Analysis
-
max time kernel
151s -
max time network
147s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
21-04-2021 17:31
Static task
static1
Behavioral task
behavioral1
Sample
svch.exe
Resource
win7v20210408
General
-
Target
svch.exe
-
Size
579KB
-
MD5
a750b5c841200037a4e03a27ba5a6382
-
SHA1
d795e2443adfd4c9c1c10fbce9df60551a11c464
-
SHA256
08a758993c43a321076d8bbc7d9352f1affee8ae44db80c1cf2ced2e6f2cfed2
-
SHA512
0f1dc2653fe7349620057fd523a17dad0d84f46e8f3f15685dcfd8114b347e2d8515197a9838fd5114fa3f45c09952998b086698f630c90605ec4677f25809df
Malware Config
Extracted
xloader
2.3
http://www.xiangnanxiang.com/nqs9/
vescuderoabogados.com
reednorth.com
zoeyline.com
kittenclub.online
srichinstest2blog.com
wide-house.com
highandmightycornwhiskey.com
investmentbankersroundtable.com
godnomics.com
lynperformancetraining.com
alitafinance.com
cristinaandmore.com
sexyseniors.directory
p1monline.com
followingsharks.com
lurkwood.com
shopnayzierose.com
didsss.com
christophergagnon.com
bestpreschoolinorlando.com
brownboxtape.com
marketing-unplugged.com
freesarasotahomevalue.com
global-netflix.com
thetopwinners.com
realtortool.info
forling-humanresources.com
orang-id1002.club
7evensigns.com
jetbacks.com
nexosguatemala.com
studioterauds.com
anglediffer.guru
rockthelist.com
uraiy.com
inmobiliariakdna.com
sovedio.com
ydchat.com
anth74.com
familyfirstiaportal.com
bendpakorlando.com
smartmep.ltd
chaturbatelink.com
evenlightwellness.store
tcs-performance.com
vitarusclinic.online
mypetresorts.com
rebeccalchristophiwrites.com
fishfortuneproduction.com
proimagines.icu
drinkjawdrop.com
hillside-haven.com
goodmanstunts.com
capitalgainsreinvestment.com
xn--sueocapitalino-snb.com
extensionesweb.com
demetriusshipp.com
lifeplanportal.com
bestcovid-19treatment.info
gmcworktrucksandvans.com
commagx4.info
engineersuniversity.com
mkspilton.xyz
flifejourney.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/324-67-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/324-68-0x000000000041D150-mapping.dmp xloader behavioral1/memory/1584-78-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 568 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
svch.exesvch.exehelp.exedescription pid process target process PID 784 set thread context of 324 784 svch.exe svch.exe PID 324 set thread context of 1268 324 svch.exe Explorer.EXE PID 324 set thread context of 1268 324 svch.exe Explorer.EXE PID 1584 set thread context of 1268 1584 help.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
svch.exesvch.exehelp.exepid process 784 svch.exe 784 svch.exe 324 svch.exe 324 svch.exe 324 svch.exe 1584 help.exe 1584 help.exe 1584 help.exe 1584 help.exe 1584 help.exe 1584 help.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
svch.exehelp.exepid process 324 svch.exe 324 svch.exe 324 svch.exe 324 svch.exe 1584 help.exe 1584 help.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
svch.exesvch.exehelp.exedescription pid process Token: SeDebugPrivilege 784 svch.exe Token: SeDebugPrivilege 324 svch.exe Token: SeDebugPrivilege 1584 help.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
svch.exeExplorer.EXEhelp.exedescription pid process target process PID 784 wrote to memory of 324 784 svch.exe svch.exe PID 784 wrote to memory of 324 784 svch.exe svch.exe PID 784 wrote to memory of 324 784 svch.exe svch.exe PID 784 wrote to memory of 324 784 svch.exe svch.exe PID 784 wrote to memory of 324 784 svch.exe svch.exe PID 784 wrote to memory of 324 784 svch.exe svch.exe PID 784 wrote to memory of 324 784 svch.exe svch.exe PID 1268 wrote to memory of 1584 1268 Explorer.EXE help.exe PID 1268 wrote to memory of 1584 1268 Explorer.EXE help.exe PID 1268 wrote to memory of 1584 1268 Explorer.EXE help.exe PID 1268 wrote to memory of 1584 1268 Explorer.EXE help.exe PID 1584 wrote to memory of 568 1584 help.exe cmd.exe PID 1584 wrote to memory of 568 1584 help.exe cmd.exe PID 1584 wrote to memory of 568 1584 help.exe cmd.exe PID 1584 wrote to memory of 568 1584 help.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\svch.exe"C:\Users\Admin\AppData\Local\Temp\svch.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\svch.exe"C:\Users\Admin\AppData\Local\Temp\svch.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\svch.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/324-67-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/324-68-0x000000000041D150-mapping.dmp
-
memory/324-71-0x0000000000130000-0x0000000000140000-memory.dmpFilesize
64KB
-
memory/324-70-0x0000000000910000-0x0000000000C13000-memory.dmpFilesize
3.0MB
-
memory/324-73-0x00000000001B0000-0x00000000001C0000-memory.dmpFilesize
64KB
-
memory/568-76-0x0000000000000000-mapping.dmp
-
memory/784-62-0x0000000004A90000-0x0000000004A91000-memory.dmpFilesize
4KB
-
memory/784-63-0x0000000000510000-0x0000000000519000-memory.dmpFilesize
36KB
-
memory/784-64-0x000000007EF40000-0x000000007EF41000-memory.dmpFilesize
4KB
-
memory/784-65-0x0000000002390000-0x0000000002400000-memory.dmpFilesize
448KB
-
memory/784-66-0x0000000000C40000-0x0000000000C6E000-memory.dmpFilesize
184KB
-
memory/784-60-0x0000000000E10000-0x0000000000E11000-memory.dmpFilesize
4KB
-
memory/1268-72-0x0000000006C20000-0x0000000006D5C000-memory.dmpFilesize
1.2MB
-
memory/1268-74-0x00000000074F0000-0x0000000007651000-memory.dmpFilesize
1.4MB
-
memory/1268-81-0x0000000004A20000-0x0000000004AB4000-memory.dmpFilesize
592KB
-
memory/1584-75-0x0000000000000000-mapping.dmp
-
memory/1584-77-0x0000000000F90000-0x0000000000F96000-memory.dmpFilesize
24KB
-
memory/1584-78-0x0000000000080000-0x00000000000A9000-memory.dmpFilesize
164KB
-
memory/1584-79-0x00000000007F0000-0x0000000000AF3000-memory.dmpFilesize
3.0MB
-
memory/1584-80-0x0000000000660000-0x00000000006EF000-memory.dmpFilesize
572KB