Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
21-10-2021 05:20
Static task
static1
Behavioral task
behavioral1
Sample
P. Order & Contract (A-4553) PDF.exe
Resource
win7-en-20210920
General
-
Target
P. Order & Contract (A-4553) PDF.exe
-
Size
388KB
-
MD5
2b7aa1c3ad41c61590c7e8788717f3a3
-
SHA1
b25e8d174baa57079f2886d76ccf45248269d5d3
-
SHA256
4d9cbe2a33087ef1552af182cd03bbbe5bba8d01f5eb11c25c3eb3eb72008a7c
-
SHA512
67939ee05ad3baf7115f46cc85fabcff97b65836dd7ef8eedbfa9b114adca3376152bf00db3bf4d47976287b1d0ba1ed1960f036043fab392e5784a637f30084
Malware Config
Extracted
xloader
2.5
r3n5
http://www.keeyasmarketplace.com/r3n5/
peterjhill.com
bleednavy.com
a6d83.top
koudoula.store
albawardl.com
j-sdigitalekuns.net
0wzr2dglc.com
xd16880.com
safepostcourier.com
seuic.net
hainansousou.com
meuexamor.com
strategicthinking.coach
tabliqatbama.com
kidzplan.com
non-toxicnailpolish.com
bwgds.com
behindhereyesphotography.com
age-oldpklduy.xyz
lesconfidentialistes.paris
cornerstonepartners.online
bumidustores.com
vokalsnarbh.quest
regensburg-ferienwohnung.com
rogue-gear.com
blighttest.club
elephantspublications.online
locoboysco.com
nbl20.com
harunerdal.xyz
nailsofts.com
zhangyi.photography
farmavidacanarias.com
szqyuanzishi.com
governorslounge.net
bisoubox.com
fcjoke.com
talmkt.com
christinesyquia.com
lozanoygarcia.com
peolinkbroker.com
doskimen.art
wealth-mindset.com
covapa2.com
montclairbehavioral.com
atletofficial.com
endeavorgroupllc.net
kczu.net
beputis4.com
yshowmedia.com
steelresearchcentre.com
hpywk.com
realprestige.online
brightonpeople.com
wittig-technologies.com
sddn30.xyz
kungfupimps.com
xn--299akkrtr22f.com
lxrh.net
apexmakaluhydropower.com
mcpaintingco.com
nchh40.xyz
gwmetaverse.com
zakawsky.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1288-124-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1288-125-0x000000000041D4C0-mapping.dmp xloader behavioral2/memory/2452-132-0x0000000003000000-0x0000000003029000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
P. Order & Contract (A-4553) PDF.exeP. Order & Contract (A-4553) PDF.exeexplorer.exedescription pid process target process PID 3756 set thread context of 1288 3756 P. Order & Contract (A-4553) PDF.exe P. Order & Contract (A-4553) PDF.exe PID 1288 set thread context of 3064 1288 P. Order & Contract (A-4553) PDF.exe Explorer.EXE PID 2452 set thread context of 3064 2452 explorer.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 46 IoCs
Processes:
P. Order & Contract (A-4553) PDF.exeP. Order & Contract (A-4553) PDF.exeexplorer.exepid process 3756 P. Order & Contract (A-4553) PDF.exe 3756 P. Order & Contract (A-4553) PDF.exe 1288 P. Order & Contract (A-4553) PDF.exe 1288 P. Order & Contract (A-4553) PDF.exe 1288 P. Order & Contract (A-4553) PDF.exe 1288 P. Order & Contract (A-4553) PDF.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe 2452 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3064 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
P. Order & Contract (A-4553) PDF.exeexplorer.exepid process 1288 P. Order & Contract (A-4553) PDF.exe 1288 P. Order & Contract (A-4553) PDF.exe 1288 P. Order & Contract (A-4553) PDF.exe 2452 explorer.exe 2452 explorer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
P. Order & Contract (A-4553) PDF.exeP. Order & Contract (A-4553) PDF.exeexplorer.exedescription pid process Token: SeDebugPrivilege 3756 P. Order & Contract (A-4553) PDF.exe Token: SeDebugPrivilege 1288 P. Order & Contract (A-4553) PDF.exe Token: SeDebugPrivilege 2452 explorer.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
P. Order & Contract (A-4553) PDF.exeExplorer.EXEexplorer.exedescription pid process target process PID 3756 wrote to memory of 2132 3756 P. Order & Contract (A-4553) PDF.exe P. Order & Contract (A-4553) PDF.exe PID 3756 wrote to memory of 2132 3756 P. Order & Contract (A-4553) PDF.exe P. Order & Contract (A-4553) PDF.exe PID 3756 wrote to memory of 2132 3756 P. Order & Contract (A-4553) PDF.exe P. Order & Contract (A-4553) PDF.exe PID 3756 wrote to memory of 1288 3756 P. Order & Contract (A-4553) PDF.exe P. Order & Contract (A-4553) PDF.exe PID 3756 wrote to memory of 1288 3756 P. Order & Contract (A-4553) PDF.exe P. Order & Contract (A-4553) PDF.exe PID 3756 wrote to memory of 1288 3756 P. Order & Contract (A-4553) PDF.exe P. Order & Contract (A-4553) PDF.exe PID 3756 wrote to memory of 1288 3756 P. Order & Contract (A-4553) PDF.exe P. Order & Contract (A-4553) PDF.exe PID 3756 wrote to memory of 1288 3756 P. Order & Contract (A-4553) PDF.exe P. Order & Contract (A-4553) PDF.exe PID 3756 wrote to memory of 1288 3756 P. Order & Contract (A-4553) PDF.exe P. Order & Contract (A-4553) PDF.exe PID 3064 wrote to memory of 2452 3064 Explorer.EXE explorer.exe PID 3064 wrote to memory of 2452 3064 Explorer.EXE explorer.exe PID 3064 wrote to memory of 2452 3064 Explorer.EXE explorer.exe PID 2452 wrote to memory of 2512 2452 explorer.exe cmd.exe PID 2452 wrote to memory of 2512 2452 explorer.exe cmd.exe PID 2452 wrote to memory of 2512 2452 explorer.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\P. Order & Contract (A-4553) PDF.exe"C:\Users\Admin\AppData\Local\Temp\P. Order & Contract (A-4553) PDF.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\P. Order & Contract (A-4553) PDF.exe"C:\Users\Admin\AppData\Local\Temp\P. Order & Contract (A-4553) PDF.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\P. Order & Contract (A-4553) PDF.exe"C:\Users\Admin\AppData\Local\Temp\P. Order & Contract (A-4553) PDF.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\P. Order & Contract (A-4553) PDF.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1288-125-0x000000000041D4C0-mapping.dmp
-
memory/1288-128-0x0000000001880000-0x0000000001891000-memory.dmpFilesize
68KB
-
memory/1288-127-0x0000000001560000-0x0000000001880000-memory.dmpFilesize
3.1MB
-
memory/1288-124-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2452-135-0x0000000004640000-0x00000000046D0000-memory.dmpFilesize
576KB
-
memory/2452-132-0x0000000003000000-0x0000000003029000-memory.dmpFilesize
164KB
-
memory/2452-134-0x00000000048E0000-0x0000000004C00000-memory.dmpFilesize
3.1MB
-
memory/2452-131-0x00000000008C0000-0x0000000000CFF000-memory.dmpFilesize
4.2MB
-
memory/2452-130-0x0000000000000000-mapping.dmp
-
memory/2512-133-0x0000000000000000-mapping.dmp
-
memory/3064-129-0x0000000006010000-0x00000000061AA000-memory.dmpFilesize
1.6MB
-
memory/3064-136-0x0000000004E10000-0x0000000004F86000-memory.dmpFilesize
1.5MB
-
memory/3756-123-0x0000000008510000-0x000000000855B000-memory.dmpFilesize
300KB
-
memory/3756-122-0x0000000008370000-0x0000000008371000-memory.dmpFilesize
4KB
-
memory/3756-121-0x0000000008030000-0x0000000008037000-memory.dmpFilesize
28KB
-
memory/3756-120-0x00000000048A0000-0x0000000004D9E000-memory.dmpFilesize
5.0MB
-
memory/3756-115-0x0000000000090000-0x0000000000091000-memory.dmpFilesize
4KB
-
memory/3756-119-0x0000000004940000-0x0000000004941000-memory.dmpFilesize
4KB
-
memory/3756-118-0x0000000004980000-0x0000000004981000-memory.dmpFilesize
4KB
-
memory/3756-117-0x0000000004DA0000-0x0000000004DA1000-memory.dmpFilesize
4KB