Analysis
-
max time kernel
300s -
max time network
294s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
28-09-2021 16:37
Static task
static1
Behavioral task
behavioral1
Sample
REVISED OFFER.exe
Resource
win7v20210408
General
-
Target
REVISED OFFER.exe
-
Size
1.5MB
-
MD5
a23d32321c572b877246453f426494d2
-
SHA1
23f03a3533053b06acc915bcb33e9a8ebfdfa010
-
SHA256
9748d96e1143a06277d9cc3e9398d366fe3fa21c4316b8134462c42a0020fe87
-
SHA512
356ddaaf71c6d409450a558a51d8c43a8edcccf283fdf24d1c7d81a10bf21123e1b1abffae63694219bb7b2192704fd885d8a8a7409e481a6629763b7d5e2555
Malware Config
Extracted
xloader
2.5
c2ue
http://www.heidevelop.xyz/c2ue/
isportdata.com
stellarex.energy
hsucollections.com
menuhaisan.com
joe-tzu.com
lumichargemktg.com
uae.tires
rapidcae.com
softwaresystemsolutions.com
s-galaxy.website
daewon-talks.net
northgamesnetwork.com
catalogue-bouyguestele.com
criativanet.com
theseasonalshift.com
actionfoto.online
openmaildoe.com
trashpenguin.com
ennopure.net
azurermine.com
wingkingtong.com
innovativepropsolutions.com
transportesajusco.online
rosenblasts.info
ttsports.store
servpix.com
liveatthebiltmore.com
magentautil.com
aquolly.com
collabsales.com
bredaslo.com
suddisaddu.com
www920011a.com
uudh.info
bleuexpress.com
xivuko.com
upstatehvacpros.com
acami.art
thqahql.com
mauzabe.com
mydrones.net
franciseshun.com
nrrpri.com
adndpanel.xyz
straightcorndinner.xyz
locngrip.com
wgylab.xyz
greenmamba100.com
dmglobalconsult.net
alissanoume.xyz
thecallresources.com
spacesuperslot.com
goodiste.com
mensaheating.xyz
blackbait6.com
keepkalmm.com
kodyhughesracing.com
semantikgis.com
saffoldstrucking.com
ingb.online
popcert.com
tpsynergylab.com
acnefreerx.com
why1314.xyz
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3364-128-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3364-129-0x000000000041D3A0-mapping.dmp xloader behavioral2/memory/688-136-0x0000000000BA0000-0x0000000000BC9000-memory.dmp xloader -
Blocklisted process makes network request 1 IoCs
Processes:
cmd.exeflow pid process 83 688 cmd.exe -
Executes dropped EXE 1 IoCs
Processes:
regsvc2drxg.exepid process 1664 regsvc2drxg.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
cmd.exedescription ioc process Key created \Registry\Machine\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\6LCXULEXCN = "C:\\Program Files (x86)\\Abrk\\regsvc2drxg.exe" cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
REVISED OFFER.exeREVISED OFFER.execmd.exedescription pid process target process PID 2384 set thread context of 3364 2384 REVISED OFFER.exe REVISED OFFER.exe PID 3364 set thread context of 1588 3364 REVISED OFFER.exe Explorer.EXE PID 688 set thread context of 1588 688 cmd.exe Explorer.EXE -
Drops file in Program Files directory 4 IoCs
Processes:
Explorer.EXEcmd.exedescription ioc process File opened for modification C:\Program Files (x86)\Abrk Explorer.EXE File created C:\Program Files (x86)\Abrk\regsvc2drxg.exe Explorer.EXE File opened for modification C:\Program Files (x86)\Abrk\regsvc2drxg.exe Explorer.EXE File opened for modification C:\Program Files (x86)\Abrk\regsvc2drxg.exe cmd.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1780 1664 WerFault.exe regsvc2drxg.exe -
Processes:
cmd.exedescription ioc process Key created \Registry\User\S-1-5-21-2481030822-2828258191-1606198294-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
REVISED OFFER.execmd.exeWerFault.exepid process 3364 REVISED OFFER.exe 3364 REVISED OFFER.exe 3364 REVISED OFFER.exe 3364 REVISED OFFER.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 1780 WerFault.exe 1780 WerFault.exe 1780 WerFault.exe 1780 WerFault.exe 1780 WerFault.exe 1780 WerFault.exe 1780 WerFault.exe 1780 WerFault.exe 1780 WerFault.exe 1780 WerFault.exe 1780 WerFault.exe 1780 WerFault.exe 1780 WerFault.exe 688 cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1588 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
REVISED OFFER.execmd.exepid process 3364 REVISED OFFER.exe 3364 REVISED OFFER.exe 3364 REVISED OFFER.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe 688 cmd.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
REVISED OFFER.execmd.exeWerFault.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 3364 REVISED OFFER.exe Token: SeDebugPrivilege 688 cmd.exe Token: SeRestorePrivilege 1780 WerFault.exe Token: SeBackupPrivilege 1780 WerFault.exe Token: SeDebugPrivilege 1780 WerFault.exe Token: SeShutdownPrivilege 1588 Explorer.EXE Token: SeCreatePagefilePrivilege 1588 Explorer.EXE Token: SeShutdownPrivilege 1588 Explorer.EXE Token: SeCreatePagefilePrivilege 1588 Explorer.EXE Token: SeShutdownPrivilege 1588 Explorer.EXE Token: SeCreatePagefilePrivilege 1588 Explorer.EXE Token: SeShutdownPrivilege 1588 Explorer.EXE Token: SeCreatePagefilePrivilege 1588 Explorer.EXE Token: SeShutdownPrivilege 1588 Explorer.EXE Token: SeCreatePagefilePrivilege 1588 Explorer.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
REVISED OFFER.exeExplorer.EXEcmd.exedescription pid process target process PID 2384 wrote to memory of 3364 2384 REVISED OFFER.exe REVISED OFFER.exe PID 2384 wrote to memory of 3364 2384 REVISED OFFER.exe REVISED OFFER.exe PID 2384 wrote to memory of 3364 2384 REVISED OFFER.exe REVISED OFFER.exe PID 2384 wrote to memory of 3364 2384 REVISED OFFER.exe REVISED OFFER.exe PID 2384 wrote to memory of 3364 2384 REVISED OFFER.exe REVISED OFFER.exe PID 2384 wrote to memory of 3364 2384 REVISED OFFER.exe REVISED OFFER.exe PID 1588 wrote to memory of 688 1588 Explorer.EXE cmd.exe PID 1588 wrote to memory of 688 1588 Explorer.EXE cmd.exe PID 1588 wrote to memory of 688 1588 Explorer.EXE cmd.exe PID 688 wrote to memory of 3656 688 cmd.exe cmd.exe PID 688 wrote to memory of 3656 688 cmd.exe cmd.exe PID 688 wrote to memory of 3656 688 cmd.exe cmd.exe PID 688 wrote to memory of 2744 688 cmd.exe cmd.exe PID 688 wrote to memory of 2744 688 cmd.exe cmd.exe PID 688 wrote to memory of 2744 688 cmd.exe cmd.exe PID 688 wrote to memory of 832 688 cmd.exe Firefox.exe PID 688 wrote to memory of 832 688 cmd.exe Firefox.exe PID 1588 wrote to memory of 1664 1588 Explorer.EXE regsvc2drxg.exe PID 1588 wrote to memory of 1664 1588 Explorer.EXE regsvc2drxg.exe PID 1588 wrote to memory of 1664 1588 Explorer.EXE regsvc2drxg.exe PID 688 wrote to memory of 832 688 cmd.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Drops file in Program Files directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\REVISED OFFER.exe"C:\Users\Admin\AppData\Local\Temp\REVISED OFFER.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\REVISED OFFER.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Blocklisted process makes network request
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\REVISED OFFER.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe/c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V3⤵
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵
-
C:\Program Files (x86)\Abrk\regsvc2drxg.exe"C:\Program Files (x86)\Abrk\regsvc2drxg.exe"2⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1664 -s 13843⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Abrk\regsvc2drxg.exeMD5
a4053642ae0117de67a2294a84cfb849
SHA1e905481a61bf2bfad205036a4669554e577cd48f
SHA2562cee699a912f1570ce8e5511ea10fba38446a1605f3fef1cbe32f683bb41ccc2
SHA5127688578b5c8aff975653b42fcd9001f9424d195b9a1484233205c5bccef9c8ac139341105de32aa354edfa63f83334533076412d0d4ba529a64a30969ca6e98a
-
C:\Program Files (x86)\Abrk\regsvc2drxg.exeMD5
a4053642ae0117de67a2294a84cfb849
SHA1e905481a61bf2bfad205036a4669554e577cd48f
SHA2562cee699a912f1570ce8e5511ea10fba38446a1605f3fef1cbe32f683bb41ccc2
SHA5127688578b5c8aff975653b42fcd9001f9424d195b9a1484233205c5bccef9c8ac139341105de32aa354edfa63f83334533076412d0d4ba529a64a30969ca6e98a
-
C:\Users\Admin\AppData\Local\Temp\DB1MD5
b608d407fc15adea97c26936bc6f03f6
SHA1953e7420801c76393902c0d6bb56148947e41571
SHA256b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf
SHA512cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4
-
memory/688-133-0x0000000000000000-mapping.dmp
-
memory/688-136-0x0000000000BA0000-0x0000000000BC9000-memory.dmpFilesize
164KB
-
memory/688-137-0x0000000003480000-0x00000000037A0000-memory.dmpFilesize
3.1MB
-
memory/688-138-0x00000000037A0000-0x0000000003830000-memory.dmpFilesize
576KB
-
memory/688-135-0x0000000000D90000-0x0000000000DE9000-memory.dmpFilesize
356KB
-
memory/832-155-0x0000000000000000-mapping.dmp
-
memory/832-156-0x00007FF776950000-0x00007FF7769E3000-memory.dmpFilesize
588KB
-
memory/832-157-0x00000198B8CD0000-0x00000198B8DE7000-memory.dmpFilesize
1.1MB
-
memory/1588-132-0x0000000000880000-0x0000000000957000-memory.dmpFilesize
860KB
-
memory/1588-139-0x0000000004ED0000-0x0000000004F89000-memory.dmpFilesize
740KB
-
memory/1664-154-0x0000000005180000-0x0000000005212000-memory.dmpFilesize
584KB
-
memory/1664-142-0x0000000000000000-mapping.dmp
-
memory/1664-151-0x00000000074C0000-0x00000000074C1000-memory.dmpFilesize
4KB
-
memory/2384-124-0x0000000008EA0000-0x0000000008EA1000-memory.dmpFilesize
4KB
-
memory/2384-121-0x0000000004EE0000-0x0000000004EE1000-memory.dmpFilesize
4KB
-
memory/2384-117-0x0000000005560000-0x0000000005561000-memory.dmpFilesize
4KB
-
memory/2384-118-0x0000000004F10000-0x0000000004F11000-memory.dmpFilesize
4KB
-
memory/2384-119-0x0000000004FB0000-0x0000000004FB1000-memory.dmpFilesize
4KB
-
memory/2384-120-0x0000000005060000-0x000000000555E000-memory.dmpFilesize
5.0MB
-
memory/2384-127-0x0000000009170000-0x000000000919B000-memory.dmpFilesize
172KB
-
memory/2384-126-0x00000000090F0000-0x000000000916E000-memory.dmpFilesize
504KB
-
memory/2384-122-0x0000000007710000-0x0000000007711000-memory.dmpFilesize
4KB
-
memory/2384-125-0x0000000004990000-0x000000000499E000-memory.dmpFilesize
56KB
-
memory/2384-115-0x0000000000530000-0x0000000000531000-memory.dmpFilesize
4KB
-
memory/2384-123-0x0000000008E50000-0x0000000008E51000-memory.dmpFilesize
4KB
-
memory/2744-140-0x0000000000000000-mapping.dmp
-
memory/3364-130-0x00000000015E0000-0x0000000001900000-memory.dmpFilesize
3.1MB
-
memory/3364-128-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3364-129-0x000000000041D3A0-mapping.dmp
-
memory/3364-131-0x0000000001320000-0x0000000001331000-memory.dmpFilesize
68KB
-
memory/3656-134-0x0000000000000000-mapping.dmp