Analysis
-
max time kernel
150s -
max time network
131s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
24-09-2021 14:25
Static task
static1
Behavioral task
behavioral1
Sample
INVOICE.exe
Resource
win7-en-20210920
General
-
Target
INVOICE.exe
-
Size
1.0MB
-
MD5
3e0b369f71d263bd0918bfce2b1873c3
-
SHA1
0919aa900e50b290cc90426537ec25a9c44496b0
-
SHA256
c10f872ac7d56c5c8d5151eb8d5c3aba275f83bd55700c0dc38776a04b275175
-
SHA512
6c5cb90c5519dbaf90b2ca2183d6c48a1cd216eeb1eff02f16d1042cdde5955734c7ea52408e6ec907abb1a5e4c40eca40b9ed830a92315fad4660861e425c3f
Malware Config
Extracted
xloader
2.5
m6rs
http://www.litediv.com/m6rs/
globalsovereignbank.com
ktnrape.xyz
churchybulletin.com
ddyla.com
imatge.cat
iwholesalestore.com
cultivapro.club
ibcfcl.com
refurbisheddildo.com
killerinktnpasumo4.xyz
mdphotoart.com
smi-ity.com
stanprolearningcenter.com
companyintelapp.com
tacticarc.com
soolls.com
gra68.net
cedricettori.digital
mossobuy.com
way2liv.com
j9b.xyz
bmfgi.com
gargantua-traiteur.com
tavolabread.com
neoplus-create.com
tracks-clicks.com
santsp.com
tokusa-f.com
yardparx.online
seinvestments-sg.com
elegantbrushes.net
restaurantemachupicchu.com
ha0313.com
dock7rods.com
emphatictrifles.com
onefunline.top
caulsshop.com
kittyol.com
thehealthyheifer.net
plotmyplot.com
leewaysvcs.com
eur86.com
lightsinwall.com
jiankangkyw.com
travilent.com
dvaccounts.com
wittyon.com
tommywoodenski.com
dividendoylibertad.com
aqscksw.com
familiapena2475.com
australianmeatandwine.com
leading.delivery
giftcards2you.com
bethlehemsmith.com
osterparrots.com
getignore.com
joyandsatisfy.club
sanibelislandhomesearch.com
smedivision.com
kitcycle.com
hills-renta.com
brownbeargraphics.com
46sheridan.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/876-61-0x000000000041D3D0-mapping.dmp xloader behavioral1/memory/876-60-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/868-70-0x0000000000090000-0x00000000000B9000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1540 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
INVOICE.exeINVOICE.exemsiexec.exedescription pid process target process PID 1652 set thread context of 876 1652 INVOICE.exe INVOICE.exe PID 876 set thread context of 1216 876 INVOICE.exe Explorer.EXE PID 876 set thread context of 1216 876 INVOICE.exe Explorer.EXE PID 868 set thread context of 1216 868 msiexec.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
INVOICE.exeINVOICE.exemsiexec.exepid process 1652 INVOICE.exe 876 INVOICE.exe 876 INVOICE.exe 876 INVOICE.exe 868 msiexec.exe 868 msiexec.exe 868 msiexec.exe 868 msiexec.exe 868 msiexec.exe 868 msiexec.exe 868 msiexec.exe 868 msiexec.exe 868 msiexec.exe 868 msiexec.exe 868 msiexec.exe 868 msiexec.exe 868 msiexec.exe 868 msiexec.exe 868 msiexec.exe 868 msiexec.exe 868 msiexec.exe 868 msiexec.exe 868 msiexec.exe 868 msiexec.exe 868 msiexec.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
INVOICE.exemsiexec.exepid process 876 INVOICE.exe 876 INVOICE.exe 876 INVOICE.exe 876 INVOICE.exe 868 msiexec.exe 868 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
INVOICE.exeINVOICE.exemsiexec.exedescription pid process Token: SeDebugPrivilege 1652 INVOICE.exe Token: SeDebugPrivilege 876 INVOICE.exe Token: SeDebugPrivilege 868 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1216 Explorer.EXE 1216 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1216 Explorer.EXE 1216 Explorer.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
INVOICE.exeExplorer.EXEmsiexec.exedescription pid process target process PID 1652 wrote to memory of 1252 1652 INVOICE.exe INVOICE.exe PID 1652 wrote to memory of 1252 1652 INVOICE.exe INVOICE.exe PID 1652 wrote to memory of 1252 1652 INVOICE.exe INVOICE.exe PID 1652 wrote to memory of 1252 1652 INVOICE.exe INVOICE.exe PID 1652 wrote to memory of 876 1652 INVOICE.exe INVOICE.exe PID 1652 wrote to memory of 876 1652 INVOICE.exe INVOICE.exe PID 1652 wrote to memory of 876 1652 INVOICE.exe INVOICE.exe PID 1652 wrote to memory of 876 1652 INVOICE.exe INVOICE.exe PID 1652 wrote to memory of 876 1652 INVOICE.exe INVOICE.exe PID 1652 wrote to memory of 876 1652 INVOICE.exe INVOICE.exe PID 1652 wrote to memory of 876 1652 INVOICE.exe INVOICE.exe PID 1216 wrote to memory of 868 1216 Explorer.EXE msiexec.exe PID 1216 wrote to memory of 868 1216 Explorer.EXE msiexec.exe PID 1216 wrote to memory of 868 1216 Explorer.EXE msiexec.exe PID 1216 wrote to memory of 868 1216 Explorer.EXE msiexec.exe PID 1216 wrote to memory of 868 1216 Explorer.EXE msiexec.exe PID 1216 wrote to memory of 868 1216 Explorer.EXE msiexec.exe PID 1216 wrote to memory of 868 1216 Explorer.EXE msiexec.exe PID 868 wrote to memory of 1540 868 msiexec.exe cmd.exe PID 868 wrote to memory of 1540 868 msiexec.exe cmd.exe PID 868 wrote to memory of 1540 868 msiexec.exe cmd.exe PID 868 wrote to memory of 1540 868 msiexec.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\INVOICE.exe"C:\Users\Admin\AppData\Local\Temp\INVOICE.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\INVOICE.exe"C:\Users\Admin\AppData\Local\Temp\INVOICE.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\INVOICE.exe"C:\Users\Admin\AppData\Local\Temp\INVOICE.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\INVOICE.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/868-67-0x0000000000000000-mapping.dmp
-
memory/868-73-0x0000000000AC0000-0x0000000000B50000-memory.dmpFilesize
576KB
-
memory/868-69-0x0000000000160000-0x0000000000174000-memory.dmpFilesize
80KB
-
memory/868-70-0x0000000000090000-0x00000000000B9000-memory.dmpFilesize
164KB
-
memory/868-71-0x00000000023A0000-0x00000000026A3000-memory.dmpFilesize
3.0MB
-
memory/868-68-0x0000000074C71000-0x0000000074C73000-memory.dmpFilesize
8KB
-
memory/876-61-0x000000000041D3D0-mapping.dmp
-
memory/876-62-0x0000000000B60000-0x0000000000E63000-memory.dmpFilesize
3.0MB
-
memory/876-65-0x00000000002F0000-0x0000000000301000-memory.dmpFilesize
68KB
-
memory/876-60-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/876-63-0x0000000000180000-0x0000000000191000-memory.dmpFilesize
68KB
-
memory/1216-64-0x0000000006390000-0x00000000064C8000-memory.dmpFilesize
1.2MB
-
memory/1216-66-0x0000000007560000-0x00000000076FC000-memory.dmpFilesize
1.6MB
-
memory/1216-74-0x0000000004330000-0x00000000043D6000-memory.dmpFilesize
664KB
-
memory/1540-72-0x0000000000000000-mapping.dmp
-
memory/1652-54-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/1652-57-0x0000000000590000-0x0000000000597000-memory.dmpFilesize
28KB
-
memory/1652-58-0x0000000004B40000-0x0000000004BA1000-memory.dmpFilesize
388KB
-
memory/1652-56-0x0000000000900000-0x0000000000901000-memory.dmpFilesize
4KB
-
memory/1652-59-0x00000000009B0000-0x00000000009E2000-memory.dmpFilesize
200KB