Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
24-02-2022 14:01
Static task
static1
Behavioral task
behavioral1
Sample
ovRDe2RyH2kWS1u.exe
Resource
win7-20220223-en
General
-
Target
ovRDe2RyH2kWS1u.exe
-
Size
771KB
-
MD5
87ee91152f7a07f16db9756feae2fb0a
-
SHA1
0a3221619d69958e52f8b8719260196aa130ebcc
-
SHA256
a70a717458c5147a02dca62c03c58d2e11e165180e683fa4755c719e6f9ad9c5
-
SHA512
a385d5b89051a17c6cae76f985aea9f339423a2e6467cf460be495eda78f2791d7a02cfba30ab114a4be506b7aac754737657cd4537efb066723787385bb464a
Malware Config
Extracted
xloader
2.5
wdc8
mygotomaid.com
joyoushealthandwellnessspa.com
wefundprojects.com
magicbasketbourse.net
vitos3.xyz
oligopoly.city
beauty-bihada.asia
visitnewrichmond.com
crgeniusworld.biz
bantasis.com
transsexual.pro
casagraph.com
eastjamrecords.com
howtotrainyourmustache.com
heiappropriate.xyz
bataperu.com
ces341.com
prajahitha.com
manuelagattegger.com
wolfpackmotorcycletours.com
yulietrojas.com
dariven.com
dd13thsept.net
kalpeshvasoya.com
theavarosecollection.com
bloody-randoms.com
yngo-arca.com
dealsoffer.xyz
marellaweddingplanner.com
seowongoopain.com
omightygod.com
dqblog.net
thethreadedbrow.com
medflex.center
filpify.com
chaletxp.com
santanderburge.com
171341.com
shannongroves.com
sisoow.quest
harleybowd.com
cardioflextech.com
exspv.com
permianbasinautismacademy.info
gardenchipvip.com
onsitemarketingsolutions.com
cvwerg.com
theketocopywriter.com
telarte-ceramicas.com
j2ig529zbahs.biz
oxygenii.com
extralegally.info
hbdlaq.com
themountainkings.com
fibliz.com
skyrangersfoundation.com
forbabylon.net
weilaiyitj.com
supplementstoreryp.com
thehappyartnook.com
houzzcoin.com
heyitsnew.com
jonnystokes.com
venuesgrantprogram.com
hamiltonrealestate.online
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1588-137-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1588-139-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1880-145-0x0000000000630000-0x0000000000659000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
ovRDe2RyH2kWS1u.exeovRDe2RyH2kWS1u.exehelp.exedescription pid process target process PID 3744 set thread context of 1588 3744 ovRDe2RyH2kWS1u.exe ovRDe2RyH2kWS1u.exe PID 1588 set thread context of 2428 1588 ovRDe2RyH2kWS1u.exe Explorer.EXE PID 1880 set thread context of 2428 1880 help.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 42 IoCs
Processes:
ovRDe2RyH2kWS1u.exehelp.exepid process 1588 ovRDe2RyH2kWS1u.exe 1588 ovRDe2RyH2kWS1u.exe 1588 ovRDe2RyH2kWS1u.exe 1588 ovRDe2RyH2kWS1u.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe 1880 help.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2428 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
ovRDe2RyH2kWS1u.exehelp.exepid process 1588 ovRDe2RyH2kWS1u.exe 1588 ovRDe2RyH2kWS1u.exe 1588 ovRDe2RyH2kWS1u.exe 1880 help.exe 1880 help.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
ovRDe2RyH2kWS1u.exehelp.exedescription pid process Token: SeDebugPrivilege 1588 ovRDe2RyH2kWS1u.exe Token: SeDebugPrivilege 1880 help.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
ovRDe2RyH2kWS1u.exeExplorer.EXEhelp.exedescription pid process target process PID 3744 wrote to memory of 1588 3744 ovRDe2RyH2kWS1u.exe ovRDe2RyH2kWS1u.exe PID 3744 wrote to memory of 1588 3744 ovRDe2RyH2kWS1u.exe ovRDe2RyH2kWS1u.exe PID 3744 wrote to memory of 1588 3744 ovRDe2RyH2kWS1u.exe ovRDe2RyH2kWS1u.exe PID 3744 wrote to memory of 1588 3744 ovRDe2RyH2kWS1u.exe ovRDe2RyH2kWS1u.exe PID 3744 wrote to memory of 1588 3744 ovRDe2RyH2kWS1u.exe ovRDe2RyH2kWS1u.exe PID 3744 wrote to memory of 1588 3744 ovRDe2RyH2kWS1u.exe ovRDe2RyH2kWS1u.exe PID 2428 wrote to memory of 1880 2428 Explorer.EXE help.exe PID 2428 wrote to memory of 1880 2428 Explorer.EXE help.exe PID 2428 wrote to memory of 1880 2428 Explorer.EXE help.exe PID 1880 wrote to memory of 2572 1880 help.exe cmd.exe PID 1880 wrote to memory of 2572 1880 help.exe cmd.exe PID 1880 wrote to memory of 2572 1880 help.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ovRDe2RyH2kWS1u.exe"C:\Users\Admin\AppData\Local\Temp\ovRDe2RyH2kWS1u.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ovRDe2RyH2kWS1u.exe"C:\Users\Admin\AppData\Local\Temp\ovRDe2RyH2kWS1u.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\ovRDe2RyH2kWS1u.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1588-140-0x0000000001450000-0x000000000179A000-memory.dmpFilesize
3.3MB
-
memory/1588-141-0x000000000041D000-0x000000000041E000-memory.dmpFilesize
4KB
-
memory/1588-142-0x0000000001880000-0x0000000001891000-memory.dmpFilesize
68KB
-
memory/1588-137-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1588-139-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1880-147-0x0000000002C60000-0x0000000002CF0000-memory.dmpFilesize
576KB
-
memory/1880-146-0x0000000002D60000-0x00000000030AA000-memory.dmpFilesize
3.3MB
-
memory/1880-145-0x0000000000630000-0x0000000000659000-memory.dmpFilesize
164KB
-
memory/1880-144-0x0000000000910000-0x0000000000917000-memory.dmpFilesize
28KB
-
memory/2428-143-0x0000000002940000-0x0000000002A18000-memory.dmpFilesize
864KB
-
memory/2428-148-0x0000000007B60000-0x0000000007CA9000-memory.dmpFilesize
1.3MB
-
memory/3744-136-0x0000000009020000-0x00000000090BC000-memory.dmpFilesize
624KB
-
memory/3744-135-0x00000000057D0000-0x00000000057DA000-memory.dmpFilesize
40KB
-
memory/3744-130-0x000000007458E000-0x000000007458F000-memory.dmpFilesize
4KB
-
memory/3744-134-0x0000000005930000-0x0000000005931000-memory.dmpFilesize
4KB
-
memory/3744-133-0x00000000057F0000-0x0000000005882000-memory.dmpFilesize
584KB
-
memory/3744-132-0x0000000005D00000-0x00000000062A4000-memory.dmpFilesize
5.6MB
-
memory/3744-131-0x0000000000D60000-0x0000000000E28000-memory.dmpFilesize
800KB