Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
28-04-2022 12:58
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220414-en
General
-
Target
tmp.exe
-
Size
659KB
-
MD5
680597e569b66c1c77f1f3ef9d145080
-
SHA1
c21684c64fe6ff4ea94691a035b47cfec7dcfb05
-
SHA256
8ecc7ecdce9763d43b61041cbc6c2151fc8583a01af584f7f5fe0999d127aaf6
-
SHA512
c9d2613706df5b2ed82f5650a1812565441e1d09f733cfbf11f14e6e53d92d12a7a827b272de6605c0230165c7526aea925ef53cdd148fbf6fa8bee86714c540
Malware Config
Extracted
xloader
2.5
ocgr
shiftmedicalstaffing.agency
muktobangla.xyz
attmleather.com
modelahs.com
clime.email
yonatec.com
mftie.com
doxofcolor.com
american-atlantic.net
christineenergy.com
fjqsdz.com
nagpurmandarin.com
hofwimmer.com
gororidev.com
china-eros.com
xn--ekrt15fxyb2t2c.xn--czru2d
dabsavy.com
buggy4t.com
souplant.com
insurancewineappraisals.com
012skz.xyz
kincsemto.net
zyaxious.website
tellgalpy.com
demetbatmaz.com
wallacehills.com
chambaultfleurs.com
fairfieldgroupfw.com
lotsimprovements.com
dhslcy.com
anotherdegen.com
dearpennyyouradviceblogspot.com
seekbeforefind.com
societyalluredmcc.com
climatecheckin.com
candybox-eru.com
tentacionescharlie.com
exceedrigging.online
skb-cabinet.com
qhzhuhang.com
ccav11.xyz
sandstonehosting.com
14offresimportantes.com
xn--hj2bz6fwvan2be1g5tb.com
embedded-electronic.com
drsanaclinic.com
ageofcryptos.com
dreamonetnpasumo1.xyz
engroconnect.net
huvao.com
denalicanninglids.com
tootko.com
edisson-bd.com
myamazonloan.net
dbcyebnveoyu.cloud
floridacaterpillar.com
travisjbogard.com
dialoneconstruction.com
tubesing.com
gofilmwizards.com
tahnforest.com
salahov.info
bimcellerviss.com
garglimited.com
mentalnayaarifmetika.online
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 3 IoCs
resource yara_rule behavioral2/memory/2316-133-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2316-135-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/4672-142-0x00000000007A0000-0x00000000007C9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1240 set thread context of 2316 1240 tmp.exe 82 PID 2316 set thread context of 2084 2316 aspnet_compiler.exe 37 PID 4672 set thread context of 2084 4672 mstsc.exe 37 -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 2316 aspnet_compiler.exe 2316 aspnet_compiler.exe 2316 aspnet_compiler.exe 2316 aspnet_compiler.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe 4672 mstsc.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2084 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2316 aspnet_compiler.exe 2316 aspnet_compiler.exe 2316 aspnet_compiler.exe 4672 mstsc.exe 4672 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1240 tmp.exe Token: SeDebugPrivilege 2316 aspnet_compiler.exe Token: SeDebugPrivilege 4672 mstsc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1240 wrote to memory of 2316 1240 tmp.exe 82 PID 1240 wrote to memory of 2316 1240 tmp.exe 82 PID 1240 wrote to memory of 2316 1240 tmp.exe 82 PID 1240 wrote to memory of 2316 1240 tmp.exe 82 PID 1240 wrote to memory of 2316 1240 tmp.exe 82 PID 1240 wrote to memory of 2316 1240 tmp.exe 82 PID 2084 wrote to memory of 4672 2084 Explorer.EXE 83 PID 2084 wrote to memory of 4672 2084 Explorer.EXE 83 PID 2084 wrote to memory of 4672 2084 Explorer.EXE 83 PID 4672 wrote to memory of 3764 4672 mstsc.exe 87 PID 4672 wrote to memory of 3764 4672 mstsc.exe 87 PID 4672 wrote to memory of 3764 4672 mstsc.exe 87
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2316
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵PID:3764
-
-