Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
31-01-2022 12:20
Static task
static1
Behavioral task
behavioral1
Sample
VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exe
Resource
win10v2004-en-20220113
General
-
Target
VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exe
-
Size
483KB
-
MD5
703540c2c3e8296b85f9860e4735d773
-
SHA1
a13a05a927377e54a006dcdf1a7b79e278eaee58
-
SHA256
95d52da676d92728d35e9fa0e6a49dc451dc83eadb8beb0ba0f2a3b891a69696
-
SHA512
ae70b95556b5263c7f4241ac24d0dd10d201f4858035359a8be41206c4778d164e768ac3ba0be6cd95c8ee38fafcdfb86ffe851e6e51e93b3520f8cdb8ce8ed6
Malware Config
Extracted
xloader
2.5
b23k
foxsistersofhydesville.com
jetronbang.com
agriturismopartingoli.com
ihiinscus.com
zaksrestaurants.store
aspetac.com
ycjhjd.com
fountainspringscapemay.com
earlydose.com
nocodebelgium.com
65235.xyz
yasesite.com
steeltoilets.com
xceqa.xyz
2021udtv.com
belorusneft.top
the4asofdekhockey.com
gertexhosiery.com
fidelismortgages.com
bellacomoninguna.com
arab-carrier.com
xn--meng-bh8p60mfo2bn4z.com
wesavebig.com
033yu.xyz
vatgia9.com
withph.net
eastvastness.com
xzq797979.net
jostela.com
orzame.com
benzobluedi.com
tennistshirtz.com
bostondowntownrealestate.com
vendingandco.services
thespiritnewsletter.com
hyperprdouctivebiz.com
aiasoundfestival.com
6313671.club
tinampalermo.com
princess-solana-nft.com
hype-clicks.com
pwaygaonkar.net
joygwant.store
bestinsurance-quote-tx.com
charaburgh.com
caryfer.com
metruyen.online
foodemsa.com
elonnews.info
djxhwl.com
sumauto.net
degensimulator.xyz
ibankglobalfinance.xyz
namaqualand.xyz
saysylver.com
gcato.xyz
ironangelcreations.store
klayraccoonman.com
cashflow.asia
digital904.com
ouyangminwei.com
www2eee.com
494331.com
breastextra.com
ai-sakauchi.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/848-61-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/568-67-0x0000000000090000-0x00000000000B9000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1544 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exeVESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exewuapp.exedescription pid process target process PID 1588 set thread context of 848 1588 VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exe VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exe PID 848 set thread context of 1232 848 VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exe Explorer.EXE PID 568 set thread context of 1232 568 wuapp.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exewuapp.exepid process 848 VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exe 848 VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exe 568 wuapp.exe 568 wuapp.exe 568 wuapp.exe 568 wuapp.exe 568 wuapp.exe 568 wuapp.exe 568 wuapp.exe 568 wuapp.exe 568 wuapp.exe 568 wuapp.exe 568 wuapp.exe 568 wuapp.exe 568 wuapp.exe 568 wuapp.exe 568 wuapp.exe 568 wuapp.exe 568 wuapp.exe 568 wuapp.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exewuapp.exepid process 848 VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exe 848 VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exe 848 VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exe 568 wuapp.exe 568 wuapp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exewuapp.exedescription pid process Token: SeDebugPrivilege 848 VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exe Token: SeDebugPrivilege 568 wuapp.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1232 Explorer.EXE 1232 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1232 Explorer.EXE 1232 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exeExplorer.EXEwuapp.exedescription pid process target process PID 1588 wrote to memory of 848 1588 VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exe VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exe PID 1588 wrote to memory of 848 1588 VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exe VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exe PID 1588 wrote to memory of 848 1588 VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exe VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exe PID 1588 wrote to memory of 848 1588 VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exe VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exe PID 1588 wrote to memory of 848 1588 VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exe VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exe PID 1588 wrote to memory of 848 1588 VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exe VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exe PID 1588 wrote to memory of 848 1588 VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exe VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exe PID 1232 wrote to memory of 568 1232 Explorer.EXE wuapp.exe PID 1232 wrote to memory of 568 1232 Explorer.EXE wuapp.exe PID 1232 wrote to memory of 568 1232 Explorer.EXE wuapp.exe PID 1232 wrote to memory of 568 1232 Explorer.EXE wuapp.exe PID 1232 wrote to memory of 568 1232 Explorer.EXE wuapp.exe PID 1232 wrote to memory of 568 1232 Explorer.EXE wuapp.exe PID 1232 wrote to memory of 568 1232 Explorer.EXE wuapp.exe PID 568 wrote to memory of 1544 568 wuapp.exe cmd.exe PID 568 wrote to memory of 1544 568 wuapp.exe cmd.exe PID 568 wrote to memory of 1544 568 wuapp.exe cmd.exe PID 568 wrote to memory of 1544 568 wuapp.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exe"C:\Users\Admin\AppData\Local\Temp\VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exe"C:\Users\Admin\AppData\Local\Temp\VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\wuapp.exe"C:\Windows\SysWOW64\wuapp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\VESSEL DESCRIPCTION MV BERKAY N - IMO NO 9524827_PDF.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/568-67-0x0000000000090000-0x00000000000B9000-memory.dmpFilesize
164KB
-
memory/568-69-0x0000000001D50000-0x0000000001DE0000-memory.dmpFilesize
576KB
-
memory/568-68-0x0000000001E50000-0x0000000002153000-memory.dmpFilesize
3.0MB
-
memory/568-66-0x0000000000290000-0x000000000029B000-memory.dmpFilesize
44KB
-
memory/848-63-0x0000000000700000-0x0000000000A03000-memory.dmpFilesize
3.0MB
-
memory/848-59-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/848-60-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/848-61-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/848-64-0x0000000000480000-0x0000000000491000-memory.dmpFilesize
68KB
-
memory/1232-65-0x00000000068B0000-0x0000000006A1B000-memory.dmpFilesize
1.4MB
-
memory/1232-70-0x0000000006B60000-0x0000000006CC9000-memory.dmpFilesize
1.4MB
-
memory/1588-54-0x0000000001310000-0x0000000001390000-memory.dmpFilesize
512KB
-
memory/1588-58-0x00000000048A0000-0x0000000004900000-memory.dmpFilesize
384KB
-
memory/1588-57-0x0000000000490000-0x00000000004A4000-memory.dmpFilesize
80KB
-
memory/1588-56-0x0000000002790000-0x00000000049A0000-memory.dmpFilesize
34.1MB
-
memory/1588-55-0x0000000075191000-0x0000000075193000-memory.dmpFilesize
8KB