Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-05-2022 22:24
Static task
static1
Behavioral task
behavioral1
Sample
see7.exe
Resource
win7-20220414-en
General
-
Target
see7.exe
-
Size
574KB
-
MD5
1ccf28645e2d52556487a9710de54d8e
-
SHA1
e83b5b14a3d08d8838e23c08070ebec713f859ef
-
SHA256
513624286483a4e172511b412b82445a06eefc904d54de75da656ec1a6f8ae99
-
SHA512
5a5f4c5fb992bac2119234563a8a7d3418baab3e3519f936f13a598aa9026dbeba571b7981a5a6afa519e18b124d8cf4c6642b30b88a4a091a051e2b41c5f321
Malware Config
Extracted
xloader
2.6
eido
revellbb.com
tempranillowine.net
viralstrategies.info
blacktxu.com
flfththirdbank.com
vaoex.com
theselfdirectedinvestor.com
vinadelmar.travel
othersidejimmythemonkey.com
jaguar-landrovercenter-graz.com
supremeosterreich.com
chatsubs.com
free99.design
serviciosmvs.com
bongmecams.xyz
malikwoodson.com
onlinegamebox.club
694624.com
yeezyzapatos.club
istanbul-hairtransplant.com
expectations.info
giveafeast.com
latcsvg.com
thetablelanta.com
digitalcoastdaily.com
talltailsentertainment.com
gastore.store
sextoys411.com
hhty307.com
gjiijsijfsdff.xyz
discord-dnd.com
myazpensioneducation.com
housetraitors.com
halopinkstar.com
thethord.com
brandx.biz
mrgear.xyz
emuk.site
ydbaba.com
wosongla.com
paligeri.com
clipcoffee.net
pathnorthsweeps.com
urlbnarc.com
grimpeople.online
surgetech.digital
uppercase-shop.com
anniebirdsong.info
cherylalopes.com
bravesxx.com
buysalba.com
aoneclubs.com
wank152.com
viv.gifts
n1groupe.com
zhengyp.top
boreable.xyz
pointlomaadvisors.com
thebestineasttexas.com
we-gamble.net
snowycitron.online
octsqd.xyz
226coaching.com
phuclapgarment.com
veterancg.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 2 IoCs
resource yara_rule behavioral2/memory/1816-137-0x0000000000400000-0x000000000042B000-memory.dmp xloader behavioral2/memory/2380-144-0x00000000004B0000-0x00000000004DB000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2988 set thread context of 1816 2988 see7.exe 85 PID 1816 set thread context of 2480 1816 see7.exe 36 PID 2380 set thread context of 2480 2380 help.exe 36 -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 1816 see7.exe 1816 see7.exe 1816 see7.exe 1816 see7.exe 2380 help.exe 2380 help.exe 2380 help.exe 2380 help.exe 2380 help.exe 2380 help.exe 2380 help.exe 2380 help.exe 2380 help.exe 2380 help.exe 2380 help.exe 2380 help.exe 2380 help.exe 2380 help.exe 2380 help.exe 2380 help.exe 2380 help.exe 2380 help.exe 2380 help.exe 2380 help.exe 2380 help.exe 2380 help.exe 2380 help.exe 2380 help.exe 2380 help.exe 2380 help.exe 2380 help.exe 2380 help.exe 2380 help.exe 2380 help.exe 2380 help.exe 2380 help.exe 2380 help.exe 2380 help.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2480 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1816 see7.exe 1816 see7.exe 1816 see7.exe 2380 help.exe 2380 help.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2988 see7.exe Token: SeDebugPrivilege 1816 see7.exe Token: SeDebugPrivilege 2380 help.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2988 wrote to memory of 1816 2988 see7.exe 85 PID 2988 wrote to memory of 1816 2988 see7.exe 85 PID 2988 wrote to memory of 1816 2988 see7.exe 85 PID 2988 wrote to memory of 1816 2988 see7.exe 85 PID 2988 wrote to memory of 1816 2988 see7.exe 85 PID 2988 wrote to memory of 1816 2988 see7.exe 85 PID 2480 wrote to memory of 2380 2480 Explorer.EXE 86 PID 2480 wrote to memory of 2380 2480 Explorer.EXE 86 PID 2480 wrote to memory of 2380 2480 Explorer.EXE 86 PID 2380 wrote to memory of 4756 2380 help.exe 88 PID 2380 wrote to memory of 4756 2380 help.exe 88 PID 2380 wrote to memory of 4756 2380 help.exe 88
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\see7.exe"C:\Users\Admin\AppData\Local\Temp\see7.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\see7.exe"C:\Users\Admin\AppData\Local\Temp\see7.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\see7.exe"3⤵PID:4756
-
-