Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
15-04-2022 01:03
Static task
static1
Behavioral task
behavioral1
Sample
b7b54eeb2ed2b6d9d1d5c3d97646c48073234f37c798a528e41072f74e95e6b1.exe
Resource
win7-20220414-en
General
-
Target
b7b54eeb2ed2b6d9d1d5c3d97646c48073234f37c798a528e41072f74e95e6b1.exe
-
Size
451KB
-
MD5
bc743934aea2d49d211e3d6eb182f56e
-
SHA1
c3cc825ee22f0850abe6e503c5d6838ad7b44d1e
-
SHA256
b7b54eeb2ed2b6d9d1d5c3d97646c48073234f37c798a528e41072f74e95e6b1
-
SHA512
cc9c7069965230d31f0a10171bf4d4e8dfda33990c699ee1541d5f27083994ca1b5d927462383821914330db0438d54f024f492278ee54e0cb30e6df3ad2855a
Malware Config
Extracted
xloader
2.1
igqu
coveloungewineandwhiskey.com
chemtradent.com
educare.cloud
shopnicknaks.com
realitytvstockwatch.com
handsfreedocs.com
trafegopago.com
ariasu-nakanokaikei.com
allmm.info
elleatx.com
erpsystem.site
whatisastaxanthin.com
hemparcade.com
ownumo.com
pasumaisangam.com
theoutdoorbed.com
plantpowered.energy
elevenelevenapparelcompany.com
vrspace.ltd
justsoldbykristen.com
pintudada.com
147design.com
cashintl.com
atal.ltd
forbigdogs.com
onlineshoppingisbest.com
pharmacysouq.com
placeduconfort.com
lotoencasa.com
mobileoilxchange.com
rockinglifefromhome.com
covid19salivatestdirect.com
hyx20140813.com
indorebodybilaspur.com
heartandcrowncloset.com
fireandcrystal.com
rbnrf.com
obsessingwealth.com
yslh88.com
guidesgold.net
thoughtslate.com
primeworldgroup.com
yogapants.xyz
lostandfoundpetsalabaster.com
dua.fund
namofast.com
royaloakpublishing.com
gayfuse.com
tumulusanalytics.com
kayapallisgaard.com
ppc-listing.info
allan-wren.com
uneducationofamerica.com
majhulworld.com
the-gongs.com
hybrideve.com
lwpevolve.com
fahufu.com
k-fpa.com
roboleadsystem.com
capitalcitybombers.com
searchnehomes.com
maninhatphoto.com
happinestbuilders.com
sweetbasilmarketing.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 4 IoCs
resource yara_rule behavioral1/memory/1660-60-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/1660-61-0x000000000041CA30-mapping.dmp xloader behavioral1/memory/1660-63-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/524-69-0x0000000000080000-0x00000000000A8000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2036 set thread context of 1660 2036 b7b54eeb2ed2b6d9d1d5c3d97646c48073234f37c798a528e41072f74e95e6b1.exe 26 PID 1660 set thread context of 1200 1660 RegSvcs.exe 22 PID 524 set thread context of 1200 524 cmmon32.exe 22 -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 1660 RegSvcs.exe 1660 RegSvcs.exe 524 cmmon32.exe 524 cmmon32.exe 524 cmmon32.exe 524 cmmon32.exe 524 cmmon32.exe 524 cmmon32.exe 524 cmmon32.exe 524 cmmon32.exe 524 cmmon32.exe 524 cmmon32.exe 524 cmmon32.exe 524 cmmon32.exe 524 cmmon32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1660 RegSvcs.exe 1660 RegSvcs.exe 1660 RegSvcs.exe 524 cmmon32.exe 524 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1660 RegSvcs.exe Token: SeDebugPrivilege 524 cmmon32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1200 Explorer.EXE 1200 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1200 Explorer.EXE 1200 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1660 2036 b7b54eeb2ed2b6d9d1d5c3d97646c48073234f37c798a528e41072f74e95e6b1.exe 26 PID 2036 wrote to memory of 1660 2036 b7b54eeb2ed2b6d9d1d5c3d97646c48073234f37c798a528e41072f74e95e6b1.exe 26 PID 2036 wrote to memory of 1660 2036 b7b54eeb2ed2b6d9d1d5c3d97646c48073234f37c798a528e41072f74e95e6b1.exe 26 PID 2036 wrote to memory of 1660 2036 b7b54eeb2ed2b6d9d1d5c3d97646c48073234f37c798a528e41072f74e95e6b1.exe 26 PID 2036 wrote to memory of 1660 2036 b7b54eeb2ed2b6d9d1d5c3d97646c48073234f37c798a528e41072f74e95e6b1.exe 26 PID 2036 wrote to memory of 1660 2036 b7b54eeb2ed2b6d9d1d5c3d97646c48073234f37c798a528e41072f74e95e6b1.exe 26 PID 2036 wrote to memory of 1660 2036 b7b54eeb2ed2b6d9d1d5c3d97646c48073234f37c798a528e41072f74e95e6b1.exe 26 PID 2036 wrote to memory of 1660 2036 b7b54eeb2ed2b6d9d1d5c3d97646c48073234f37c798a528e41072f74e95e6b1.exe 26 PID 2036 wrote to memory of 1660 2036 b7b54eeb2ed2b6d9d1d5c3d97646c48073234f37c798a528e41072f74e95e6b1.exe 26 PID 2036 wrote to memory of 1660 2036 b7b54eeb2ed2b6d9d1d5c3d97646c48073234f37c798a528e41072f74e95e6b1.exe 26 PID 1200 wrote to memory of 524 1200 Explorer.EXE 27 PID 1200 wrote to memory of 524 1200 Explorer.EXE 27 PID 1200 wrote to memory of 524 1200 Explorer.EXE 27 PID 1200 wrote to memory of 524 1200 Explorer.EXE 27 PID 524 wrote to memory of 1804 524 cmmon32.exe 28 PID 524 wrote to memory of 1804 524 cmmon32.exe 28 PID 524 wrote to memory of 1804 524 cmmon32.exe 28 PID 524 wrote to memory of 1804 524 cmmon32.exe 28
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\b7b54eeb2ed2b6d9d1d5c3d97646c48073234f37c798a528e41072f74e95e6b1.exe"C:\Users\Admin\AppData\Local\Temp\b7b54eeb2ed2b6d9d1d5c3d97646c48073234f37c798a528e41072f74e95e6b1.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:1804
-
-