Analysis
-
max time kernel
151s -
max time network
159s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
06-12-2021 14:56
Static task
static1
Behavioral task
behavioral1
Sample
u prilogu je nova narudzba za kupnju.exe
Resource
win7-en-20211014
Behavioral task
behavioral2
Sample
u prilogu je nova narudzba za kupnju.exe
Resource
win10-en-20211104
General
-
Target
u prilogu je nova narudzba za kupnju.exe
-
Size
1.0MB
-
MD5
586db006f3320cb9a41a62f7f5a0c4e1
-
SHA1
3b6f558429e9fe51b191dfbb63bdc7161d95870a
-
SHA256
af2a8024939f13bee37b6d3a35aa5df93e2a6b11cede4bea19493c4d704b050f
-
SHA512
aa79f05e68b71cb7cb5ddb9f12ceada09e7433d7733adcde6c20eb1a3695cff22161cb73e8cee0898444e9e1ec9258b2a6ae4e2e780b5ed9849d4a1596cd3d17
Malware Config
Extracted
xloader
2.5
pvxz
http://www.finetipster.com/pvxz/
imt-token.club
abravewayocen.online
shcloudcar.com
mshoppingworld.online
ncgf08.xyz
stuinfo.xyz
wesavetheplanetofficial.com
tourbox.xyz
believeinyourselftraining.com
jsboyat.com
aaeconomy.info
9etmorea.info
purosepeti7.com
goticketly.com
pinkmemorypt.com
mylifewellnesscentre.com
iridina.online
petrestore.online
neema.xyz
novelfooditalia.com
enterprisedaas.computer
tzkaxh.com
brainfarter.com
youniquegal.com
piiqrio.com
mdaszb.com
boldmale.com
era636.com
castleinsuranceco.com
woodennickelmusicfortwayne.com
customer-servis-kredivo.com
high-clicks.com
greetwithgadgets.com
hfsd1.com
insureagainstearthquakes.net
ultimatejump.rest
parivartanyogeshstore.com
handmanagementblog.com
meishangtianhua.com
michaelscottinsurance.net
kershoes.com
atomiccharmworks.com
conciergecompare.com
zeal-hashima.com
coachianscott.com
hwkm.net
019skz.xyz
jardingenesis.com
sumikkoremon.com
tjpengyun.com
sectionpor.xyz
46t.xyz
sa-pontianak.com
localproperty.team
dotexposed.com
cis136-tgarza.com
eiestilo.com
youknowhowtolive.com
phalcosnusa.com
qaticv93iy.com
hbjngs.com
ocean-nettoyage.com
jenuwinclothes.net
anadoluatvoffroad.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1136-61-0x0000000000000000-mapping.dmp xloader behavioral1/memory/1136-65-0x0000000072480000-0x00000000724A9000-memory.dmp xloader behavioral1/memory/1764-73-0x00000000000C0000-0x00000000000E9000-memory.dmp xloader -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
u prilogu je nova narudzba za kupnju.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2955169046-2371869340-1800780948-1000\Software\Microsoft\Windows\CurrentVersion\Run\Hpleoguu = "C:\\Users\\Admin\\uugoelpH.url" u prilogu je nova narudzba za kupnju.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
DpiScaling.exeexplorer.exedescription pid process target process PID 1136 set thread context of 1212 1136 DpiScaling.exe Explorer.EXE PID 1764 set thread context of 1212 1764 explorer.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
DpiScaling.exeexplorer.exepid process 1136 DpiScaling.exe 1136 DpiScaling.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe 1764 explorer.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
DpiScaling.exeexplorer.exepid process 1136 DpiScaling.exe 1136 DpiScaling.exe 1136 DpiScaling.exe 1764 explorer.exe 1764 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
DpiScaling.exeexplorer.exedescription pid process Token: SeDebugPrivilege 1136 DpiScaling.exe Token: SeDebugPrivilege 1764 explorer.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
u prilogu je nova narudzba za kupnju.exeExplorer.EXEexplorer.exedescription pid process target process PID 1804 wrote to memory of 1136 1804 u prilogu je nova narudzba za kupnju.exe DpiScaling.exe PID 1804 wrote to memory of 1136 1804 u prilogu je nova narudzba za kupnju.exe DpiScaling.exe PID 1804 wrote to memory of 1136 1804 u prilogu je nova narudzba za kupnju.exe DpiScaling.exe PID 1804 wrote to memory of 1136 1804 u prilogu je nova narudzba za kupnju.exe DpiScaling.exe PID 1804 wrote to memory of 1136 1804 u prilogu je nova narudzba za kupnju.exe DpiScaling.exe PID 1804 wrote to memory of 1136 1804 u prilogu je nova narudzba za kupnju.exe DpiScaling.exe PID 1804 wrote to memory of 1136 1804 u prilogu je nova narudzba za kupnju.exe DpiScaling.exe PID 1212 wrote to memory of 1764 1212 Explorer.EXE explorer.exe PID 1212 wrote to memory of 1764 1212 Explorer.EXE explorer.exe PID 1212 wrote to memory of 1764 1212 Explorer.EXE explorer.exe PID 1212 wrote to memory of 1764 1212 Explorer.EXE explorer.exe PID 1764 wrote to memory of 1416 1764 explorer.exe cmd.exe PID 1764 wrote to memory of 1416 1764 explorer.exe cmd.exe PID 1764 wrote to memory of 1416 1764 explorer.exe cmd.exe PID 1764 wrote to memory of 1416 1764 explorer.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\u prilogu je nova narudzba za kupnju.exe"C:\Users\Admin\AppData\Local\Temp\u prilogu je nova narudzba za kupnju.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\DpiScaling.exeC:\Windows\System32\DpiScaling.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\DpiScaling.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1136-66-0x0000000002040000-0x0000000002343000-memory.dmpFilesize
3.0MB
-
memory/1136-67-0x0000000000270000-0x0000000000281000-memory.dmpFilesize
68KB
-
memory/1136-58-0x0000000072480000-0x00000000724A9000-memory.dmpFilesize
164KB
-
memory/1136-59-0x00000000000E0000-0x00000000000E1000-memory.dmpFilesize
4KB
-
memory/1136-61-0x0000000000000000-mapping.dmp
-
memory/1136-64-0x00000000000F0000-0x00000000000F1000-memory.dmpFilesize
4KB
-
memory/1136-65-0x0000000072480000-0x00000000724A9000-memory.dmpFilesize
164KB
-
memory/1212-68-0x0000000006E90000-0x0000000006FDC000-memory.dmpFilesize
1.3MB
-
memory/1212-77-0x0000000009060000-0x00000000091EE000-memory.dmpFilesize
1.6MB
-
memory/1416-74-0x0000000000000000-mapping.dmp
-
memory/1764-76-0x0000000002050000-0x00000000020E0000-memory.dmpFilesize
576KB
-
memory/1764-69-0x0000000000000000-mapping.dmp
-
memory/1764-71-0x0000000074EA1000-0x0000000074EA3000-memory.dmpFilesize
8KB
-
memory/1764-72-0x00000000009C0000-0x0000000000C41000-memory.dmpFilesize
2.5MB
-
memory/1764-73-0x00000000000C0000-0x00000000000E9000-memory.dmpFilesize
164KB
-
memory/1764-75-0x0000000002320000-0x0000000002623000-memory.dmpFilesize
3.0MB
-
memory/1804-56-0x0000000000591000-0x00000000005A5000-memory.dmpFilesize
80KB
-
memory/1804-57-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/1804-55-0x00000000757E1000-0x00000000757E3000-memory.dmpFilesize
8KB