Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
14-12-2021 12:06
Static task
static1
Behavioral task
behavioral1
Sample
tmp/femp.exe
Resource
win7-en-20211208
General
-
Target
tmp/femp.exe
-
Size
344KB
-
MD5
c62a556b445ff8cf1b9e0b038a13137e
-
SHA1
7fefc1609a4e66d234abb47a1536857317bdb31b
-
SHA256
4b3af4ebfe94ecb1730c15620080935f619b6592fad681921968f986c030c0c3
-
SHA512
c372806da30c98b047d46f8e70cce90f93829fe484ff5eb49354bd132a846ff126ea4c7024e5fae8de60c96117d940ea4fe2d6c783c67987354c7eee99c4638e
Malware Config
Extracted
xloader
2.5
ef6c
http://www.fis.photos/ef6c/
gicaredocs.com
govusergroup.com
conversationspit.com
brondairy.com
rjtherealest.com
xn--9m1bq8wgkag3rjvb.com
mylori.net
softandcute.store
ahljsm.com
shacksolid.com
weekendmusecollection.com
gaminghallarna.net
pgonline111.online
44mpt.xyz
ambrandt.com
eddytattoo.com
blendeqes.com
upinmyfeels.com
lacucinadesign.com
docomoau.xyz
xn--90armbk7e.online
xzq585858.net
kidzgovroom.com
lhznqyl.press
publicationsplace.com
jakante.com
csspadding.com
test-testjisdnsec.store
lafabriqueabeilleassurances.com
clf010.com
buybabysnuggle.com
uzmdrmustafaalperaykanat.com
levanttradegroup.com
arcflorals.com
kinglot2499.com
freekagyans.com
region10group.gmbh
yeyelm744.com
thehomedesigncentre.com
vngc.xyz
szesdkj.com
charlottewright.online
planetgreennetwork.com
pacifica7.com
analogueadapt.com
sensorypantry.com
narbaal.com
restaurant-utopia.xyz
golnay.com
szyyglass.com
redelirevearyseuiop.xyz
goldsteelconstruction.com
discovercotswoldcottages.com
geniuseven.net
apricitee.com
stopmoshenik.online
ya2gh.com
instatechnovelz.com
dbe648.com
seifjuban.com
conquershirts.store
totalcovidtravel.com
pamperotrabajo.com
satellitphonestore.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/776-63-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/776-64-0x000000000041D3D0-mapping.dmp xloader behavioral1/memory/1380-71-0x0000000000070000-0x0000000000099000-memory.dmp xloader -
Blocklisted process makes network request 9 IoCs
Processes:
wscript.exeflow pid process 27 1380 wscript.exe 28 1380 wscript.exe 30 1380 wscript.exe 32 1380 wscript.exe 34 1380 wscript.exe 36 1380 wscript.exe 38 1380 wscript.exe 40 1380 wscript.exe 42 1380 wscript.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1824 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
femp.exefemp.exewscript.exedescription pid process target process PID 968 set thread context of 776 968 femp.exe femp.exe PID 776 set thread context of 1448 776 femp.exe Explorer.EXE PID 1380 set thread context of 1448 1380 wscript.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 25 IoCs
Processes:
femp.exefemp.exewscript.exepid process 968 femp.exe 776 femp.exe 776 femp.exe 1380 wscript.exe 1380 wscript.exe 1380 wscript.exe 1380 wscript.exe 1380 wscript.exe 1380 wscript.exe 1380 wscript.exe 1380 wscript.exe 1380 wscript.exe 1380 wscript.exe 1380 wscript.exe 1380 wscript.exe 1380 wscript.exe 1380 wscript.exe 1380 wscript.exe 1380 wscript.exe 1380 wscript.exe 1380 wscript.exe 1380 wscript.exe 1380 wscript.exe 1380 wscript.exe 1380 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
femp.exewscript.exepid process 776 femp.exe 776 femp.exe 776 femp.exe 1380 wscript.exe 1380 wscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
femp.exefemp.exewscript.exedescription pid process Token: SeDebugPrivilege 968 femp.exe Token: SeDebugPrivilege 776 femp.exe Token: SeDebugPrivilege 1380 wscript.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1448 Explorer.EXE 1448 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1448 Explorer.EXE 1448 Explorer.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
femp.exeExplorer.EXEwscript.exedescription pid process target process PID 968 wrote to memory of 1552 968 femp.exe femp.exe PID 968 wrote to memory of 1552 968 femp.exe femp.exe PID 968 wrote to memory of 1552 968 femp.exe femp.exe PID 968 wrote to memory of 1552 968 femp.exe femp.exe PID 968 wrote to memory of 776 968 femp.exe femp.exe PID 968 wrote to memory of 776 968 femp.exe femp.exe PID 968 wrote to memory of 776 968 femp.exe femp.exe PID 968 wrote to memory of 776 968 femp.exe femp.exe PID 968 wrote to memory of 776 968 femp.exe femp.exe PID 968 wrote to memory of 776 968 femp.exe femp.exe PID 968 wrote to memory of 776 968 femp.exe femp.exe PID 1448 wrote to memory of 1380 1448 Explorer.EXE wscript.exe PID 1448 wrote to memory of 1380 1448 Explorer.EXE wscript.exe PID 1448 wrote to memory of 1380 1448 Explorer.EXE wscript.exe PID 1448 wrote to memory of 1380 1448 Explorer.EXE wscript.exe PID 1380 wrote to memory of 1824 1380 wscript.exe cmd.exe PID 1380 wrote to memory of 1824 1380 wscript.exe cmd.exe PID 1380 wrote to memory of 1824 1380 wscript.exe cmd.exe PID 1380 wrote to memory of 1824 1380 wscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\tmp\femp.exe"C:\Users\Admin\AppData\Local\Temp\tmp\femp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Local\Temp\tmp\femp.exe"C:\Users\Admin\AppData\Local\Temp\tmp\femp.exe"3⤵PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\tmp\femp.exe"C:\Users\Admin\AppData\Local\Temp\tmp\femp.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:776
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\tmp\femp.exe"3⤵
- Deletes itself
PID:1824
-
-