Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
28-01-2022 15:40
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION REVIEW.exe
Resource
win7-en-20211208
General
-
Target
QUOTATION REVIEW.exe
-
Size
382KB
-
MD5
6de1fe838e482853719ca575540a92b0
-
SHA1
9fa044e5e1189948b65fea2e778fabc2c98929d5
-
SHA256
09c176d0c7251e2c64e8cc619bd2b20be37d9b4b1eac19962d2a1b68f7a4535a
-
SHA512
8d9549973563356ad07eb2462320f36701f2244f78a4a20451ea9132d6dc30de01ab445d9392e4b0d594e3f379fa9b7c16154726829d8b8c90e2f22de0e7f124
Malware Config
Extracted
xloader
2.5
iifn
ramaseturs.com
yinhejump.top
realmendrinkwater.store
storyconnect.pro
likehisskin.com
miaoobaby.com
whistleittome.com
icrinc-inc.com
applelost-support.info
tenloe042.xyz
xiaoyaoshike.xyz
frontdukkan.online
disparatadora.xyz
dskensho326.xyz
fsol.pro
rootpresidential.xyz
tejidosvianey.com
diapazon-med.store
suicidestars.com
fadilacatering.com
premiumcontent.online
yehs-studio.com
darfilm.website
mtvirtualassistant.com
seguroiprotecao.com
dermalmedixeu.com
southernmighty.com
nourkoki.com
audacities.xyz
lightfully.solutions
uniquephotoapi.com
jogoreviravolta.com
kindmonth.email
elysabeauty.com
edgewater1105t1.com
skonbatteryhungary.com
xctheagency.com
adapters.biz
ali88.group
sinusreliefnm.com
bendisle.com
horsekare.com
rcoll-dev.com
ryantaber.com
glass-paint.com
steep-turn.com
mitchellcleaningservice.com
giftpro365.com
victoria-samiri.com
rosalvarodriguez.com
iljadabaci.com
strollnroll.online
buzzballzbodegas.com
goodstudycanada.com
cuttingpaprika.com
esport21.com
cantbekilled.net
proteamstaxconsultancy.com
pl-id76379441.xyz
budsplaceofcarmel.com
babanut.com
xzq797979.net
hebbale.academy
dubaifxbrokers.com
goodprice.pro
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/860-61-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/860-66-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/824-71-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1168 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
QUOTATION REVIEW.exeQUOTATION REVIEW.exemsdt.exedescription pid process target process PID 1128 set thread context of 860 1128 QUOTATION REVIEW.exe QUOTATION REVIEW.exe PID 860 set thread context of 1416 860 QUOTATION REVIEW.exe Explorer.EXE PID 860 set thread context of 1416 860 QUOTATION REVIEW.exe Explorer.EXE PID 824 set thread context of 1416 824 msdt.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
QUOTATION REVIEW.exemsdt.exepid process 860 QUOTATION REVIEW.exe 860 QUOTATION REVIEW.exe 860 QUOTATION REVIEW.exe 824 msdt.exe 824 msdt.exe 824 msdt.exe 824 msdt.exe 824 msdt.exe 824 msdt.exe 824 msdt.exe 824 msdt.exe 824 msdt.exe 824 msdt.exe 824 msdt.exe 824 msdt.exe 824 msdt.exe 824 msdt.exe 824 msdt.exe 824 msdt.exe 824 msdt.exe 824 msdt.exe 824 msdt.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
QUOTATION REVIEW.exemsdt.exepid process 860 QUOTATION REVIEW.exe 860 QUOTATION REVIEW.exe 860 QUOTATION REVIEW.exe 860 QUOTATION REVIEW.exe 824 msdt.exe 824 msdt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
QUOTATION REVIEW.exemsdt.exedescription pid process Token: SeDebugPrivilege 860 QUOTATION REVIEW.exe Token: SeDebugPrivilege 824 msdt.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1416 Explorer.EXE 1416 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1416 Explorer.EXE 1416 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
QUOTATION REVIEW.exeExplorer.EXEmsdt.exedescription pid process target process PID 1128 wrote to memory of 860 1128 QUOTATION REVIEW.exe QUOTATION REVIEW.exe PID 1128 wrote to memory of 860 1128 QUOTATION REVIEW.exe QUOTATION REVIEW.exe PID 1128 wrote to memory of 860 1128 QUOTATION REVIEW.exe QUOTATION REVIEW.exe PID 1128 wrote to memory of 860 1128 QUOTATION REVIEW.exe QUOTATION REVIEW.exe PID 1128 wrote to memory of 860 1128 QUOTATION REVIEW.exe QUOTATION REVIEW.exe PID 1128 wrote to memory of 860 1128 QUOTATION REVIEW.exe QUOTATION REVIEW.exe PID 1128 wrote to memory of 860 1128 QUOTATION REVIEW.exe QUOTATION REVIEW.exe PID 1416 wrote to memory of 824 1416 Explorer.EXE msdt.exe PID 1416 wrote to memory of 824 1416 Explorer.EXE msdt.exe PID 1416 wrote to memory of 824 1416 Explorer.EXE msdt.exe PID 1416 wrote to memory of 824 1416 Explorer.EXE msdt.exe PID 824 wrote to memory of 1168 824 msdt.exe cmd.exe PID 824 wrote to memory of 1168 824 msdt.exe cmd.exe PID 824 wrote to memory of 1168 824 msdt.exe cmd.exe PID 824 wrote to memory of 1168 824 msdt.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\QUOTATION REVIEW.exe"C:\Users\Admin\AppData\Local\Temp\QUOTATION REVIEW.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\QUOTATION REVIEW.exe"C:\Users\Admin\AppData\Local\Temp\QUOTATION REVIEW.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\QUOTATION REVIEW.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/824-70-0x0000000000A80000-0x0000000000B74000-memory.dmpFilesize
976KB
-
memory/824-73-0x00000000009C0000-0x0000000000A50000-memory.dmpFilesize
576KB
-
memory/824-72-0x0000000002300000-0x0000000002603000-memory.dmpFilesize
3.0MB
-
memory/824-71-0x0000000000080000-0x00000000000A9000-memory.dmpFilesize
164KB
-
memory/860-67-0x00000000002C0000-0x00000000002D1000-memory.dmpFilesize
68KB
-
memory/860-66-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/860-60-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/860-61-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/860-64-0x0000000000140000-0x0000000000151000-memory.dmpFilesize
68KB
-
memory/860-63-0x0000000000C00000-0x0000000000F03000-memory.dmpFilesize
3.0MB
-
memory/860-59-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1128-54-0x0000000000B90000-0x0000000000BF6000-memory.dmpFilesize
408KB
-
memory/1128-58-0x00000000050C0000-0x0000000005122000-memory.dmpFilesize
392KB
-
memory/1128-57-0x0000000000440000-0x000000000044C000-memory.dmpFilesize
48KB
-
memory/1128-56-0x0000000004CA0000-0x0000000004CA1000-memory.dmpFilesize
4KB
-
memory/1128-55-0x0000000075891000-0x0000000075893000-memory.dmpFilesize
8KB
-
memory/1416-65-0x0000000006990000-0x0000000006AC6000-memory.dmpFilesize
1.2MB
-
memory/1416-68-0x0000000006F70000-0x0000000007097000-memory.dmpFilesize
1.2MB
-
memory/1416-74-0x0000000004D20000-0x0000000004E11000-memory.dmpFilesize
964KB