Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
06-02-2022 21:42
Static task
static1
Behavioral task
behavioral1
Sample
transferir copia_03_05.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
transferir copia_03_05.exe
Resource
win10v2004-en-20220113
General
-
Target
transferir copia_03_05.exe
-
Size
823KB
-
MD5
4f1a54809ac8e534239bade40b46bfab
-
SHA1
cc4ae9e1888fa1071fcccc56f8e46253bd00b99a
-
SHA256
3488d309b21afbc3b481320bcf1209908813e2eb8a63df772f740426034b9958
-
SHA512
d13542d590ec6482f6c0bbbbf6d504f39c64fd28f8e32ebb239a33193c0afe4cd4e938ca6a966e115aeaa92e21b0581d32cf8a736e764d66b237d573e303a705
Malware Config
Extracted
xloader
2.3
8zdn
yourherogarden.net
onlineharambee.net
cerrajeriaurgencias24horas.com
distritoforex.com
verifyclientserverssr.com
dandwg.com
co2-zero.global
joshssl.com
meckwt.com
theammf.com
rawclectic.com
gzgnetwork.com
richmondavenuecoc.com
nicolelyte.com
thetinyclosetboutique.com
llt-group.net
seven-sky-design.com
joganifinancialgrp.com
elementsvapes.com
bingent.info
quaichshop.net
unethicalsgsblaw.com
matts.digital
lexafit.com
covidwanderings.com
pk972.com
fanashaadivine.com
winharadesigns.com
adosignite.com
goldengatesimmigration.com
unazampanelcuore.com
gasexecutive.com
sdps365.net
worthingtonminnesota.com
ducatsupply.com
beijinghui1.icu
hn-bet.com
homeforsalesteamboat.com
tiaozaoxinlingshou.net
mrbils.net
depuitycollector.com
winningovereating.com
usedonlyrvs.com
verbinoz.com
threepocketmedia.com
lizbing.com
fivestardogfoods.com
edevercal.net
irisettelment.com
beautyphernalia.com
terrawindglobalprotection.net
floridaindian.com
kidzistore.com
kulisbet117.com
logingatech.info
ftdk.net
lawwise.legal
bruthawar.com
lemonpublishing.com
6781529.com
zfxsotc.com
shroomsdrop.com
ahm-app.com
finesilversmith.com
basiclablife.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1404-61-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/1628-67-0x00000000000C0000-0x00000000000E8000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 384 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
transferir copia_03_05.exetransferir copia_03_05.exesystray.exedescription pid process target process PID 1304 set thread context of 1404 1304 transferir copia_03_05.exe transferir copia_03_05.exe PID 1404 set thread context of 1412 1404 transferir copia_03_05.exe Explorer.EXE PID 1628 set thread context of 1412 1628 systray.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
transferir copia_03_05.exesystray.exepid process 1404 transferir copia_03_05.exe 1404 transferir copia_03_05.exe 1628 systray.exe 1628 systray.exe 1628 systray.exe 1628 systray.exe 1628 systray.exe 1628 systray.exe 1628 systray.exe 1628 systray.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
transferir copia_03_05.exesystray.exepid process 1404 transferir copia_03_05.exe 1404 transferir copia_03_05.exe 1404 transferir copia_03_05.exe 1628 systray.exe 1628 systray.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
transferir copia_03_05.exesystray.exedescription pid process Token: SeDebugPrivilege 1404 transferir copia_03_05.exe Token: SeDebugPrivilege 1628 systray.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1412 Explorer.EXE 1412 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1412 Explorer.EXE 1412 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
transferir copia_03_05.exeExplorer.EXEsystray.exedescription pid process target process PID 1304 wrote to memory of 1404 1304 transferir copia_03_05.exe transferir copia_03_05.exe PID 1304 wrote to memory of 1404 1304 transferir copia_03_05.exe transferir copia_03_05.exe PID 1304 wrote to memory of 1404 1304 transferir copia_03_05.exe transferir copia_03_05.exe PID 1304 wrote to memory of 1404 1304 transferir copia_03_05.exe transferir copia_03_05.exe PID 1304 wrote to memory of 1404 1304 transferir copia_03_05.exe transferir copia_03_05.exe PID 1304 wrote to memory of 1404 1304 transferir copia_03_05.exe transferir copia_03_05.exe PID 1304 wrote to memory of 1404 1304 transferir copia_03_05.exe transferir copia_03_05.exe PID 1412 wrote to memory of 1628 1412 Explorer.EXE systray.exe PID 1412 wrote to memory of 1628 1412 Explorer.EXE systray.exe PID 1412 wrote to memory of 1628 1412 Explorer.EXE systray.exe PID 1412 wrote to memory of 1628 1412 Explorer.EXE systray.exe PID 1628 wrote to memory of 384 1628 systray.exe cmd.exe PID 1628 wrote to memory of 384 1628 systray.exe cmd.exe PID 1628 wrote to memory of 384 1628 systray.exe cmd.exe PID 1628 wrote to memory of 384 1628 systray.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\transferir copia_03_05.exe"C:\Users\Admin\AppData\Local\Temp\transferir copia_03_05.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\transferir copia_03_05.exe"C:\Users\Admin\AppData\Local\Temp\transferir copia_03_05.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\transferir copia_03_05.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1304-54-0x0000000001120000-0x00000000011F4000-memory.dmpFilesize
848KB
-
memory/1304-55-0x0000000076921000-0x0000000076923000-memory.dmpFilesize
8KB
-
memory/1304-56-0x0000000004F50000-0x0000000004F51000-memory.dmpFilesize
4KB
-
memory/1304-57-0x0000000000310000-0x000000000031E000-memory.dmpFilesize
56KB
-
memory/1304-58-0x0000000000F20000-0x0000000000F76000-memory.dmpFilesize
344KB
-
memory/1404-64-0x0000000000160000-0x0000000000170000-memory.dmpFilesize
64KB
-
memory/1404-60-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1404-61-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1404-59-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1404-63-0x00000000008B0000-0x0000000000BB3000-memory.dmpFilesize
3.0MB
-
memory/1412-65-0x00000000067D0000-0x0000000006891000-memory.dmpFilesize
772KB
-
memory/1412-70-0x0000000009B10000-0x0000000009C99000-memory.dmpFilesize
1.5MB
-
memory/1628-66-0x0000000000770000-0x0000000000775000-memory.dmpFilesize
20KB
-
memory/1628-67-0x00000000000C0000-0x00000000000E8000-memory.dmpFilesize
160KB
-
memory/1628-68-0x0000000001E50000-0x0000000002153000-memory.dmpFilesize
3.0MB
-
memory/1628-69-0x0000000001CE0000-0x0000000001D6F000-memory.dmpFilesize
572KB