Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
14-05-2022 13:28
Static task
static1
Behavioral task
behavioral1
Sample
ce42fe431b88922ab59b6fd880cadcf6.exe
Resource
win7-20220414-en
General
-
Target
ce42fe431b88922ab59b6fd880cadcf6.exe
-
Size
224KB
-
MD5
ce42fe431b88922ab59b6fd880cadcf6
-
SHA1
652914d960da1d37d270db7f6e3b07c9d4b0e3a9
-
SHA256
4d8cc87942499042195cec4fdb2fc5869d4bf98a1d827fd30fb74e82cf0fdc0f
-
SHA512
62b30a77cb2ef3491abb3ec517ca966c4a9eafa0f263118ba817a4ce87f8d3cddc014bce25ff268435b7f69605e6c14b8031b482f7caf00e855964c618c609ba
Malware Config
Extracted
xloader
2.5
ocgr
shiftmedicalstaffing.agency
muktobangla.xyz
attmleather.com
modelahs.com
clime.email
yonatec.com
mftie.com
doxofcolor.com
american-atlantic.net
christineenergy.com
fjqsdz.com
nagpurmandarin.com
hofwimmer.com
gororidev.com
china-eros.com
xn--ekrt15fxyb2t2c.xn--czru2d
dabsavy.com
buggy4t.com
souplant.com
insurancewineappraisals.com
012skz.xyz
kincsemto.net
zyaxious.website
tellgalpy.com
demetbatmaz.com
wallacehills.com
chambaultfleurs.com
fairfieldgroupfw.com
lotsimprovements.com
dhslcy.com
anotherdegen.com
dearpennyyouradviceblogspot.com
seekbeforefind.com
societyalluredmcc.com
climatecheckin.com
candybox-eru.com
tentacionescharlie.com
exceedrigging.online
skb-cabinet.com
qhzhuhang.com
ccav11.xyz
sandstonehosting.com
14offresimportantes.com
xn--hj2bz6fwvan2be1g5tb.com
embedded-electronic.com
drsanaclinic.com
ageofcryptos.com
dreamonetnpasumo1.xyz
engroconnect.net
huvao.com
denalicanninglids.com
tootko.com
edisson-bd.com
myamazonloan.net
dbcyebnveoyu.cloud
floridacaterpillar.com
travisjbogard.com
dialoneconstruction.com
tubesing.com
gofilmwizards.com
tahnforest.com
salahov.info
bimcellerviss.com
garglimited.com
mentalnayaarifmetika.online
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/4272-133-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2936-141-0x00000000004F0000-0x0000000000519000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
ce42fe431b88922ab59b6fd880cadcf6.exeaspnet_compiler.exeWWAHost.exedescription pid process target process PID 1848 set thread context of 4272 1848 ce42fe431b88922ab59b6fd880cadcf6.exe aspnet_compiler.exe PID 4272 set thread context of 2996 4272 aspnet_compiler.exe Explorer.EXE PID 2936 set thread context of 2996 2936 WWAHost.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 58 IoCs
Processes:
aspnet_compiler.exeWWAHost.exepid process 4272 aspnet_compiler.exe 4272 aspnet_compiler.exe 4272 aspnet_compiler.exe 4272 aspnet_compiler.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe 2936 WWAHost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2996 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
aspnet_compiler.exeWWAHost.exepid process 4272 aspnet_compiler.exe 4272 aspnet_compiler.exe 4272 aspnet_compiler.exe 2936 WWAHost.exe 2936 WWAHost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
ce42fe431b88922ab59b6fd880cadcf6.exeaspnet_compiler.exeWWAHost.exedescription pid process Token: SeDebugPrivilege 1848 ce42fe431b88922ab59b6fd880cadcf6.exe Token: SeDebugPrivilege 4272 aspnet_compiler.exe Token: SeDebugPrivilege 2936 WWAHost.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
ce42fe431b88922ab59b6fd880cadcf6.exeExplorer.EXEWWAHost.exedescription pid process target process PID 1848 wrote to memory of 4272 1848 ce42fe431b88922ab59b6fd880cadcf6.exe aspnet_compiler.exe PID 1848 wrote to memory of 4272 1848 ce42fe431b88922ab59b6fd880cadcf6.exe aspnet_compiler.exe PID 1848 wrote to memory of 4272 1848 ce42fe431b88922ab59b6fd880cadcf6.exe aspnet_compiler.exe PID 1848 wrote to memory of 4272 1848 ce42fe431b88922ab59b6fd880cadcf6.exe aspnet_compiler.exe PID 1848 wrote to memory of 4272 1848 ce42fe431b88922ab59b6fd880cadcf6.exe aspnet_compiler.exe PID 1848 wrote to memory of 4272 1848 ce42fe431b88922ab59b6fd880cadcf6.exe aspnet_compiler.exe PID 2996 wrote to memory of 2936 2996 Explorer.EXE WWAHost.exe PID 2996 wrote to memory of 2936 2996 Explorer.EXE WWAHost.exe PID 2996 wrote to memory of 2936 2996 Explorer.EXE WWAHost.exe PID 2936 wrote to memory of 1228 2936 WWAHost.exe cmd.exe PID 2936 wrote to memory of 1228 2936 WWAHost.exe cmd.exe PID 2936 wrote to memory of 1228 2936 WWAHost.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\ce42fe431b88922ab59b6fd880cadcf6.exe"C:\Users\Admin\AppData\Local\Temp\ce42fe431b88922ab59b6fd880cadcf6.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4272
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:3960
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:3764
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:3836
-
-
C:\Windows\SysWOW64\WWAHost.exe"C:\Windows\SysWOW64\WWAHost.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵PID:1228
-
-