Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
21-04-2021 18:05
Static task
static1
Behavioral task
behavioral1
Sample
50% payment.exe
Resource
win7v20210410
General
-
Target
50% payment.exe
-
Size
1.1MB
-
MD5
91d6babf1d4ec9c3ff032c9f44291161
-
SHA1
a9009a6c66d5b1f945d7e4ef88ed01dbf86f8d5d
-
SHA256
5aa4e2536c1e6a2b7ff9509081c03906f982a95df7e44bcf162429ac8f969f14
-
SHA512
6eda488e5c15e63db870163f652809ee1fce1169054cd296988e4d7bc6096091009bc7383efdb541fdfed2526ef18470896fe13971e84d7966a9ec30a1f72ae4
Malware Config
Extracted
xloader
2.3
http://www.precigentriplegene.net/ey9c/
veitev.com
alpinerevenuemanagement.com
filthycarwash.com
semanticzone.net
biteasia.com
cranedlbh.com
dassinlegal.com
celebrityworldhindi.com
theberrydesign.com
neapmusic.com
bombayan.com
lux-n-lush.com
yourcoachingconversations.com
asafera.com
aleraretirementpartners.com
fewsolo.xyz
mgformations.com
jenningscaswell.com
fsgateway.net
egeektechlive.com
headlessbookingengine.com
jeljobsgh.com
talkracetogether.com
weedairstream.com
ameeera.com
jivermind.com
atxrealestateforsale.com
nadersadek.info
paintwithjames.com
hackettshousekeeping.com
nicksayler.net
nonnassnackbox.com
sweetcupcr.com
wallis-network.com
gironbeautysalon.online
emotionalopedia.com
emodly.com
hoosiermania.com
tojoglamping.com
tdhthailand.com
xn--vh3bo2id9pa.com
jn-mcdicai.com
toptanmaskesatinal.net
qwikley.com
checkbot.info
faisalmian.com
jeparlelafrance.net
jbwebradio.com
fraudcox.com
panda-destek2020.com
bootyyash.com
zgsyct.com
michelleandernesto.com
digitalallianceap.net
luxuryresortranch.com
cru5.com
digitalmedicalgroup.com
radicaleco.email
kadykaboutiques.com
hiphopjefe.com
zechenturm.com
cashflowplatformplan.com
kuppers.info
andreavermiglio.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1724-65-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1724-66-0x000000000041D090-mapping.dmp xloader behavioral1/memory/1156-75-0x00000000000D0000-0x00000000000F9000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1196 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
50% payment.exe50% payment.exemsiexec.exedescription pid process target process PID 336 set thread context of 1724 336 50% payment.exe 50% payment.exe PID 1724 set thread context of 1264 1724 50% payment.exe Explorer.EXE PID 1156 set thread context of 1264 1156 msiexec.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
50% payment.exe50% payment.exemsiexec.exepid process 336 50% payment.exe 336 50% payment.exe 336 50% payment.exe 1724 50% payment.exe 1724 50% payment.exe 1156 msiexec.exe 1156 msiexec.exe 1156 msiexec.exe 1156 msiexec.exe 1156 msiexec.exe 1156 msiexec.exe 1156 msiexec.exe 1156 msiexec.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
50% payment.exemsiexec.exepid process 1724 50% payment.exe 1724 50% payment.exe 1724 50% payment.exe 1156 msiexec.exe 1156 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
50% payment.exe50% payment.exemsiexec.exedescription pid process Token: SeDebugPrivilege 336 50% payment.exe Token: SeDebugPrivilege 1724 50% payment.exe Token: SeDebugPrivilege 1156 msiexec.exe -
Suspicious use of WriteProcessMemory 22 IoCs
Processes:
50% payment.exeExplorer.EXEmsiexec.exedescription pid process target process PID 336 wrote to memory of 1720 336 50% payment.exe 50% payment.exe PID 336 wrote to memory of 1720 336 50% payment.exe 50% payment.exe PID 336 wrote to memory of 1720 336 50% payment.exe 50% payment.exe PID 336 wrote to memory of 1720 336 50% payment.exe 50% payment.exe PID 336 wrote to memory of 1724 336 50% payment.exe 50% payment.exe PID 336 wrote to memory of 1724 336 50% payment.exe 50% payment.exe PID 336 wrote to memory of 1724 336 50% payment.exe 50% payment.exe PID 336 wrote to memory of 1724 336 50% payment.exe 50% payment.exe PID 336 wrote to memory of 1724 336 50% payment.exe 50% payment.exe PID 336 wrote to memory of 1724 336 50% payment.exe 50% payment.exe PID 336 wrote to memory of 1724 336 50% payment.exe 50% payment.exe PID 1264 wrote to memory of 1156 1264 Explorer.EXE msiexec.exe PID 1264 wrote to memory of 1156 1264 Explorer.EXE msiexec.exe PID 1264 wrote to memory of 1156 1264 Explorer.EXE msiexec.exe PID 1264 wrote to memory of 1156 1264 Explorer.EXE msiexec.exe PID 1264 wrote to memory of 1156 1264 Explorer.EXE msiexec.exe PID 1264 wrote to memory of 1156 1264 Explorer.EXE msiexec.exe PID 1264 wrote to memory of 1156 1264 Explorer.EXE msiexec.exe PID 1156 wrote to memory of 1196 1156 msiexec.exe cmd.exe PID 1156 wrote to memory of 1196 1156 msiexec.exe cmd.exe PID 1156 wrote to memory of 1196 1156 msiexec.exe cmd.exe PID 1156 wrote to memory of 1196 1156 msiexec.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\50% payment.exe"C:\Users\Admin\AppData\Local\Temp\50% payment.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\50% payment.exe"C:\Users\Admin\AppData\Local\Temp\50% payment.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\50% payment.exe"C:\Users\Admin\AppData\Local\Temp\50% payment.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\50% payment.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/336-61-0x0000000000370000-0x0000000000379000-memory.dmpFilesize
36KB
-
memory/336-62-0x0000000004E30000-0x0000000004E31000-memory.dmpFilesize
4KB
-
memory/336-63-0x0000000005170000-0x00000000051E2000-memory.dmpFilesize
456KB
-
memory/336-64-0x0000000000A00000-0x0000000000A2E000-memory.dmpFilesize
184KB
-
memory/336-59-0x0000000000A50000-0x0000000000A51000-memory.dmpFilesize
4KB
-
memory/1156-72-0x0000000075551000-0x0000000075553000-memory.dmpFilesize
8KB
-
memory/1156-77-0x0000000002010000-0x00000000020A0000-memory.dmpFilesize
576KB
-
memory/1156-76-0x00000000022B0000-0x00000000025B3000-memory.dmpFilesize
3.0MB
-
memory/1156-75-0x00000000000D0000-0x00000000000F9000-memory.dmpFilesize
164KB
-
memory/1156-74-0x0000000000B60000-0x0000000000B74000-memory.dmpFilesize
80KB
-
memory/1156-71-0x0000000000000000-mapping.dmp
-
memory/1196-73-0x0000000000000000-mapping.dmp
-
memory/1264-70-0x0000000004E30000-0x0000000004FC1000-memory.dmpFilesize
1.6MB
-
memory/1264-78-0x0000000003B80000-0x0000000003C3A000-memory.dmpFilesize
744KB
-
memory/1724-69-0x00000000001B0000-0x00000000001C1000-memory.dmpFilesize
68KB
-
memory/1724-68-0x0000000000B70000-0x0000000000E73000-memory.dmpFilesize
3.0MB
-
memory/1724-66-0x000000000041D090-mapping.dmp
-
memory/1724-65-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB