Analysis
-
max time kernel
147s -
max time network
142s -
platform
windows7_x64 -
resource
win7-en -
submitted
15-09-2021 07:32
Static task
static1
Behavioral task
behavioral1
Sample
Order List from Dunen Enterprise Corporation.exe
Resource
win7-en
Behavioral task
behavioral2
Sample
Order List from Dunen Enterprise Corporation.exe
Resource
win10v20210408
General
-
Target
Order List from Dunen Enterprise Corporation.exe
-
Size
128KB
-
MD5
744d832006910318b2826e4cc8db4b11
-
SHA1
b58f485d5153dc4cb1a608091e1174d6fc966a4a
-
SHA256
e015835dd69bbd384cb9b347984b648562281ba9e532ca110b6962bce9262251
-
SHA512
2ef7a81389e03fe8cdaa42e39e9df842d811b87b97d50e915e01d8fa35e3eaa49f7aaa03aa5a534e3413a636d3bf011ff9774a4b5b2553fbecef24aa8425deb4
Malware Config
Extracted
xloader
2.3
hhse
http://www.mx-online-service.xyz/hhse/
gujranwala.city
peinture-san-deco.com
disvapes.com
tekst-sanderlei.com
veryfastsnail.com
yaqiong.net
onlinebingocenter.com
kenttreesurgery.com
berislavic.com
ecomemailspack.com
drgustavoteyssier.com
mayfieldslodge.com
qiubaolink.com
kevinkensik.com
boatmanagementexpert.com
dbylkov.com
griffin-designs.com
glowlikethis.com
fuckjules.com
lxqc6688.com
cduyechang.com
jintelcare.com
abdiscountplumbing.com
merrilllynchph.com
yuanxinlv.com
chinapuma.com
covertroyalty.com
grouphall.net
unikpixls.com
rbainlaw.com
bold2x.com
eventosav.com
copywritermeg.com
geeeknozoid.com
physio-schmid.com
bankofsavings.com
xzttzs.com
water-note.com
gutter-rutter.com
wallis-applications.com
aurora-graphics.com
justindoorsoccer.com
drivly.net
allonot.com
splashseltzer.com
sanctuarymarbella.com
fossickandfind.com
sari-2.com
luxedesignsinc.com
cowlickgin.com
anothergeorgia.life
mainstreetmarketlillington.com
vibe-communications.com
nextgenrs.net
kosurvival.com
uvinq.com
crenate-throe.info
weazing.net
mydreamit.world
shortandsweetorganizing.com
24bitpay-trade.com
qianniaofan.com
thepccafe.com
solucionesautomotrices.info
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/748-66-0x0000000000401000-0x00000000004FD000-memory.dmp xloader behavioral1/memory/876-73-0x00000000000B0000-0x00000000000D8000-memory.dmp xloader -
Checks QEMU agent file 2 TTPs 2 IoCs
Checks presence of QEMU agent, possibly to detect virtualization.
Processes:
Order List from Dunen Enterprise Corporation.exeOrder List from Dunen Enterprise Corporation.exedescription ioc process File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe Order List from Dunen Enterprise Corporation.exe File opened (read-only) C:\Program Files\Qemu-ga\qemu-ga.exe Order List from Dunen Enterprise Corporation.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1260 cmd.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
Processes:
Order List from Dunen Enterprise Corporation.exeOrder List from Dunen Enterprise Corporation.exepid process 1656 Order List from Dunen Enterprise Corporation.exe 748 Order List from Dunen Enterprise Corporation.exe 748 Order List from Dunen Enterprise Corporation.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Order List from Dunen Enterprise Corporation.exeOrder List from Dunen Enterprise Corporation.exewscript.exedescription pid process target process PID 1656 set thread context of 748 1656 Order List from Dunen Enterprise Corporation.exe Order List from Dunen Enterprise Corporation.exe PID 748 set thread context of 1200 748 Order List from Dunen Enterprise Corporation.exe Explorer.EXE PID 876 set thread context of 1200 876 wscript.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
Order List from Dunen Enterprise Corporation.exewscript.exepid process 748 Order List from Dunen Enterprise Corporation.exe 748 Order List from Dunen Enterprise Corporation.exe 876 wscript.exe 876 wscript.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
Order List from Dunen Enterprise Corporation.exeOrder List from Dunen Enterprise Corporation.exewscript.exepid process 1656 Order List from Dunen Enterprise Corporation.exe 748 Order List from Dunen Enterprise Corporation.exe 748 Order List from Dunen Enterprise Corporation.exe 748 Order List from Dunen Enterprise Corporation.exe 876 wscript.exe 876 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Order List from Dunen Enterprise Corporation.exewscript.exedescription pid process Token: SeDebugPrivilege 748 Order List from Dunen Enterprise Corporation.exe Token: SeDebugPrivilege 876 wscript.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Order List from Dunen Enterprise Corporation.exepid process 1656 Order List from Dunen Enterprise Corporation.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Order List from Dunen Enterprise Corporation.exeExplorer.EXEwscript.exedescription pid process target process PID 1656 wrote to memory of 748 1656 Order List from Dunen Enterprise Corporation.exe Order List from Dunen Enterprise Corporation.exe PID 1656 wrote to memory of 748 1656 Order List from Dunen Enterprise Corporation.exe Order List from Dunen Enterprise Corporation.exe PID 1656 wrote to memory of 748 1656 Order List from Dunen Enterprise Corporation.exe Order List from Dunen Enterprise Corporation.exe PID 1656 wrote to memory of 748 1656 Order List from Dunen Enterprise Corporation.exe Order List from Dunen Enterprise Corporation.exe PID 1656 wrote to memory of 748 1656 Order List from Dunen Enterprise Corporation.exe Order List from Dunen Enterprise Corporation.exe PID 1200 wrote to memory of 876 1200 Explorer.EXE wscript.exe PID 1200 wrote to memory of 876 1200 Explorer.EXE wscript.exe PID 1200 wrote to memory of 876 1200 Explorer.EXE wscript.exe PID 1200 wrote to memory of 876 1200 Explorer.EXE wscript.exe PID 876 wrote to memory of 1260 876 wscript.exe cmd.exe PID 876 wrote to memory of 1260 876 wscript.exe cmd.exe PID 876 wrote to memory of 1260 876 wscript.exe cmd.exe PID 876 wrote to memory of 1260 876 wscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Order List from Dunen Enterprise Corporation.exe"C:\Users\Admin\AppData\Local\Temp\Order List from Dunen Enterprise Corporation.exe"2⤵
- Checks QEMU agent file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Order List from Dunen Enterprise Corporation.exe"C:\Users\Admin\AppData\Local\Temp\Order List from Dunen Enterprise Corporation.exe"3⤵
- Checks QEMU agent file
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Order List from Dunen Enterprise Corporation.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/748-62-0x00000000001B0000-0x00000000002B0000-memory.dmpFilesize
1024KB
-
memory/748-68-0x000000001DF10000-0x000000001E0D4000-memory.dmpFilesize
1.8MB
-
memory/748-57-0x0000000000401574-mapping.dmp
-
memory/748-58-0x0000000000400000-0x0000000000553000-memory.dmpFilesize
1.3MB
-
memory/748-67-0x000000001E7C0000-0x000000001EAC3000-memory.dmpFilesize
3.0MB
-
memory/748-66-0x0000000000401000-0x00000000004FD000-memory.dmpFilesize
1008KB
-
memory/748-65-0x0000000076D10000-0x0000000076EB9000-memory.dmpFilesize
1.7MB
-
memory/876-72-0x0000000000640000-0x0000000000666000-memory.dmpFilesize
152KB
-
memory/876-70-0x0000000000000000-mapping.dmp
-
memory/876-73-0x00000000000B0000-0x00000000000D8000-memory.dmpFilesize
160KB
-
memory/876-74-0x0000000002130000-0x0000000002433000-memory.dmpFilesize
3.0MB
-
memory/876-75-0x00000000004F0000-0x000000000057F000-memory.dmpFilesize
572KB
-
memory/1200-69-0x0000000006E30000-0x0000000006F7F000-memory.dmpFilesize
1.3MB
-
memory/1200-76-0x00000000050F0000-0x000000000521E000-memory.dmpFilesize
1.2MB
-
memory/1260-71-0x0000000000000000-mapping.dmp
-
memory/1656-61-0x0000000076F00000-0x0000000076FD6000-memory.dmpFilesize
856KB
-
memory/1656-60-0x0000000076EF0000-0x0000000077070000-memory.dmpFilesize
1.5MB
-
memory/1656-59-0x0000000076D10000-0x0000000076EB9000-memory.dmpFilesize
1.7MB
-
memory/1656-56-0x0000000075231000-0x0000000075233000-memory.dmpFilesize
8KB
-
memory/1656-54-0x00000000003D0000-0x00000000003E1000-memory.dmpFilesize
68KB