Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
04-05-2022 05:47
Static task
static1
Behavioral task
behavioral1
Sample
cotización_1782902.exe
Resource
win7-20220414-en
General
-
Target
cotización_1782902.exe
-
Size
498KB
-
MD5
60cb897960cc1e4a74cde6395e74dbfe
-
SHA1
18a97dfd7176f8f07334d2f3836f1226f2220a4a
-
SHA256
a6900f47fa0f0d76b67e1c4fe017dad2665e52185327c9bbd905514cbcf7728c
-
SHA512
11fe445244943a3b588817369f0adf7aaa03f4a592c68eb604679c8f77ca44f9af786570d06180b87f67284effe29d695c3585ac83b34a1eaaa97a02e395c34c
Malware Config
Extracted
xloader
2.5
snjq
codezonesoftware.xyz
traexcel.com
smalltowncontractors.com
classicalequestrianacademy.com
jlvip1066.com
ovacup.online
foodcravings2312.com
dbelnlogoro.quest
valeriebeijing.com
steri-spiral.com
envisionpoolsnd.biz
adclw.net
smartaf5.xyz
tech4ad.com
trimilos.info
blockplace.club
gunpowderz.com
nayrajewels.com
fapcxi.xyz
mentication.com
coronas.store
sarvarbek.info
hnjst.net
cfotoknow.com
horseshoesheartandhome.com
chrisdaughtryfans.com
laronburrows.com
marketingdigital.jobs
yaraghdooman.com
juicyjuiceplus.com
theangelmarketstore.com
disadaau.info
twiittter.com
lookyanychev.store
seoulcondo.com
xn--lohmller-95a.gmbh
phoenixphantoms.com
mayerscapital.com
bestdigitalsells.com
sablon.digital
1712fillmore.com
outfitondemand.com
missnikissalsa.net
sdunwoody.online
screwstoned.com
elm-algarve.com
freedommattersmost.com
jamunahub.com
fremurgroup.com
elevare.online
pravosozidanie.store
quickwin.xyz
891712.com
atgoogle.online
jamespfinlay.com
murderingmediocrity.com
courtownangling.com
cbtnightmares.com
inmind.company
novaleonohotels.net
quotexphilippines.com
g1novasaude.website
intenswines.com
inside-informatica.com
turkistick.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 4 IoCs
resource yara_rule behavioral1/memory/1672-62-0x0000000000400000-0x000000000042A000-memory.dmp xloader behavioral1/memory/1672-63-0x000000000041D9D0-mapping.dmp xloader behavioral1/memory/1672-65-0x0000000000400000-0x000000000042A000-memory.dmp xloader behavioral1/memory/1636-75-0x0000000000080000-0x00000000000AA000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 760 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1660 set thread context of 1672 1660 cotización_1782902.exe 26 PID 1672 set thread context of 1248 1672 cotización_1782902.exe 14 PID 1672 set thread context of 1248 1672 cotización_1782902.exe 14 PID 1636 set thread context of 1248 1636 wlanext.exe 14 -
Suspicious behavior: EnumeratesProcesses 17 IoCs
pid Process 1672 cotización_1782902.exe 1672 cotización_1782902.exe 1672 cotización_1782902.exe 1636 wlanext.exe 1636 wlanext.exe 1636 wlanext.exe 1636 wlanext.exe 1636 wlanext.exe 1636 wlanext.exe 1636 wlanext.exe 1636 wlanext.exe 1636 wlanext.exe 1636 wlanext.exe 1636 wlanext.exe 1636 wlanext.exe 1636 wlanext.exe 1636 wlanext.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1672 cotización_1782902.exe 1672 cotización_1782902.exe 1672 cotización_1782902.exe 1672 cotización_1782902.exe 1636 wlanext.exe 1636 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1672 cotización_1782902.exe Token: SeDebugPrivilege 1636 wlanext.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1248 Explorer.EXE 1248 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1248 Explorer.EXE 1248 Explorer.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1672 1660 cotización_1782902.exe 26 PID 1660 wrote to memory of 1672 1660 cotización_1782902.exe 26 PID 1660 wrote to memory of 1672 1660 cotización_1782902.exe 26 PID 1660 wrote to memory of 1672 1660 cotización_1782902.exe 26 PID 1660 wrote to memory of 1672 1660 cotización_1782902.exe 26 PID 1660 wrote to memory of 1672 1660 cotización_1782902.exe 26 PID 1660 wrote to memory of 1672 1660 cotización_1782902.exe 26 PID 1248 wrote to memory of 1636 1248 Explorer.EXE 27 PID 1248 wrote to memory of 1636 1248 Explorer.EXE 27 PID 1248 wrote to memory of 1636 1248 Explorer.EXE 27 PID 1248 wrote to memory of 1636 1248 Explorer.EXE 27 PID 1636 wrote to memory of 760 1636 wlanext.exe 28 PID 1636 wrote to memory of 760 1636 wlanext.exe 28 PID 1636 wrote to memory of 760 1636 wlanext.exe 28 PID 1636 wrote to memory of 760 1636 wlanext.exe 28
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\cotización_1782902.exe"C:\Users\Admin\AppData\Local\Temp\cotización_1782902.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\cotización_1782902.exe"C:\Users\Admin\AppData\Local\Temp\cotización_1782902.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\cotización_1782902.exe"3⤵
- Deletes itself
PID:760
-
-