Analysis
-
max time kernel
147s -
max time network
143s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
04-07-2022 09:06
Static task
static1
Behavioral task
behavioral1
Sample
PO04009540.exe
Resource
win7-20220414-en
General
-
Target
PO04009540.exe
-
Size
219KB
-
MD5
0ff16682f9ece061c742b6610723a1dd
-
SHA1
ed847d278ed83e3e13079a07a12b8f7a75485174
-
SHA256
6187ecd59d9d6c50c32460769a8a16ad8e1051a4c2e12899b2912861be1e823d
-
SHA512
6b9007ffa109fe0b9559a4efac105df7143f34b476ecf7baf1a5b3f473d9841d0a0cb6e6f9ce8d6437811ab73304455595eef5049ca12dd668f808f166611516
Malware Config
Extracted
xloader
2.6
tn61
ryliehorrall.art
mesdco.net
street-art-ink.com
sepetcin.com
stilghar.com
hawaiipooltiles.com
fuerst-von-falkennest.com
totalvirtue.com
xdk0blc0tqy6a7.life
zootowngravel.com
kreditkarten-optionde.com
6888tlbb.xyz
albertakleekai.com
travelnurseinfofinder3.life
valleyinnswat.com
secure-remove-devices.com
digitalswamy.com
www112casinova.com
medifasttrd.com
distritoxermar.com
ebwagner.com
biworker.com
0571kt.net
mjuelaw.com
buildlimitlesswealth.com
wbclips.com
session.care
museatthemill.com
pjhxsl.com
momentums6.com
electricbike.energy
accommodations.network
libroskolibris.com
sejintech.net
parkchestergardens.info
gndgame.info
arcwarp.com
aboveallonline.com
dinotacker.com
ufc188livestreamfree.com
saulomar.com
atmworldexpo.com
chooox.com
admissium.com
dacdem.com
oneruk-chandeliercleaning.com
oyster-iot.cloud
mutinybrewworks.com
yaoih.com
dmitchellpropertiesllc.com
nuoicaymosaigon.com
peacockgotv.com
nextr.xyz
bidvastil.com
shahanhan.com
goodlordy.net
banlyeojob.com
tasteatlus.com
ecotone-os.xyz
urbanartco.com
drecibo.com
davegwatkin.com
pharmiva.net
accordingtopreston.com
blizzardboy.net
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1480-59-0x000000000041F2C0-mapping.dmp xloader behavioral1/memory/1480-58-0x0000000000400000-0x000000000042B000-memory.dmp xloader behavioral1/memory/1480-61-0x0000000000400000-0x000000000042B000-memory.dmp xloader behavioral1/memory/1348-69-0x0000000000080000-0x00000000000AB000-memory.dmp xloader behavioral1/memory/1348-73-0x0000000000080000-0x00000000000AB000-memory.dmp xloader -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
control.exedescription ioc process Key created \Registry\Machine\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run control.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\OP_TQ = "C:\\Program Files (x86)\\Ylrwt8tj0\\igfx_bcplfy.exe" control.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
PO04009540.execvtres.execontrol.exedescription pid process target process PID 316 set thread context of 1480 316 PO04009540.exe cvtres.exe PID 1480 set thread context of 1284 1480 cvtres.exe Explorer.EXE PID 1348 set thread context of 1284 1348 control.exe Explorer.EXE -
Drops file in Program Files directory 1 IoCs
Processes:
control.exedescription ioc process File opened for modification C:\Program Files (x86)\Ylrwt8tj0\igfx_bcplfy.exe control.exe -
Processes:
control.exedescription ioc process Key created \Registry\User\S-1-5-21-1083475884-596052423-1669053738-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 control.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
cvtres.execontrol.exepid process 1480 cvtres.exe 1480 cvtres.exe 1348 control.exe 1348 control.exe 1348 control.exe 1348 control.exe 1348 control.exe 1348 control.exe 1348 control.exe 1348 control.exe 1348 control.exe 1348 control.exe 1348 control.exe 1348 control.exe 1348 control.exe 1348 control.exe 1348 control.exe 1348 control.exe 1348 control.exe 1348 control.exe 1348 control.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
cvtres.execontrol.exepid process 1480 cvtres.exe 1480 cvtres.exe 1480 cvtres.exe 1348 control.exe 1348 control.exe 1348 control.exe 1348 control.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
cvtres.execontrol.exedescription pid process Token: SeDebugPrivilege 1480 cvtres.exe Token: SeDebugPrivilege 1348 control.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1284 Explorer.EXE 1284 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1284 Explorer.EXE 1284 Explorer.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
PO04009540.exeExplorer.EXEcontrol.exedescription pid process target process PID 316 wrote to memory of 1480 316 PO04009540.exe cvtres.exe PID 316 wrote to memory of 1480 316 PO04009540.exe cvtres.exe PID 316 wrote to memory of 1480 316 PO04009540.exe cvtres.exe PID 316 wrote to memory of 1480 316 PO04009540.exe cvtres.exe PID 316 wrote to memory of 1480 316 PO04009540.exe cvtres.exe PID 316 wrote to memory of 1480 316 PO04009540.exe cvtres.exe PID 316 wrote to memory of 1480 316 PO04009540.exe cvtres.exe PID 1284 wrote to memory of 1348 1284 Explorer.EXE control.exe PID 1284 wrote to memory of 1348 1284 Explorer.EXE control.exe PID 1284 wrote to memory of 1348 1284 Explorer.EXE control.exe PID 1284 wrote to memory of 1348 1284 Explorer.EXE control.exe PID 1348 wrote to memory of 2036 1348 control.exe cmd.exe PID 1348 wrote to memory of 2036 1348 control.exe cmd.exe PID 1348 wrote to memory of 2036 1348 control.exe cmd.exe PID 1348 wrote to memory of 2036 1348 control.exe cmd.exe PID 1348 wrote to memory of 1708 1348 control.exe Firefox.exe PID 1348 wrote to memory of 1708 1348 control.exe Firefox.exe PID 1348 wrote to memory of 1708 1348 control.exe Firefox.exe PID 1348 wrote to memory of 1708 1348 control.exe Firefox.exe PID 1348 wrote to memory of 1708 1348 control.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\PO04009540.exe"C:\Users\Admin\AppData\Local\Temp\PO04009540.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1480
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"3⤵PID:2036
-
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:1708
-
-