Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
28-04-2022 12:58
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220414-en
General
-
Target
tmp.exe
-
Size
659KB
-
MD5
680597e569b66c1c77f1f3ef9d145080
-
SHA1
c21684c64fe6ff4ea94691a035b47cfec7dcfb05
-
SHA256
8ecc7ecdce9763d43b61041cbc6c2151fc8583a01af584f7f5fe0999d127aaf6
-
SHA512
c9d2613706df5b2ed82f5650a1812565441e1d09f733cfbf11f14e6e53d92d12a7a827b272de6605c0230165c7526aea925ef53cdd148fbf6fa8bee86714c540
Malware Config
Extracted
xloader
2.5
ocgr
shiftmedicalstaffing.agency
muktobangla.xyz
attmleather.com
modelahs.com
clime.email
yonatec.com
mftie.com
doxofcolor.com
american-atlantic.net
christineenergy.com
fjqsdz.com
nagpurmandarin.com
hofwimmer.com
gororidev.com
china-eros.com
xn--ekrt15fxyb2t2c.xn--czru2d
dabsavy.com
buggy4t.com
souplant.com
insurancewineappraisals.com
012skz.xyz
kincsemto.net
zyaxious.website
tellgalpy.com
demetbatmaz.com
wallacehills.com
chambaultfleurs.com
fairfieldgroupfw.com
lotsimprovements.com
dhslcy.com
anotherdegen.com
dearpennyyouradviceblogspot.com
seekbeforefind.com
societyalluredmcc.com
climatecheckin.com
candybox-eru.com
tentacionescharlie.com
exceedrigging.online
skb-cabinet.com
qhzhuhang.com
ccav11.xyz
sandstonehosting.com
14offresimportantes.com
xn--hj2bz6fwvan2be1g5tb.com
embedded-electronic.com
drsanaclinic.com
ageofcryptos.com
dreamonetnpasumo1.xyz
engroconnect.net
huvao.com
denalicanninglids.com
tootko.com
edisson-bd.com
myamazonloan.net
dbcyebnveoyu.cloud
floridacaterpillar.com
travisjbogard.com
dialoneconstruction.com
tubesing.com
gofilmwizards.com
tahnforest.com
salahov.info
bimcellerviss.com
garglimited.com
mentalnayaarifmetika.online
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 4 IoCs
resource yara_rule behavioral1/memory/844-61-0x000000000041D480-mapping.dmp xloader behavioral1/memory/844-60-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/844-63-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1060-69-0x00000000000D0000-0x00000000000F9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1796 set thread context of 844 1796 tmp.exe 28 PID 844 set thread context of 1204 844 aspnet_compiler.exe 9 PID 1060 set thread context of 1204 1060 help.exe 9 -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 844 aspnet_compiler.exe 844 aspnet_compiler.exe 1060 help.exe 1060 help.exe 1060 help.exe 1060 help.exe 1060 help.exe 1060 help.exe 1060 help.exe 1060 help.exe 1060 help.exe 1060 help.exe 1060 help.exe 1060 help.exe 1060 help.exe 1060 help.exe 1060 help.exe 1060 help.exe 1060 help.exe 1060 help.exe 1060 help.exe 1060 help.exe 1060 help.exe 1060 help.exe 1060 help.exe 1060 help.exe 1060 help.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 844 aspnet_compiler.exe 844 aspnet_compiler.exe 844 aspnet_compiler.exe 1060 help.exe 1060 help.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1796 tmp.exe Token: SeDebugPrivilege 844 aspnet_compiler.exe Token: SeDebugPrivilege 1060 help.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1204 Explorer.EXE 1204 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1204 Explorer.EXE 1204 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1796 wrote to memory of 844 1796 tmp.exe 28 PID 1796 wrote to memory of 844 1796 tmp.exe 28 PID 1796 wrote to memory of 844 1796 tmp.exe 28 PID 1796 wrote to memory of 844 1796 tmp.exe 28 PID 1796 wrote to memory of 844 1796 tmp.exe 28 PID 1796 wrote to memory of 844 1796 tmp.exe 28 PID 1796 wrote to memory of 844 1796 tmp.exe 28 PID 1204 wrote to memory of 1060 1204 Explorer.EXE 29 PID 1204 wrote to memory of 1060 1204 Explorer.EXE 29 PID 1204 wrote to memory of 1060 1204 Explorer.EXE 29 PID 1204 wrote to memory of 1060 1204 Explorer.EXE 29 PID 1060 wrote to memory of 1196 1060 help.exe 30 PID 1060 wrote to memory of 1196 1060 help.exe 30 PID 1060 wrote to memory of 1196 1060 help.exe 30 PID 1060 wrote to memory of 1196 1060 help.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:844
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵PID:1196
-
-