Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
28-04-2022 12:50
Static task
static1
Behavioral task
behavioral1
Sample
680597e569b66c1c77f1f3ef9d145080.exe
Resource
win7-20220414-en
General
-
Target
680597e569b66c1c77f1f3ef9d145080.exe
-
Size
659KB
-
MD5
680597e569b66c1c77f1f3ef9d145080
-
SHA1
c21684c64fe6ff4ea94691a035b47cfec7dcfb05
-
SHA256
8ecc7ecdce9763d43b61041cbc6c2151fc8583a01af584f7f5fe0999d127aaf6
-
SHA512
c9d2613706df5b2ed82f5650a1812565441e1d09f733cfbf11f14e6e53d92d12a7a827b272de6605c0230165c7526aea925ef53cdd148fbf6fa8bee86714c540
Malware Config
Extracted
xloader
2.5
ocgr
shiftmedicalstaffing.agency
muktobangla.xyz
attmleather.com
modelahs.com
clime.email
yonatec.com
mftie.com
doxofcolor.com
american-atlantic.net
christineenergy.com
fjqsdz.com
nagpurmandarin.com
hofwimmer.com
gororidev.com
china-eros.com
xn--ekrt15fxyb2t2c.xn--czru2d
dabsavy.com
buggy4t.com
souplant.com
insurancewineappraisals.com
012skz.xyz
kincsemto.net
zyaxious.website
tellgalpy.com
demetbatmaz.com
wallacehills.com
chambaultfleurs.com
fairfieldgroupfw.com
lotsimprovements.com
dhslcy.com
anotherdegen.com
dearpennyyouradviceblogspot.com
seekbeforefind.com
societyalluredmcc.com
climatecheckin.com
candybox-eru.com
tentacionescharlie.com
exceedrigging.online
skb-cabinet.com
qhzhuhang.com
ccav11.xyz
sandstonehosting.com
14offresimportantes.com
xn--hj2bz6fwvan2be1g5tb.com
embedded-electronic.com
drsanaclinic.com
ageofcryptos.com
dreamonetnpasumo1.xyz
engroconnect.net
huvao.com
denalicanninglids.com
tootko.com
edisson-bd.com
myamazonloan.net
dbcyebnveoyu.cloud
floridacaterpillar.com
travisjbogard.com
dialoneconstruction.com
tubesing.com
gofilmwizards.com
tahnforest.com
salahov.info
bimcellerviss.com
garglimited.com
mentalnayaarifmetika.online
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 4 IoCs
resource yara_rule behavioral1/memory/1656-61-0x000000000041D480-mapping.dmp xloader behavioral1/memory/1656-60-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1656-63-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2000-73-0x00000000000A0000-0x00000000000C9000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1380 set thread context of 1656 1380 680597e569b66c1c77f1f3ef9d145080.exe 26 PID 1656 set thread context of 1388 1656 aspnet_compiler.exe 10 PID 1656 set thread context of 1388 1656 aspnet_compiler.exe 10 PID 2000 set thread context of 1388 2000 wscript.exe 10 -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 1656 aspnet_compiler.exe 1656 aspnet_compiler.exe 1656 aspnet_compiler.exe 2000 wscript.exe 2000 wscript.exe 2000 wscript.exe 2000 wscript.exe 2000 wscript.exe 2000 wscript.exe 2000 wscript.exe 2000 wscript.exe 2000 wscript.exe 2000 wscript.exe 2000 wscript.exe 2000 wscript.exe 2000 wscript.exe 2000 wscript.exe 2000 wscript.exe 2000 wscript.exe 2000 wscript.exe 2000 wscript.exe 2000 wscript.exe 2000 wscript.exe 2000 wscript.exe 2000 wscript.exe 2000 wscript.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1656 aspnet_compiler.exe 1656 aspnet_compiler.exe 1656 aspnet_compiler.exe 1656 aspnet_compiler.exe 2000 wscript.exe 2000 wscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1380 680597e569b66c1c77f1f3ef9d145080.exe Token: SeDebugPrivilege 1656 aspnet_compiler.exe Token: SeDebugPrivilege 2000 wscript.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1388 Explorer.EXE 1388 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1388 Explorer.EXE 1388 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1380 wrote to memory of 1656 1380 680597e569b66c1c77f1f3ef9d145080.exe 26 PID 1380 wrote to memory of 1656 1380 680597e569b66c1c77f1f3ef9d145080.exe 26 PID 1380 wrote to memory of 1656 1380 680597e569b66c1c77f1f3ef9d145080.exe 26 PID 1380 wrote to memory of 1656 1380 680597e569b66c1c77f1f3ef9d145080.exe 26 PID 1380 wrote to memory of 1656 1380 680597e569b66c1c77f1f3ef9d145080.exe 26 PID 1380 wrote to memory of 1656 1380 680597e569b66c1c77f1f3ef9d145080.exe 26 PID 1380 wrote to memory of 1656 1380 680597e569b66c1c77f1f3ef9d145080.exe 26 PID 1656 wrote to memory of 2000 1656 aspnet_compiler.exe 27 PID 1656 wrote to memory of 2000 1656 aspnet_compiler.exe 27 PID 1656 wrote to memory of 2000 1656 aspnet_compiler.exe 27 PID 1656 wrote to memory of 2000 1656 aspnet_compiler.exe 27 PID 2000 wrote to memory of 2016 2000 wscript.exe 28 PID 2000 wrote to memory of 2016 2000 wscript.exe 28 PID 2000 wrote to memory of 2016 2000 wscript.exe 28 PID 2000 wrote to memory of 2016 2000 wscript.exe 28
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\680597e569b66c1c77f1f3ef9d145080.exe"C:\Users\Admin\AppData\Local\Temp\680597e569b66c1c77f1f3ef9d145080.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"5⤵PID:2016
-
-
-
-