Analysis
-
max time kernel
300s -
max time network
302s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
24-09-2021 14:59
Static task
static1
Behavioral task
behavioral1
Sample
INVOICE.exe
Resource
win7-en-20210920
General
-
Target
INVOICE.exe
-
Size
1MB
-
MD5
3e0b369f71d263bd0918bfce2b1873c3
-
SHA1
0919aa900e50b290cc90426537ec25a9c44496b0
-
SHA256
c10f872ac7d56c5c8d5151eb8d5c3aba275f83bd55700c0dc38776a04b275175
-
SHA512
6c5cb90c5519dbaf90b2ca2183d6c48a1cd216eeb1eff02f16d1042cdde5955734c7ea52408e6ec907abb1a5e4c40eca40b9ed830a92315fad4660861e425c3f
Malware Config
Extracted
xloader
2.5
m6rs
http://www.litediv.com/m6rs/
globalsovereignbank.com
ktnrape.xyz
churchybulletin.com
ddyla.com
imatge.cat
iwholesalestore.com
cultivapro.club
ibcfcl.com
refurbisheddildo.com
killerinktnpasumo4.xyz
mdphotoart.com
smi-ity.com
stanprolearningcenter.com
companyintelapp.com
tacticarc.com
soolls.com
gra68.net
cedricettori.digital
mossobuy.com
way2liv.com
j9b.xyz
bmfgi.com
gargantua-traiteur.com
tavolabread.com
neoplus-create.com
tracks-clicks.com
santsp.com
tokusa-f.com
yardparx.online
seinvestments-sg.com
elegantbrushes.net
restaurantemachupicchu.com
ha0313.com
dock7rods.com
emphatictrifles.com
onefunline.top
caulsshop.com
kittyol.com
thehealthyheifer.net
plotmyplot.com
leewaysvcs.com
eur86.com
lightsinwall.com
jiankangkyw.com
travilent.com
dvaccounts.com
wittyon.com
tommywoodenski.com
dividendoylibertad.com
aqscksw.com
familiapena2475.com
australianmeatandwine.com
leading.delivery
giftcards2you.com
bethlehemsmith.com
osterparrots.com
getignore.com
joyandsatisfy.club
sanibelislandhomesearch.com
smedivision.com
kitcycle.com
hills-renta.com
brownbeargraphics.com
46sheridan.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2136-125-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2136-126-0x000000000041D3D0-mapping.dmp xloader behavioral2/memory/420-133-0x0000000001200000-0x0000000001229000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
INVOICE.exeINVOICE.execscript.exedescription pid process target process PID 2428 set thread context of 2136 2428 INVOICE.exe INVOICE.exe PID 2136 set thread context of 3028 2136 INVOICE.exe Explorer.EXE PID 420 set thread context of 3028 420 cscript.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
INVOICE.execscript.exepid process 2136 INVOICE.exe 2136 INVOICE.exe 2136 INVOICE.exe 2136 INVOICE.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe 420 cscript.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3028 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
INVOICE.execscript.exepid process 2136 INVOICE.exe 2136 INVOICE.exe 2136 INVOICE.exe 420 cscript.exe 420 cscript.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
INVOICE.execscript.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 2136 INVOICE.exe Token: SeDebugPrivilege 420 cscript.exe Token: SeShutdownPrivilege 3028 Explorer.EXE Token: SeCreatePagefilePrivilege 3028 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
INVOICE.exeExplorer.EXEcscript.exedescription pid process target process PID 2428 wrote to memory of 2136 2428 INVOICE.exe INVOICE.exe PID 2428 wrote to memory of 2136 2428 INVOICE.exe INVOICE.exe PID 2428 wrote to memory of 2136 2428 INVOICE.exe INVOICE.exe PID 2428 wrote to memory of 2136 2428 INVOICE.exe INVOICE.exe PID 2428 wrote to memory of 2136 2428 INVOICE.exe INVOICE.exe PID 2428 wrote to memory of 2136 2428 INVOICE.exe INVOICE.exe PID 3028 wrote to memory of 420 3028 Explorer.EXE cscript.exe PID 3028 wrote to memory of 420 3028 Explorer.EXE cscript.exe PID 3028 wrote to memory of 420 3028 Explorer.EXE cscript.exe PID 420 wrote to memory of 1252 420 cscript.exe cmd.exe PID 420 wrote to memory of 1252 420 cscript.exe cmd.exe PID 420 wrote to memory of 1252 420 cscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\INVOICE.exe"C:\Users\Admin\AppData\Local\Temp\INVOICE.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\INVOICE.exe"C:\Users\Admin\AppData\Local\Temp\INVOICE.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\INVOICE.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/420-130-0x0000000000000000-mapping.dmp
-
memory/420-135-0x0000000004CE0000-0x0000000004D70000-memory.dmpFilesize
576KB
-
memory/420-132-0x00000000012C0000-0x00000000012E7000-memory.dmpFilesize
156KB
-
memory/420-134-0x0000000004930000-0x0000000004C50000-memory.dmpFilesize
3MB
-
memory/420-133-0x0000000001200000-0x0000000001229000-memory.dmpFilesize
164KB
-
memory/1252-131-0x0000000000000000-mapping.dmp
-
memory/2136-126-0x000000000041D3D0-mapping.dmp
-
memory/2136-128-0x0000000001470000-0x0000000001481000-memory.dmpFilesize
68KB
-
memory/2136-127-0x00000000017A0000-0x0000000001AC0000-memory.dmpFilesize
3MB
-
memory/2136-125-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2428-120-0x0000000004AA0000-0x0000000004AA1000-memory.dmpFilesize
4KB
-
memory/2428-115-0x0000000000160000-0x0000000000161000-memory.dmpFilesize
4KB
-
memory/2428-124-0x00000000073F0000-0x0000000007422000-memory.dmpFilesize
200KB
-
memory/2428-122-0x0000000004CF0000-0x0000000004CF7000-memory.dmpFilesize
28KB
-
memory/2428-121-0x0000000006EF0000-0x0000000006EF1000-memory.dmpFilesize
4KB
-
memory/2428-123-0x0000000007280000-0x00000000072E1000-memory.dmpFilesize
388KB
-
memory/2428-119-0x0000000004BC0000-0x00000000050BE000-memory.dmpFilesize
4MB
-
memory/2428-118-0x0000000004AC0000-0x0000000004AC1000-memory.dmpFilesize
4KB
-
memory/2428-117-0x00000000050C0000-0x00000000050C1000-memory.dmpFilesize
4KB
-
memory/3028-129-0x00000000065B0000-0x00000000066E0000-memory.dmpFilesize
1MB
-
memory/3028-136-0x0000000002F90000-0x000000000306B000-memory.dmpFilesize
876KB