Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
21-04-2021 17:12
Static task
static1
Behavioral task
behavioral1
Sample
50% payment.exe
Resource
win7v20210408
General
-
Target
50% payment.exe
-
Size
1.1MB
-
MD5
91d6babf1d4ec9c3ff032c9f44291161
-
SHA1
a9009a6c66d5b1f945d7e4ef88ed01dbf86f8d5d
-
SHA256
5aa4e2536c1e6a2b7ff9509081c03906f982a95df7e44bcf162429ac8f969f14
-
SHA512
6eda488e5c15e63db870163f652809ee1fce1169054cd296988e4d7bc6096091009bc7383efdb541fdfed2526ef18470896fe13971e84d7966a9ec30a1f72ae4
Malware Config
Extracted
xloader
2.3
http://www.precigentriplegene.net/ey9c/
veitev.com
alpinerevenuemanagement.com
filthycarwash.com
semanticzone.net
biteasia.com
cranedlbh.com
dassinlegal.com
celebrityworldhindi.com
theberrydesign.com
neapmusic.com
bombayan.com
lux-n-lush.com
yourcoachingconversations.com
asafera.com
aleraretirementpartners.com
fewsolo.xyz
mgformations.com
jenningscaswell.com
fsgateway.net
egeektechlive.com
headlessbookingengine.com
jeljobsgh.com
talkracetogether.com
weedairstream.com
ameeera.com
jivermind.com
atxrealestateforsale.com
nadersadek.info
paintwithjames.com
hackettshousekeeping.com
nicksayler.net
nonnassnackbox.com
sweetcupcr.com
wallis-network.com
gironbeautysalon.online
emotionalopedia.com
emodly.com
hoosiermania.com
tojoglamping.com
tdhthailand.com
xn--vh3bo2id9pa.com
jn-mcdicai.com
toptanmaskesatinal.net
qwikley.com
checkbot.info
faisalmian.com
jeparlelafrance.net
jbwebradio.com
fraudcox.com
panda-destek2020.com
bootyyash.com
zgsyct.com
michelleandernesto.com
digitalallianceap.net
luxuryresortranch.com
cru5.com
digitalmedicalgroup.com
radicaleco.email
kadykaboutiques.com
hiphopjefe.com
zechenturm.com
cashflowplatformplan.com
kuppers.info
andreavermiglio.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3956-125-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3956-126-0x000000000041D090-mapping.dmp xloader behavioral2/memory/3108-135-0x00000000028A0000-0x00000000028C9000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
Processes:
50% payment.exe50% payment.execolorcpl.exedescription pid process target process PID 4064 set thread context of 3956 4064 50% payment.exe 50% payment.exe PID 3956 set thread context of 3048 3956 50% payment.exe Explorer.EXE PID 3956 set thread context of 3048 3956 50% payment.exe Explorer.EXE PID 3108 set thread context of 3048 3108 colorcpl.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
50% payment.exe50% payment.execolorcpl.exepid process 4064 50% payment.exe 4064 50% payment.exe 4064 50% payment.exe 3956 50% payment.exe 3956 50% payment.exe 3956 50% payment.exe 3956 50% payment.exe 3956 50% payment.exe 3956 50% payment.exe 3108 colorcpl.exe 3108 colorcpl.exe 3108 colorcpl.exe 3108 colorcpl.exe 3108 colorcpl.exe 3108 colorcpl.exe 3108 colorcpl.exe 3108 colorcpl.exe 3108 colorcpl.exe 3108 colorcpl.exe 3108 colorcpl.exe 3108 colorcpl.exe 3108 colorcpl.exe 3108 colorcpl.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
50% payment.execolorcpl.exepid process 3956 50% payment.exe 3956 50% payment.exe 3956 50% payment.exe 3956 50% payment.exe 3108 colorcpl.exe 3108 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
50% payment.exe50% payment.execolorcpl.exedescription pid process Token: SeDebugPrivilege 4064 50% payment.exe Token: SeDebugPrivilege 3956 50% payment.exe Token: SeDebugPrivilege 3108 colorcpl.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
50% payment.exeExplorer.EXEcolorcpl.exedescription pid process target process PID 4064 wrote to memory of 3956 4064 50% payment.exe 50% payment.exe PID 4064 wrote to memory of 3956 4064 50% payment.exe 50% payment.exe PID 4064 wrote to memory of 3956 4064 50% payment.exe 50% payment.exe PID 4064 wrote to memory of 3956 4064 50% payment.exe 50% payment.exe PID 4064 wrote to memory of 3956 4064 50% payment.exe 50% payment.exe PID 4064 wrote to memory of 3956 4064 50% payment.exe 50% payment.exe PID 3048 wrote to memory of 3108 3048 Explorer.EXE colorcpl.exe PID 3048 wrote to memory of 3108 3048 Explorer.EXE colorcpl.exe PID 3048 wrote to memory of 3108 3048 Explorer.EXE colorcpl.exe PID 3108 wrote to memory of 2288 3108 colorcpl.exe cmd.exe PID 3108 wrote to memory of 2288 3108 colorcpl.exe cmd.exe PID 3108 wrote to memory of 2288 3108 colorcpl.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\50% payment.exe"C:\Users\Admin\AppData\Local\Temp\50% payment.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\50% payment.exe"C:\Users\Admin\AppData\Local\Temp\50% payment.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\50% payment.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2288-137-0x0000000000000000-mapping.dmp
-
memory/3048-130-0x0000000006860000-0x00000000069CD000-memory.dmpFilesize
1.4MB
-
memory/3048-139-0x00000000011E0000-0x00000000012A7000-memory.dmpFilesize
796KB
-
memory/3048-132-0x00000000070D0000-0x0000000007221000-memory.dmpFilesize
1.3MB
-
memory/3108-138-0x0000000004AA0000-0x0000000004B30000-memory.dmpFilesize
576KB
-
memory/3108-135-0x00000000028A0000-0x00000000028C9000-memory.dmpFilesize
164KB
-
memory/3108-136-0x0000000004780000-0x0000000004AA0000-memory.dmpFilesize
3.1MB
-
memory/3108-134-0x0000000000880000-0x0000000000899000-memory.dmpFilesize
100KB
-
memory/3108-133-0x0000000000000000-mapping.dmp
-
memory/3956-128-0x0000000000F20000-0x0000000001240000-memory.dmpFilesize
3.1MB
-
memory/3956-131-0x00000000012C0000-0x00000000012D1000-memory.dmpFilesize
68KB
-
memory/3956-126-0x000000000041D090-mapping.dmp
-
memory/3956-125-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3956-129-0x0000000001280000-0x0000000001291000-memory.dmpFilesize
68KB
-
memory/4064-123-0x0000000001130000-0x00000000011A2000-memory.dmpFilesize
456KB
-
memory/4064-124-0x0000000008350000-0x000000000837E000-memory.dmpFilesize
184KB
-
memory/4064-114-0x0000000000750000-0x0000000000751000-memory.dmpFilesize
4KB
-
memory/4064-122-0x0000000005320000-0x0000000005329000-memory.dmpFilesize
36KB
-
memory/4064-121-0x0000000005020000-0x0000000005021000-memory.dmpFilesize
4KB
-
memory/4064-120-0x0000000005340000-0x0000000005341000-memory.dmpFilesize
4KB
-
memory/4064-119-0x0000000005090000-0x0000000005091000-memory.dmpFilesize
4KB
-
memory/4064-118-0x0000000005180000-0x0000000005181000-memory.dmpFilesize
4KB
-
memory/4064-117-0x0000000005680000-0x0000000005681000-memory.dmpFilesize
4KB
-
memory/4064-116-0x00000000050E0000-0x00000000050E1000-memory.dmpFilesize
4KB