Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
04-05-2022 05:47
Static task
static1
Behavioral task
behavioral1
Sample
cotización_1782902.exe
Resource
win7-20220414-en
General
-
Target
cotización_1782902.exe
-
Size
498KB
-
MD5
60cb897960cc1e4a74cde6395e74dbfe
-
SHA1
18a97dfd7176f8f07334d2f3836f1226f2220a4a
-
SHA256
a6900f47fa0f0d76b67e1c4fe017dad2665e52185327c9bbd905514cbcf7728c
-
SHA512
11fe445244943a3b588817369f0adf7aaa03f4a592c68eb604679c8f77ca44f9af786570d06180b87f67284effe29d695c3585ac83b34a1eaaa97a02e395c34c
Malware Config
Extracted
xloader
2.5
snjq
codezonesoftware.xyz
traexcel.com
smalltowncontractors.com
classicalequestrianacademy.com
jlvip1066.com
ovacup.online
foodcravings2312.com
dbelnlogoro.quest
valeriebeijing.com
steri-spiral.com
envisionpoolsnd.biz
adclw.net
smartaf5.xyz
tech4ad.com
trimilos.info
blockplace.club
gunpowderz.com
nayrajewels.com
fapcxi.xyz
mentication.com
coronas.store
sarvarbek.info
hnjst.net
cfotoknow.com
horseshoesheartandhome.com
chrisdaughtryfans.com
laronburrows.com
marketingdigital.jobs
yaraghdooman.com
juicyjuiceplus.com
theangelmarketstore.com
disadaau.info
twiittter.com
lookyanychev.store
seoulcondo.com
xn--lohmller-95a.gmbh
phoenixphantoms.com
mayerscapital.com
bestdigitalsells.com
sablon.digital
1712fillmore.com
outfitondemand.com
missnikissalsa.net
sdunwoody.online
screwstoned.com
elm-algarve.com
freedommattersmost.com
jamunahub.com
fremurgroup.com
elevare.online
pravosozidanie.store
quickwin.xyz
891712.com
atgoogle.online
jamespfinlay.com
murderingmediocrity.com
courtownangling.com
cbtnightmares.com
inmind.company
novaleonohotels.net
quotexphilippines.com
g1novasaude.website
intenswines.com
inside-informatica.com
turkistick.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 3 IoCs
resource yara_rule behavioral2/memory/3856-138-0x0000000000400000-0x000000000042A000-memory.dmp xloader behavioral2/memory/3856-140-0x0000000000400000-0x000000000042A000-memory.dmp xloader behavioral2/memory/220-147-0x0000000000D40000-0x0000000000D6A000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3248 set thread context of 3856 3248 cotización_1782902.exe 91 PID 3856 set thread context of 3152 3856 cotización_1782902.exe 24 PID 220 set thread context of 3152 220 control.exe 24 -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 3248 cotización_1782902.exe 3248 cotización_1782902.exe 3856 cotización_1782902.exe 3856 cotización_1782902.exe 3856 cotización_1782902.exe 3856 cotización_1782902.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe 220 control.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3152 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3856 cotización_1782902.exe 3856 cotización_1782902.exe 3856 cotización_1782902.exe 220 control.exe 220 control.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3248 cotización_1782902.exe Token: SeDebugPrivilege 3856 cotización_1782902.exe Token: SeDebugPrivilege 220 control.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3248 wrote to memory of 4300 3248 cotización_1782902.exe 90 PID 3248 wrote to memory of 4300 3248 cotización_1782902.exe 90 PID 3248 wrote to memory of 4300 3248 cotización_1782902.exe 90 PID 3248 wrote to memory of 3856 3248 cotización_1782902.exe 91 PID 3248 wrote to memory of 3856 3248 cotización_1782902.exe 91 PID 3248 wrote to memory of 3856 3248 cotización_1782902.exe 91 PID 3248 wrote to memory of 3856 3248 cotización_1782902.exe 91 PID 3248 wrote to memory of 3856 3248 cotización_1782902.exe 91 PID 3248 wrote to memory of 3856 3248 cotización_1782902.exe 91 PID 3152 wrote to memory of 220 3152 Explorer.EXE 92 PID 3152 wrote to memory of 220 3152 Explorer.EXE 92 PID 3152 wrote to memory of 220 3152 Explorer.EXE 92 PID 220 wrote to memory of 4820 220 control.exe 93 PID 220 wrote to memory of 4820 220 control.exe 93 PID 220 wrote to memory of 4820 220 control.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\cotización_1782902.exe"C:\Users\Admin\AppData\Local\Temp\cotización_1782902.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\cotización_1782902.exe"C:\Users\Admin\AppData\Local\Temp\cotización_1782902.exe"3⤵PID:4300
-
-
C:\Users\Admin\AppData\Local\Temp\cotización_1782902.exe"C:\Users\Admin\AppData\Local\Temp\cotización_1782902.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3856
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\cotización_1782902.exe"3⤵PID:4820
-
-