Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows7_x64 -
resource
win7-en-20211104 -
submitted
22-11-2021 21:41
Static task
static1
Behavioral task
behavioral1
Sample
PO NOVEMBER 2021 22 PDF.exe
Resource
win7-en-20211104
General
-
Target
PO NOVEMBER 2021 22 PDF.exe
-
Size
1012KB
-
MD5
96423701a8a3e23e41a7e6d6542f2dc6
-
SHA1
6116c35ff15742f9373ec512e474331e2b1eeffe
-
SHA256
015174d2840ba0ff84b09efa54379b87fdb761a306d55ec707353f162b8ba39a
-
SHA512
cc0e48830c2c0d503ac37e8b6000eb4c8060c25a86abe72e1122b5bd2645f7855be267ec5ffcc28166389200228275a0d4ca13d38a1f1d08a95740a8c1987509
Malware Config
Extracted
xloader
2.5
re6p
http://www.workwithmarym.com/re6p/
jedidpress.com
firstimpression.global
iflycny.com
greenandskin.com
tt9577.com
sumidocpa.com
readsprouts.com
heavenlyhighcreations.com
jlhvz.com
ita-web.com
graeds.com
soundtolight.xyz
rajtantra.net
wearinganawesomewoman.store
hrappur.net
wangmiaojf.xyz
youtogo.xyz
mydeadzone.com
qenagypsum.com
kopijhony.com
slingerlandus.com
zafiroxzafiro.com
comzhub.com
gamecroptop.com
onehealth.website
atthoma.com
juku-sup.com
byshelly.biz
hxcc15.com
massagesalondeventer.com
black-sea-coast.com
houstonpavingpros.com
sunglungmiu.online
theincorrectos.com
khomayphotocopy.online
singleseventplanner.com
adicv.com
situsbaccaratterpercaya.com
h2oarquitectura.online
sdzshbkj.com
villagessocialcards.com
dinerboard.com
testhgdedstage13921.com
bugs98.com
338sto.com
3ks8.com
hadiahbet.com
fastbest.host
mainsufittness.com
heartsideforever.com
baraamco.com
greenperiopc.com
banquanku.info
tenlog050.xyz
albertojoserodriguez.com
hubnhost.com
corruptslofnq.xyz
interstate-ts.com
isabellaealexsuel.com
angela-gracephotography.com
moneythankyoupage.com
anwitstore.com
spanglerland.com
realexchangefx.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/668-64-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/668-65-0x000000000041D480-mapping.dmp xloader behavioral1/memory/668-70-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1056-76-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1960 cmd.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/2036-58-0x00000000004F0000-0x0000000000511000-memory.dmp agile_net -
Suspicious use of SetThreadContext 4 IoCs
Processes:
PO NOVEMBER 2021 22 PDF.exePO NOVEMBER 2021 22 PDF.exewininit.exedescription pid process target process PID 2036 set thread context of 668 2036 PO NOVEMBER 2021 22 PDF.exe PO NOVEMBER 2021 22 PDF.exe PID 668 set thread context of 1300 668 PO NOVEMBER 2021 22 PDF.exe Explorer.EXE PID 668 set thread context of 1300 668 PO NOVEMBER 2021 22 PDF.exe Explorer.EXE PID 1056 set thread context of 1300 1056 wininit.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
PO NOVEMBER 2021 22 PDF.exePO NOVEMBER 2021 22 PDF.exewininit.exepid process 2036 PO NOVEMBER 2021 22 PDF.exe 2036 PO NOVEMBER 2021 22 PDF.exe 668 PO NOVEMBER 2021 22 PDF.exe 668 PO NOVEMBER 2021 22 PDF.exe 668 PO NOVEMBER 2021 22 PDF.exe 1056 wininit.exe 1056 wininit.exe 1056 wininit.exe 1056 wininit.exe 1056 wininit.exe 1056 wininit.exe 1056 wininit.exe 1056 wininit.exe 1056 wininit.exe 1056 wininit.exe 1056 wininit.exe 1056 wininit.exe 1056 wininit.exe 1056 wininit.exe 1056 wininit.exe 1056 wininit.exe 1056 wininit.exe 1056 wininit.exe 1056 wininit.exe 1056 wininit.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
PO NOVEMBER 2021 22 PDF.exewininit.exepid process 668 PO NOVEMBER 2021 22 PDF.exe 668 PO NOVEMBER 2021 22 PDF.exe 668 PO NOVEMBER 2021 22 PDF.exe 668 PO NOVEMBER 2021 22 PDF.exe 1056 wininit.exe 1056 wininit.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
PO NOVEMBER 2021 22 PDF.exePO NOVEMBER 2021 22 PDF.exewininit.exedescription pid process Token: SeDebugPrivilege 2036 PO NOVEMBER 2021 22 PDF.exe Token: SeDebugPrivilege 668 PO NOVEMBER 2021 22 PDF.exe Token: SeDebugPrivilege 1056 wininit.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
PO NOVEMBER 2021 22 PDF.exeExplorer.EXEwininit.exedescription pid process target process PID 2036 wrote to memory of 668 2036 PO NOVEMBER 2021 22 PDF.exe PO NOVEMBER 2021 22 PDF.exe PID 2036 wrote to memory of 668 2036 PO NOVEMBER 2021 22 PDF.exe PO NOVEMBER 2021 22 PDF.exe PID 2036 wrote to memory of 668 2036 PO NOVEMBER 2021 22 PDF.exe PO NOVEMBER 2021 22 PDF.exe PID 2036 wrote to memory of 668 2036 PO NOVEMBER 2021 22 PDF.exe PO NOVEMBER 2021 22 PDF.exe PID 2036 wrote to memory of 668 2036 PO NOVEMBER 2021 22 PDF.exe PO NOVEMBER 2021 22 PDF.exe PID 2036 wrote to memory of 668 2036 PO NOVEMBER 2021 22 PDF.exe PO NOVEMBER 2021 22 PDF.exe PID 2036 wrote to memory of 668 2036 PO NOVEMBER 2021 22 PDF.exe PO NOVEMBER 2021 22 PDF.exe PID 1300 wrote to memory of 1056 1300 Explorer.EXE wininit.exe PID 1300 wrote to memory of 1056 1300 Explorer.EXE wininit.exe PID 1300 wrote to memory of 1056 1300 Explorer.EXE wininit.exe PID 1300 wrote to memory of 1056 1300 Explorer.EXE wininit.exe PID 1056 wrote to memory of 1960 1056 wininit.exe cmd.exe PID 1056 wrote to memory of 1960 1056 wininit.exe cmd.exe PID 1056 wrote to memory of 1960 1056 wininit.exe cmd.exe PID 1056 wrote to memory of 1960 1056 wininit.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\PO NOVEMBER 2021 22 PDF.exe"C:\Users\Admin\AppData\Local\Temp\PO NOVEMBER 2021 22 PDF.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\PO NOVEMBER 2021 22 PDF.exe"C:\Users\Admin\AppData\Local\Temp\PO NOVEMBER 2021 22 PDF.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\wininit.exe"C:\Windows\SysWOW64\wininit.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PO NOVEMBER 2021 22 PDF.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/668-64-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/668-71-0x00000000003B0000-0x00000000003C1000-memory.dmpFilesize
68KB
-
memory/668-70-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/668-67-0x0000000000A60000-0x0000000000D63000-memory.dmpFilesize
3.0MB
-
memory/668-68-0x0000000000280000-0x0000000000291000-memory.dmpFilesize
68KB
-
memory/668-65-0x000000000041D480-mapping.dmp
-
memory/668-62-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/668-63-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1056-75-0x00000000004F0000-0x000000000050A000-memory.dmpFilesize
104KB
-
memory/1056-73-0x0000000000000000-mapping.dmp
-
memory/1056-79-0x0000000000510000-0x00000000005A0000-memory.dmpFilesize
576KB
-
memory/1056-78-0x0000000075881000-0x0000000075883000-memory.dmpFilesize
8KB
-
memory/1056-77-0x0000000001FA0000-0x00000000022A3000-memory.dmpFilesize
3.0MB
-
memory/1056-76-0x0000000000080000-0x00000000000A9000-memory.dmpFilesize
164KB
-
memory/1300-72-0x00000000071E0000-0x000000000730D000-memory.dmpFilesize
1.2MB
-
memory/1300-69-0x00000000070C0000-0x00000000071D8000-memory.dmpFilesize
1.1MB
-
memory/1300-80-0x00000000074D0000-0x0000000007652000-memory.dmpFilesize
1.5MB
-
memory/1960-74-0x0000000000000000-mapping.dmp
-
memory/2036-61-0x0000000000900000-0x0000000000901000-memory.dmpFilesize
4KB
-
memory/2036-57-0x0000000004A50000-0x0000000004A51000-memory.dmpFilesize
4KB
-
memory/2036-55-0x0000000000950000-0x0000000000951000-memory.dmpFilesize
4KB
-
memory/2036-58-0x00000000004F0000-0x0000000000511000-memory.dmpFilesize
132KB
-
memory/2036-59-0x0000000004A51000-0x0000000004A52000-memory.dmpFilesize
4KB
-
memory/2036-60-0x0000000000610000-0x000000000061B000-memory.dmpFilesize
44KB