Analysis
-
max time kernel
601s -
max time network
627s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
24-09-2021 03:40
Static task
static1
Behavioral task
behavioral1
Sample
QUOTE PRICE.exe
Resource
win7v20210408
General
-
Target
QUOTE PRICE.exe
-
Size
558KB
-
MD5
3a35017603b428f692151484ad54ded0
-
SHA1
ac071c363f33e2a28aaffc77e5a34642d8246fe0
-
SHA256
45f5e2a682896ac3380522e26a0398b8112bafc42948666c9fecafa3dcab69e3
-
SHA512
6a2c113565aca37d63de00cdd59354400e901bb731d35e53a42951463662374dec5dfb83d109f059b59733abaf3c0f2057a87c22f69b2d738af37b6f19409d8d
Malware Config
Extracted
xloader
2.5
m6rs
http://www.litediv.com/m6rs/
globalsovereignbank.com
ktnrape.xyz
churchybulletin.com
ddyla.com
imatge.cat
iwholesalestore.com
cultivapro.club
ibcfcl.com
refurbisheddildo.com
killerinktnpasumo4.xyz
mdphotoart.com
smi-ity.com
stanprolearningcenter.com
companyintelapp.com
tacticarc.com
soolls.com
gra68.net
cedricettori.digital
mossobuy.com
way2liv.com
j9b.xyz
bmfgi.com
gargantua-traiteur.com
tavolabread.com
neoplus-create.com
tracks-clicks.com
santsp.com
tokusa-f.com
yardparx.online
seinvestments-sg.com
elegantbrushes.net
restaurantemachupicchu.com
ha0313.com
dock7rods.com
emphatictrifles.com
onefunline.top
caulsshop.com
kittyol.com
thehealthyheifer.net
plotmyplot.com
leewaysvcs.com
eur86.com
lightsinwall.com
jiankangkyw.com
travilent.com
dvaccounts.com
wittyon.com
tommywoodenski.com
dividendoylibertad.com
aqscksw.com
familiapena2475.com
australianmeatandwine.com
leading.delivery
giftcards2you.com
bethlehemsmith.com
osterparrots.com
getignore.com
joyandsatisfy.club
sanibelislandhomesearch.com
smedivision.com
kitcycle.com
hills-renta.com
brownbeargraphics.com
46sheridan.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/568-66-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/568-67-0x000000000041D3D0-mapping.dmp xloader behavioral1/memory/1872-74-0x00000000000D0000-0x00000000000F9000-memory.dmp xloader behavioral1/memory/1504-92-0x000000000041D3D0-mapping.dmp xloader -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
cscript.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run cscript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\9REXANEHI = "C:\\Program Files (x86)\\Myxnhgbd\\mser6hzluh.exe" cscript.exe -
Executes dropped EXE 2 IoCs
Processes:
mser6hzluh.exemser6hzluh.exepid process 1164 mser6hzluh.exe 1504 mser6hzluh.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1720 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 4 IoCs
Processes:
QUOTE PRICE.exeQUOTE PRICE.execscript.exemser6hzluh.exedescription pid process target process PID 1824 set thread context of 568 1824 QUOTE PRICE.exe QUOTE PRICE.exe PID 568 set thread context of 1212 568 QUOTE PRICE.exe Explorer.EXE PID 1872 set thread context of 1212 1872 cscript.exe Explorer.EXE PID 1164 set thread context of 1504 1164 mser6hzluh.exe mser6hzluh.exe -
Drops file in Program Files directory 2 IoCs
Processes:
Explorer.EXEcscript.exedescription ioc process File created C:\Program Files (x86)\Myxnhgbd\mser6hzluh.exe Explorer.EXE File opened for modification C:\Program Files (x86)\Myxnhgbd\mser6hzluh.exe cscript.exe -
Processes:
cscript.exedescription ioc process Key created \Registry\User\S-1-5-21-2455352368-1077083310-2879168483-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cscript.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
QUOTE PRICE.exeQUOTE PRICE.execscript.exepid process 1824 QUOTE PRICE.exe 568 QUOTE PRICE.exe 568 QUOTE PRICE.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1212 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
QUOTE PRICE.execscript.exepid process 568 QUOTE PRICE.exe 568 QUOTE PRICE.exe 568 QUOTE PRICE.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe 1872 cscript.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
QUOTE PRICE.exeQUOTE PRICE.execscript.exeExplorer.EXEmser6hzluh.exedescription pid process Token: SeDebugPrivilege 1824 QUOTE PRICE.exe Token: SeDebugPrivilege 568 QUOTE PRICE.exe Token: SeDebugPrivilege 1872 cscript.exe Token: SeShutdownPrivilege 1212 Explorer.EXE Token: SeDebugPrivilege 1504 mser6hzluh.exe Token: SeShutdownPrivilege 1212 Explorer.EXE -
Suspicious use of FindShellTrayWindow 4 IoCs
Processes:
Explorer.EXEpid process 1212 Explorer.EXE 1212 Explorer.EXE 1212 Explorer.EXE 1212 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 1212 Explorer.EXE 1212 Explorer.EXE 1212 Explorer.EXE 1212 Explorer.EXE -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
QUOTE PRICE.exeExplorer.EXEcscript.exemser6hzluh.exedescription pid process target process PID 1824 wrote to memory of 932 1824 QUOTE PRICE.exe QUOTE PRICE.exe PID 1824 wrote to memory of 932 1824 QUOTE PRICE.exe QUOTE PRICE.exe PID 1824 wrote to memory of 932 1824 QUOTE PRICE.exe QUOTE PRICE.exe PID 1824 wrote to memory of 932 1824 QUOTE PRICE.exe QUOTE PRICE.exe PID 1824 wrote to memory of 568 1824 QUOTE PRICE.exe QUOTE PRICE.exe PID 1824 wrote to memory of 568 1824 QUOTE PRICE.exe QUOTE PRICE.exe PID 1824 wrote to memory of 568 1824 QUOTE PRICE.exe QUOTE PRICE.exe PID 1824 wrote to memory of 568 1824 QUOTE PRICE.exe QUOTE PRICE.exe PID 1824 wrote to memory of 568 1824 QUOTE PRICE.exe QUOTE PRICE.exe PID 1824 wrote to memory of 568 1824 QUOTE PRICE.exe QUOTE PRICE.exe PID 1824 wrote to memory of 568 1824 QUOTE PRICE.exe QUOTE PRICE.exe PID 1212 wrote to memory of 1872 1212 Explorer.EXE cscript.exe PID 1212 wrote to memory of 1872 1212 Explorer.EXE cscript.exe PID 1212 wrote to memory of 1872 1212 Explorer.EXE cscript.exe PID 1212 wrote to memory of 1872 1212 Explorer.EXE cscript.exe PID 1872 wrote to memory of 1720 1872 cscript.exe cmd.exe PID 1872 wrote to memory of 1720 1872 cscript.exe cmd.exe PID 1872 wrote to memory of 1720 1872 cscript.exe cmd.exe PID 1872 wrote to memory of 1720 1872 cscript.exe cmd.exe PID 1212 wrote to memory of 1164 1212 Explorer.EXE mser6hzluh.exe PID 1212 wrote to memory of 1164 1212 Explorer.EXE mser6hzluh.exe PID 1212 wrote to memory of 1164 1212 Explorer.EXE mser6hzluh.exe PID 1212 wrote to memory of 1164 1212 Explorer.EXE mser6hzluh.exe PID 1872 wrote to memory of 1332 1872 cscript.exe Firefox.exe PID 1872 wrote to memory of 1332 1872 cscript.exe Firefox.exe PID 1872 wrote to memory of 1332 1872 cscript.exe Firefox.exe PID 1872 wrote to memory of 1332 1872 cscript.exe Firefox.exe PID 1872 wrote to memory of 1332 1872 cscript.exe Firefox.exe PID 1164 wrote to memory of 1504 1164 mser6hzluh.exe mser6hzluh.exe PID 1164 wrote to memory of 1504 1164 mser6hzluh.exe mser6hzluh.exe PID 1164 wrote to memory of 1504 1164 mser6hzluh.exe mser6hzluh.exe PID 1164 wrote to memory of 1504 1164 mser6hzluh.exe mser6hzluh.exe PID 1164 wrote to memory of 1504 1164 mser6hzluh.exe mser6hzluh.exe PID 1164 wrote to memory of 1504 1164 mser6hzluh.exe mser6hzluh.exe PID 1164 wrote to memory of 1504 1164 mser6hzluh.exe mser6hzluh.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
cscript.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer cscript.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Drops file in Program Files directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\QUOTE PRICE.exe"C:\Users\Admin\AppData\Local\Temp\QUOTE PRICE.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\QUOTE PRICE.exe"C:\Users\Admin\AppData\Local\Temp\QUOTE PRICE.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\QUOTE PRICE.exe"C:\Users\Admin\AppData\Local\Temp\QUOTE PRICE.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Adds policy Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\QUOTE PRICE.exe"3⤵
- Deletes itself
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵
-
C:\Program Files (x86)\Myxnhgbd\mser6hzluh.exe"C:\Program Files (x86)\Myxnhgbd\mser6hzluh.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Myxnhgbd\mser6hzluh.exe"C:\Program Files (x86)\Myxnhgbd\mser6hzluh.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Myxnhgbd\mser6hzluh.exeMD5
3a35017603b428f692151484ad54ded0
SHA1ac071c363f33e2a28aaffc77e5a34642d8246fe0
SHA25645f5e2a682896ac3380522e26a0398b8112bafc42948666c9fecafa3dcab69e3
SHA5126a2c113565aca37d63de00cdd59354400e901bb731d35e53a42951463662374dec5dfb83d109f059b59733abaf3c0f2057a87c22f69b2d738af37b6f19409d8d
-
C:\Program Files (x86)\Myxnhgbd\mser6hzluh.exeMD5
3a35017603b428f692151484ad54ded0
SHA1ac071c363f33e2a28aaffc77e5a34642d8246fe0
SHA25645f5e2a682896ac3380522e26a0398b8112bafc42948666c9fecafa3dcab69e3
SHA5126a2c113565aca37d63de00cdd59354400e901bb731d35e53a42951463662374dec5dfb83d109f059b59733abaf3c0f2057a87c22f69b2d738af37b6f19409d8d
-
C:\Program Files (x86)\Myxnhgbd\mser6hzluh.exeMD5
3a35017603b428f692151484ad54ded0
SHA1ac071c363f33e2a28aaffc77e5a34642d8246fe0
SHA25645f5e2a682896ac3380522e26a0398b8112bafc42948666c9fecafa3dcab69e3
SHA5126a2c113565aca37d63de00cdd59354400e901bb731d35e53a42951463662374dec5dfb83d109f059b59733abaf3c0f2057a87c22f69b2d738af37b6f19409d8d
-
memory/568-66-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/568-67-0x000000000041D3D0-mapping.dmp
-
memory/568-68-0x0000000000910000-0x0000000000C13000-memory.dmpFilesize
3.0MB
-
memory/568-69-0x0000000000290000-0x00000000002A1000-memory.dmpFilesize
68KB
-
memory/1164-85-0x0000000004E60000-0x0000000004E61000-memory.dmpFilesize
4KB
-
memory/1164-81-0x0000000000DE0000-0x0000000000DE1000-memory.dmpFilesize
4KB
-
memory/1164-78-0x0000000000000000-mapping.dmp
-
memory/1212-70-0x0000000004E80000-0x0000000004FD6000-memory.dmpFilesize
1.3MB
-
memory/1212-77-0x0000000003E20000-0x0000000003EB9000-memory.dmpFilesize
612KB
-
memory/1332-88-0x0000000002410000-0x00000000024A9000-memory.dmpFilesize
612KB
-
memory/1332-86-0x0000000000000000-mapping.dmp
-
memory/1332-87-0x000000013F780000-0x000000013F813000-memory.dmpFilesize
588KB
-
memory/1504-92-0x000000000041D3D0-mapping.dmp
-
memory/1504-94-0x00000000009C0000-0x0000000000CC3000-memory.dmpFilesize
3.0MB
-
memory/1720-72-0x0000000000000000-mapping.dmp
-
memory/1824-60-0x0000000001130000-0x0000000001131000-memory.dmpFilesize
4KB
-
memory/1824-65-0x0000000000C10000-0x0000000000C4A000-memory.dmpFilesize
232KB
-
memory/1824-64-0x0000000004F10000-0x0000000004F79000-memory.dmpFilesize
420KB
-
memory/1824-63-0x00000000009C0000-0x00000000009DD000-memory.dmpFilesize
116KB
-
memory/1824-62-0x0000000004D90000-0x0000000004D91000-memory.dmpFilesize
4KB
-
memory/1872-75-0x00000000021A0000-0x00000000024A3000-memory.dmpFilesize
3.0MB
-
memory/1872-84-0x0000000075801000-0x0000000075803000-memory.dmpFilesize
8KB
-
memory/1872-76-0x0000000000470000-0x0000000000500000-memory.dmpFilesize
576KB
-
memory/1872-74-0x00000000000D0000-0x00000000000F9000-memory.dmpFilesize
164KB
-
memory/1872-73-0x0000000000910000-0x0000000000932000-memory.dmpFilesize
136KB
-
memory/1872-71-0x0000000000000000-mapping.dmp