revised quotation.exe
Resource
win7v20210408
General
-
Target
revised quotation.exe
-
Size
521KB
-
MD5
d3344f685e1963f478711ee2d2d86c48
-
SHA1
6203016b209ecb8d1d4cfc4ffa0a885a33ffa3a8
-
SHA256
cc92eda0a8290172b29b51ff05fa235ffd0389fce74d0a40d0e5cc1e4af11497
-
SHA512
73f901c6c89e63beaf9638442200aa87b5ba2a988080c262392252a8b3d882451e9e16057fdd0478e391861f951d621ac71d6e7119d5aecc8d2e47a7cb69e5df
Malware Config
Extracted
xloader
2.3
n58i
http://www.mack3sleeve.com/n58i/
nl-cafe.com
votetedjaleta.com
britrobertsrealtor.com
globipark.com
citysucces.com
verisignwebsite-verified.com
riddlepc.com
rosecityclimbing.com
oleandrinextract.com
salmankonstruksi.com
needhamchannel.com
refreshx2z.com
youth66.com
pla-russia.com
halloweenmaskpro.com
exdysis.com
1gcz.com
lookgoodman.com
rlxagva.com
stlcityc.com
writingleagues.com
biodunandewaoluwa.com
whitepetalsboutiques.com
idirtivio.com
ministerioslodj.com
bachelors.win
floortak.co.uk
naturaldogseltzer.com
hypermediarus.online
grandrapidsvirtualboatshow.com
usabrokersgroup.net
marketlala.com
5923599.com
oldhousechicago.com
crucial.company
chickaboom.net
fashionelixirs.com
robertstevensonphotography.com
goddessruby.com
hostings.company
freeganyachtclub.com
shierxing.com
sfca01.com
ahhtcd.com
yournumberoneteam.com
w88linklogin.com
worldchampsfootball.club
arcadems.com
rutroms.club
oxfordholidaycottage.com
science-laboratory.info
wecarefamilyphysicians.com
cdaaesthetics.com
defyesthetics.com
haselwoodvwevents.com
promoterss.com
gromov-plc.com
themaximogroup.com
litlidin.com
guangheng-sh.com
cashcowlending.com
foxelpie.com
bppublicschool.com
terapiademuerdago.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/568-66-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/568-67-0x000000000041D070-mapping.dmp xloader behavioral1/memory/884-74-0x00000000000C0000-0x00000000000E9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
revised quotation.exeRegSvcs.exesystray.exedescription pid process target process PID 1668 set thread context of 568 1668 revised quotation.exe RegSvcs.exe PID 568 set thread context of 1228 568 RegSvcs.exe Explorer.EXE PID 884 set thread context of 1228 884 systray.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
revised quotation.exeRegSvcs.exesystray.exepid process 1668 revised quotation.exe 1668 revised quotation.exe 1668 revised quotation.exe 1668 revised quotation.exe 1668 revised quotation.exe 1668 revised quotation.exe 568 RegSvcs.exe 568 RegSvcs.exe 884 systray.exe 884 systray.exe 884 systray.exe 884 systray.exe 884 systray.exe 884 systray.exe 884 systray.exe 884 systray.exe 884 systray.exe 884 systray.exe 884 systray.exe 884 systray.exe 884 systray.exe 884 systray.exe 884 systray.exe 884 systray.exe 884 systray.exe 884 systray.exe 884 systray.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
RegSvcs.exesystray.exepid process 568 RegSvcs.exe 568 RegSvcs.exe 568 RegSvcs.exe 884 systray.exe 884 systray.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
revised quotation.exeRegSvcs.exesystray.exedescription pid process Token: SeDebugPrivilege 1668 revised quotation.exe Token: SeDebugPrivilege 568 RegSvcs.exe Token: SeDebugPrivilege 884 systray.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE 1228 Explorer.EXE -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
revised quotation.exeExplorer.EXEsystray.exedescription pid process target process PID 1668 wrote to memory of 1288 1668 revised quotation.exe RegSvcs.exe PID 1668 wrote to memory of 1288 1668 revised quotation.exe RegSvcs.exe PID 1668 wrote to memory of 1288 1668 revised quotation.exe RegSvcs.exe PID 1668 wrote to memory of 1288 1668 revised quotation.exe RegSvcs.exe PID 1668 wrote to memory of 1288 1668 revised quotation.exe RegSvcs.exe PID 1668 wrote to memory of 1288 1668 revised quotation.exe RegSvcs.exe PID 1668 wrote to memory of 1288 1668 revised quotation.exe RegSvcs.exe PID 1668 wrote to memory of 852 1668 revised quotation.exe RegSvcs.exe PID 1668 wrote to memory of 852 1668 revised quotation.exe RegSvcs.exe PID 1668 wrote to memory of 852 1668 revised quotation.exe RegSvcs.exe PID 1668 wrote to memory of 852 1668 revised quotation.exe RegSvcs.exe PID 1668 wrote to memory of 852 1668 revised quotation.exe RegSvcs.exe PID 1668 wrote to memory of 852 1668 revised quotation.exe RegSvcs.exe PID 1668 wrote to memory of 852 1668 revised quotation.exe RegSvcs.exe PID 1668 wrote to memory of 568 1668 revised quotation.exe RegSvcs.exe PID 1668 wrote to memory of 568 1668 revised quotation.exe RegSvcs.exe PID 1668 wrote to memory of 568 1668 revised quotation.exe RegSvcs.exe PID 1668 wrote to memory of 568 1668 revised quotation.exe RegSvcs.exe PID 1668 wrote to memory of 568 1668 revised quotation.exe RegSvcs.exe PID 1668 wrote to memory of 568 1668 revised quotation.exe RegSvcs.exe PID 1668 wrote to memory of 568 1668 revised quotation.exe RegSvcs.exe PID 1668 wrote to memory of 568 1668 revised quotation.exe RegSvcs.exe PID 1668 wrote to memory of 568 1668 revised quotation.exe RegSvcs.exe PID 1668 wrote to memory of 568 1668 revised quotation.exe RegSvcs.exe PID 1228 wrote to memory of 884 1228 Explorer.EXE systray.exe PID 1228 wrote to memory of 884 1228 Explorer.EXE systray.exe PID 1228 wrote to memory of 884 1228 Explorer.EXE systray.exe PID 1228 wrote to memory of 884 1228 Explorer.EXE systray.exe PID 884 wrote to memory of 1840 884 systray.exe cmd.exe PID 884 wrote to memory of 1840 884 systray.exe cmd.exe PID 884 wrote to memory of 1840 884 systray.exe cmd.exe PID 884 wrote to memory of 1840 884 systray.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\revised quotation.exe"C:\Users\Admin\AppData\Local\Temp\revised quotation.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/568-66-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/568-69-0x00000000002B0000-0x00000000002C1000-memory.dmpFilesize
68KB
-
memory/568-68-0x0000000000840000-0x0000000000B43000-memory.dmpFilesize
3.0MB
-
memory/568-67-0x000000000041D070-mapping.dmp
-
memory/884-73-0x0000000000680000-0x0000000000685000-memory.dmpFilesize
20KB
-
memory/884-71-0x0000000000000000-mapping.dmp
-
memory/884-74-0x00000000000C0000-0x00000000000E9000-memory.dmpFilesize
164KB
-
memory/884-75-0x0000000001F40000-0x0000000002243000-memory.dmpFilesize
3.0MB
-
memory/884-76-0x0000000000530000-0x00000000005C0000-memory.dmpFilesize
576KB
-
memory/1228-70-0x00000000067D0000-0x0000000006900000-memory.dmpFilesize
1.2MB
-
memory/1228-77-0x00000000074D0000-0x000000000760E000-memory.dmpFilesize
1.2MB
-
memory/1668-65-0x0000000002030000-0x000000000205A000-memory.dmpFilesize
168KB
-
memory/1668-64-0x0000000004ED0000-0x0000000004F2D000-memory.dmpFilesize
372KB
-
memory/1668-63-0x00000000006F0000-0x0000000000706000-memory.dmpFilesize
88KB
-
memory/1668-62-0x00000000003E0000-0x00000000003E1000-memory.dmpFilesize
4KB
-
memory/1668-60-0x00000000008C0000-0x00000000008C1000-memory.dmpFilesize
4KB
-
memory/1840-72-0x0000000000000000-mapping.dmp