Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
21-04-2021 17:12
Static task
static1
Behavioral task
behavioral1
Sample
50% payment.exe
Resource
win7v20210408
General
-
Target
50% payment.exe
-
Size
1.1MB
-
MD5
91d6babf1d4ec9c3ff032c9f44291161
-
SHA1
a9009a6c66d5b1f945d7e4ef88ed01dbf86f8d5d
-
SHA256
5aa4e2536c1e6a2b7ff9509081c03906f982a95df7e44bcf162429ac8f969f14
-
SHA512
6eda488e5c15e63db870163f652809ee1fce1169054cd296988e4d7bc6096091009bc7383efdb541fdfed2526ef18470896fe13971e84d7966a9ec30a1f72ae4
Malware Config
Extracted
xloader
2.3
http://www.precigentriplegene.net/ey9c/
veitev.com
alpinerevenuemanagement.com
filthycarwash.com
semanticzone.net
biteasia.com
cranedlbh.com
dassinlegal.com
celebrityworldhindi.com
theberrydesign.com
neapmusic.com
bombayan.com
lux-n-lush.com
yourcoachingconversations.com
asafera.com
aleraretirementpartners.com
fewsolo.xyz
mgformations.com
jenningscaswell.com
fsgateway.net
egeektechlive.com
headlessbookingengine.com
jeljobsgh.com
talkracetogether.com
weedairstream.com
ameeera.com
jivermind.com
atxrealestateforsale.com
nadersadek.info
paintwithjames.com
hackettshousekeeping.com
nicksayler.net
nonnassnackbox.com
sweetcupcr.com
wallis-network.com
gironbeautysalon.online
emotionalopedia.com
emodly.com
hoosiermania.com
tojoglamping.com
tdhthailand.com
xn--vh3bo2id9pa.com
jn-mcdicai.com
toptanmaskesatinal.net
qwikley.com
checkbot.info
faisalmian.com
jeparlelafrance.net
jbwebradio.com
fraudcox.com
panda-destek2020.com
bootyyash.com
zgsyct.com
michelleandernesto.com
digitalallianceap.net
luxuryresortranch.com
cru5.com
digitalmedicalgroup.com
radicaleco.email
kadykaboutiques.com
hiphopjefe.com
zechenturm.com
cashflowplatformplan.com
kuppers.info
andreavermiglio.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/936-66-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/936-67-0x000000000041D090-mapping.dmp xloader behavioral1/memory/1776-75-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1812 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
50% payment.exe50% payment.exechkdsk.exedescription pid process target process PID 1632 set thread context of 936 1632 50% payment.exe 50% payment.exe PID 936 set thread context of 1244 936 50% payment.exe Explorer.EXE PID 1776 set thread context of 1244 1776 chkdsk.exe Explorer.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
chkdsk.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
50% payment.exe50% payment.exechkdsk.exepid process 1632 50% payment.exe 1632 50% payment.exe 936 50% payment.exe 936 50% payment.exe 1776 chkdsk.exe 1776 chkdsk.exe 1776 chkdsk.exe 1776 chkdsk.exe 1776 chkdsk.exe 1776 chkdsk.exe 1776 chkdsk.exe 1776 chkdsk.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
50% payment.exechkdsk.exepid process 936 50% payment.exe 936 50% payment.exe 936 50% payment.exe 1776 chkdsk.exe 1776 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
50% payment.exe50% payment.exechkdsk.exedescription pid process Token: SeDebugPrivilege 1632 50% payment.exe Token: SeDebugPrivilege 936 50% payment.exe Token: SeDebugPrivilege 1776 chkdsk.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
50% payment.exeExplorer.EXEchkdsk.exedescription pid process target process PID 1632 wrote to memory of 936 1632 50% payment.exe 50% payment.exe PID 1632 wrote to memory of 936 1632 50% payment.exe 50% payment.exe PID 1632 wrote to memory of 936 1632 50% payment.exe 50% payment.exe PID 1632 wrote to memory of 936 1632 50% payment.exe 50% payment.exe PID 1632 wrote to memory of 936 1632 50% payment.exe 50% payment.exe PID 1632 wrote to memory of 936 1632 50% payment.exe 50% payment.exe PID 1632 wrote to memory of 936 1632 50% payment.exe 50% payment.exe PID 1244 wrote to memory of 1776 1244 Explorer.EXE chkdsk.exe PID 1244 wrote to memory of 1776 1244 Explorer.EXE chkdsk.exe PID 1244 wrote to memory of 1776 1244 Explorer.EXE chkdsk.exe PID 1244 wrote to memory of 1776 1244 Explorer.EXE chkdsk.exe PID 1776 wrote to memory of 1812 1776 chkdsk.exe cmd.exe PID 1776 wrote to memory of 1812 1776 chkdsk.exe cmd.exe PID 1776 wrote to memory of 1812 1776 chkdsk.exe cmd.exe PID 1776 wrote to memory of 1812 1776 chkdsk.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\50% payment.exe"C:\Users\Admin\AppData\Local\Temp\50% payment.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\50% payment.exe"C:\Users\Admin\AppData\Local\Temp\50% payment.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\50% payment.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/936-67-0x000000000041D090-mapping.dmp
-
memory/936-70-0x00000000001C0000-0x00000000001D1000-memory.dmpFilesize
68KB
-
memory/936-69-0x0000000000A40000-0x0000000000D43000-memory.dmpFilesize
3.0MB
-
memory/936-66-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1244-79-0x0000000003BB0000-0x0000000003C56000-memory.dmpFilesize
664KB
-
memory/1244-71-0x0000000004E20000-0x0000000004FA4000-memory.dmpFilesize
1.5MB
-
memory/1632-65-0x00000000007A0000-0x00000000007CE000-memory.dmpFilesize
184KB
-
memory/1632-60-0x0000000000F30000-0x0000000000F31000-memory.dmpFilesize
4KB
-
memory/1632-64-0x0000000004F50000-0x0000000004FC2000-memory.dmpFilesize
456KB
-
memory/1632-63-0x00000000004B0000-0x00000000004B9000-memory.dmpFilesize
36KB
-
memory/1632-62-0x0000000004E10000-0x0000000004E11000-memory.dmpFilesize
4KB
-
memory/1776-72-0x0000000000000000-mapping.dmp
-
memory/1776-74-0x0000000000FF0000-0x0000000000FF7000-memory.dmpFilesize
28KB
-
memory/1776-75-0x0000000000080000-0x00000000000A9000-memory.dmpFilesize
164KB
-
memory/1776-76-0x0000000000C70000-0x0000000000F73000-memory.dmpFilesize
3.0MB
-
memory/1776-77-0x0000000075551000-0x0000000075553000-memory.dmpFilesize
8KB
-
memory/1776-78-0x0000000000370000-0x0000000000400000-memory.dmpFilesize
576KB
-
memory/1812-73-0x0000000000000000-mapping.dmp