Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
21-04-2021 18:05
Static task
static1
Behavioral task
behavioral1
Sample
50% payment.exe
Resource
win7v20210410
General
-
Target
50% payment.exe
-
Size
1.1MB
-
MD5
91d6babf1d4ec9c3ff032c9f44291161
-
SHA1
a9009a6c66d5b1f945d7e4ef88ed01dbf86f8d5d
-
SHA256
5aa4e2536c1e6a2b7ff9509081c03906f982a95df7e44bcf162429ac8f969f14
-
SHA512
6eda488e5c15e63db870163f652809ee1fce1169054cd296988e4d7bc6096091009bc7383efdb541fdfed2526ef18470896fe13971e84d7966a9ec30a1f72ae4
Malware Config
Extracted
xloader
2.3
http://www.precigentriplegene.net/ey9c/
veitev.com
alpinerevenuemanagement.com
filthycarwash.com
semanticzone.net
biteasia.com
cranedlbh.com
dassinlegal.com
celebrityworldhindi.com
theberrydesign.com
neapmusic.com
bombayan.com
lux-n-lush.com
yourcoachingconversations.com
asafera.com
aleraretirementpartners.com
fewsolo.xyz
mgformations.com
jenningscaswell.com
fsgateway.net
egeektechlive.com
headlessbookingengine.com
jeljobsgh.com
talkracetogether.com
weedairstream.com
ameeera.com
jivermind.com
atxrealestateforsale.com
nadersadek.info
paintwithjames.com
hackettshousekeeping.com
nicksayler.net
nonnassnackbox.com
sweetcupcr.com
wallis-network.com
gironbeautysalon.online
emotionalopedia.com
emodly.com
hoosiermania.com
tojoglamping.com
tdhthailand.com
xn--vh3bo2id9pa.com
jn-mcdicai.com
toptanmaskesatinal.net
qwikley.com
checkbot.info
faisalmian.com
jeparlelafrance.net
jbwebradio.com
fraudcox.com
panda-destek2020.com
bootyyash.com
zgsyct.com
michelleandernesto.com
digitalallianceap.net
luxuryresortranch.com
cru5.com
digitalmedicalgroup.com
radicaleco.email
kadykaboutiques.com
hiphopjefe.com
zechenturm.com
cashflowplatformplan.com
kuppers.info
andreavermiglio.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/2228-125-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2228-126-0x000000000041D090-mapping.dmp xloader behavioral2/memory/2804-133-0x00000000004D0000-0x00000000004F9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
50% payment.exe50% payment.exerundll32.exedescription pid process target process PID 1108 set thread context of 2228 1108 50% payment.exe 50% payment.exe PID 2228 set thread context of 2644 2228 50% payment.exe Explorer.EXE PID 2804 set thread context of 2644 2804 rundll32.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
50% payment.exe50% payment.exerundll32.exepid process 1108 50% payment.exe 1108 50% payment.exe 1108 50% payment.exe 1108 50% payment.exe 1108 50% payment.exe 2228 50% payment.exe 2228 50% payment.exe 2228 50% payment.exe 2228 50% payment.exe 2804 rundll32.exe 2804 rundll32.exe 2804 rundll32.exe 2804 rundll32.exe 2804 rundll32.exe 2804 rundll32.exe 2804 rundll32.exe 2804 rundll32.exe 2804 rundll32.exe 2804 rundll32.exe 2804 rundll32.exe 2804 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
50% payment.exerundll32.exepid process 2228 50% payment.exe 2228 50% payment.exe 2228 50% payment.exe 2804 rundll32.exe 2804 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
50% payment.exe50% payment.exerundll32.exedescription pid process Token: SeDebugPrivilege 1108 50% payment.exe Token: SeDebugPrivilege 2228 50% payment.exe Token: SeDebugPrivilege 2804 rundll32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
50% payment.exeExplorer.EXErundll32.exedescription pid process target process PID 1108 wrote to memory of 2060 1108 50% payment.exe 50% payment.exe PID 1108 wrote to memory of 2060 1108 50% payment.exe 50% payment.exe PID 1108 wrote to memory of 2060 1108 50% payment.exe 50% payment.exe PID 1108 wrote to memory of 2228 1108 50% payment.exe 50% payment.exe PID 1108 wrote to memory of 2228 1108 50% payment.exe 50% payment.exe PID 1108 wrote to memory of 2228 1108 50% payment.exe 50% payment.exe PID 1108 wrote to memory of 2228 1108 50% payment.exe 50% payment.exe PID 1108 wrote to memory of 2228 1108 50% payment.exe 50% payment.exe PID 1108 wrote to memory of 2228 1108 50% payment.exe 50% payment.exe PID 2644 wrote to memory of 2804 2644 Explorer.EXE rundll32.exe PID 2644 wrote to memory of 2804 2644 Explorer.EXE rundll32.exe PID 2644 wrote to memory of 2804 2644 Explorer.EXE rundll32.exe PID 2804 wrote to memory of 2276 2804 rundll32.exe cmd.exe PID 2804 wrote to memory of 2276 2804 rundll32.exe cmd.exe PID 2804 wrote to memory of 2276 2804 rundll32.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\50% payment.exe"C:\Users\Admin\AppData\Local\Temp\50% payment.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\50% payment.exe"C:\Users\Admin\AppData\Local\Temp\50% payment.exe"3⤵
-
C:\Users\Admin\AppData\Local\Temp\50% payment.exe"C:\Users\Admin\AppData\Local\Temp\50% payment.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\50% payment.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1108-114-0x0000000000770000-0x0000000000771000-memory.dmpFilesize
4KB
-
memory/1108-116-0x00000000050B0000-0x00000000050B1000-memory.dmpFilesize
4KB
-
memory/1108-117-0x0000000005650000-0x0000000005651000-memory.dmpFilesize
4KB
-
memory/1108-118-0x00000000051F0000-0x00000000051F1000-memory.dmpFilesize
4KB
-
memory/1108-119-0x0000000005090000-0x0000000005091000-memory.dmpFilesize
4KB
-
memory/1108-120-0x00000000053B0000-0x00000000053B1000-memory.dmpFilesize
4KB
-
memory/1108-121-0x0000000005150000-0x000000000564E000-memory.dmpFilesize
5.0MB
-
memory/1108-122-0x0000000005390000-0x0000000005399000-memory.dmpFilesize
36KB
-
memory/1108-123-0x00000000010D0000-0x0000000001142000-memory.dmpFilesize
456KB
-
memory/1108-124-0x0000000008380000-0x00000000083AE000-memory.dmpFilesize
184KB
-
memory/2228-125-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2228-126-0x000000000041D090-mapping.dmp
-
memory/2228-128-0x0000000001070000-0x0000000001390000-memory.dmpFilesize
3.1MB
-
memory/2228-129-0x0000000000BF0000-0x0000000000C01000-memory.dmpFilesize
68KB
-
memory/2276-135-0x0000000000000000-mapping.dmp
-
memory/2644-130-0x0000000002C20000-0x0000000002D14000-memory.dmpFilesize
976KB
-
memory/2644-137-0x0000000000C50000-0x0000000000CEC000-memory.dmpFilesize
624KB
-
memory/2804-131-0x0000000000000000-mapping.dmp
-
memory/2804-132-0x0000000001060000-0x0000000001073000-memory.dmpFilesize
76KB
-
memory/2804-134-0x0000000004480000-0x00000000047A0000-memory.dmpFilesize
3.1MB
-
memory/2804-133-0x00000000004D0000-0x00000000004F9000-memory.dmpFilesize
164KB
-
memory/2804-136-0x0000000000ED0000-0x0000000000F60000-memory.dmpFilesize
576KB