Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
22-06-2022 05:29
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT SWIFT.exe
Resource
win7-20220414-en
General
-
Target
PAYMENT SWIFT.exe
-
Size
945KB
-
MD5
58a2b57d6fed01004f9a3836daf788aa
-
SHA1
c3f3d392937fc4b9603a802808c72276a2070484
-
SHA256
dd343e8e8564f63c03e29e51e23e4181817e37f8203f4ec5a8abb9f6ca21a7bf
-
SHA512
0cdb854bff03250a52126e987112a53a44d55c5b8d3b7e79f2a01001edeb7b89375082b1891faded95e507b48f7130665a50842e535c6c6b4ecb8970ccf7fef0
Malware Config
Extracted
xloader
2.6
be3s
aoxaswa.info
souplab-graphic.com
churchontheisland.com
spclassic-cars.com
stanford-edu.club
heydowm.online
chattanooga-electricians.com
sectsk.com
cxg98.com
buildafricaonline.net
buydogcoin.com
vsst247.com
lodgelastrancas.com
ainonaho.com
griousndwarehsftyfs.xyz
voltagestabilizersupply.com
xn--79q565dzfex9hg81b.com
isrvr-ccrforum.info
chitiandi.com
criticaldisco.com
fxivcama.com
martinsalas12.com
stellar3.xyz
positivistapproach.com
drivecheckeredflagcdjr.com
ejxsj.com
vegastrader.net
srivedafireandsafetysystems.com
ssmrmt.com
alexander-stuart.com
bill-tj.com
ctgteams.com
gossipnode.com
c431s.com
kelleysheartinart.com
rusucatalin.com
beautifulcreativeconcepts.info
hongyanwulei.com
lhab.xyz
gpzdd.com
dailyprizes-2022.site
hollafashions.com
gecharity.com
villagegram.com
davisesinthesmokies.xyz
webandsundry.com
setthetonenyc.com
bayu122.com
lajollabella.com
ghazalceramic.com
soft-iwacu.online
haksography.com
karise.life
promobilelist.com
respecttheroyalty.com
17500teraholland.com
giraffeemarketing.com
canyouseelouise.net
watchur6.com
eqaq-tvzurp.xyz
onlinecumpar.com
watchdiving.com
austriatourguide.com
kavun2.xyz
mpmidea.com
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1312-63-0x0000000000400000-0x000000000042B000-memory.dmp xloader behavioral1/memory/1312-64-0x000000000041F320-mapping.dmp xloader behavioral1/memory/1312-69-0x0000000000400000-0x000000000042B000-memory.dmp xloader behavioral1/memory/1312-73-0x0000000000400000-0x000000000042B000-memory.dmp xloader behavioral1/memory/2008-76-0x0000000000080000-0x00000000000AB000-memory.dmp xloader behavioral1/memory/2008-80-0x0000000000080000-0x00000000000AB000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1968 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
cmd.exedescription ioc process Key created \Registry\Machine\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run cmd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\YLRDORP8FZX = "C:\\Program Files (x86)\\Wjjzxu\\audiodg3fz.exe" cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
PAYMENT SWIFT.exePAYMENT SWIFT.execmd.exedescription pid process target process PID 1320 set thread context of 1312 1320 PAYMENT SWIFT.exe PAYMENT SWIFT.exe PID 1312 set thread context of 1280 1312 PAYMENT SWIFT.exe Explorer.EXE PID 1312 set thread context of 1280 1312 PAYMENT SWIFT.exe Explorer.EXE PID 2008 set thread context of 1280 2008 cmd.exe Explorer.EXE -
Drops file in Program Files directory 1 IoCs
Processes:
cmd.exedescription ioc process File opened for modification C:\Program Files (x86)\Wjjzxu\audiodg3fz.exe cmd.exe -
Processes:
cmd.exedescription ioc process Key created \Registry\User\S-1-5-21-1819626980-2277161760-1023733287-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 cmd.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
PAYMENT SWIFT.execmd.exepid process 1312 PAYMENT SWIFT.exe 1312 PAYMENT SWIFT.exe 1312 PAYMENT SWIFT.exe 2008 cmd.exe 2008 cmd.exe 2008 cmd.exe 2008 cmd.exe 2008 cmd.exe 2008 cmd.exe 2008 cmd.exe 2008 cmd.exe 2008 cmd.exe 2008 cmd.exe 2008 cmd.exe 2008 cmd.exe 2008 cmd.exe 2008 cmd.exe 2008 cmd.exe 2008 cmd.exe 2008 cmd.exe 2008 cmd.exe 2008 cmd.exe 2008 cmd.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
PAYMENT SWIFT.execmd.exepid process 1312 PAYMENT SWIFT.exe 1312 PAYMENT SWIFT.exe 1312 PAYMENT SWIFT.exe 1312 PAYMENT SWIFT.exe 2008 cmd.exe 2008 cmd.exe 2008 cmd.exe 2008 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
PAYMENT SWIFT.execmd.exedescription pid process Token: SeDebugPrivilege 1312 PAYMENT SWIFT.exe Token: SeDebugPrivilege 2008 cmd.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1280 Explorer.EXE 1280 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1280 Explorer.EXE 1280 Explorer.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
PAYMENT SWIFT.exeExplorer.EXEcmd.exedescription pid process target process PID 1320 wrote to memory of 1312 1320 PAYMENT SWIFT.exe PAYMENT SWIFT.exe PID 1320 wrote to memory of 1312 1320 PAYMENT SWIFT.exe PAYMENT SWIFT.exe PID 1320 wrote to memory of 1312 1320 PAYMENT SWIFT.exe PAYMENT SWIFT.exe PID 1320 wrote to memory of 1312 1320 PAYMENT SWIFT.exe PAYMENT SWIFT.exe PID 1320 wrote to memory of 1312 1320 PAYMENT SWIFT.exe PAYMENT SWIFT.exe PID 1320 wrote to memory of 1312 1320 PAYMENT SWIFT.exe PAYMENT SWIFT.exe PID 1320 wrote to memory of 1312 1320 PAYMENT SWIFT.exe PAYMENT SWIFT.exe PID 1280 wrote to memory of 2008 1280 Explorer.EXE cmd.exe PID 1280 wrote to memory of 2008 1280 Explorer.EXE cmd.exe PID 1280 wrote to memory of 2008 1280 Explorer.EXE cmd.exe PID 1280 wrote to memory of 2008 1280 Explorer.EXE cmd.exe PID 2008 wrote to memory of 1968 2008 cmd.exe cmd.exe PID 2008 wrote to memory of 1968 2008 cmd.exe cmd.exe PID 2008 wrote to memory of 1968 2008 cmd.exe cmd.exe PID 2008 wrote to memory of 1968 2008 cmd.exe cmd.exe PID 2008 wrote to memory of 468 2008 cmd.exe Firefox.exe PID 2008 wrote to memory of 468 2008 cmd.exe Firefox.exe PID 2008 wrote to memory of 468 2008 cmd.exe Firefox.exe PID 2008 wrote to memory of 468 2008 cmd.exe Firefox.exe PID 2008 wrote to memory of 468 2008 cmd.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\PAYMENT SWIFT.exe"C:\Users\Admin\AppData\Local\Temp\PAYMENT SWIFT.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\PAYMENT SWIFT.exe"C:\Users\Admin\AppData\Local\Temp\PAYMENT SWIFT.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1312 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PAYMENT SWIFT.exe"3⤵
- Deletes itself
PID:1968 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:468