Analysis
-
max time kernel
135s -
max time network
131s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
30-04-2021 19:02
Static task
static1
Behavioral task
behavioral1
Sample
0e947ac360cb2f49dd978d7b4c4f9d6d.exe
Resource
win7v20210408
General
-
Target
0e947ac360cb2f49dd978d7b4c4f9d6d.exe
-
Size
5.3MB
-
MD5
0e947ac360cb2f49dd978d7b4c4f9d6d
-
SHA1
f3aed046e7375894884411c3a99c9e9c554fa790
-
SHA256
572e6066888624b7fa82b7bc17bbe0dc05440b4031cc71fc38f4d67a0571799e
-
SHA512
3954aa22e97b039870ece0053a2ac3e1d8151068f32442116f4bad1f968c22983beaf3f5365623b6e3cbf299dc792c11897997c957c24c1c258c2993eeaf3552
Malware Config
Extracted
xloader
2.3
http://www.kabtex.com/akcs/
choshmardokaan.com
joint-care02.xyz
marysclues.net
filereq.com
megazila.online
prendre-soin-de-moi.com
xn--bvs066l.com
depressionreduction.com
buysellglobally.com
assetascension.com
sharmleads.com
jaambet.com
schulverwaltung.digital
incisionnetwork.com
protectalaskasballot.com
hellfrost-wow.com
soakedsaints.com
somebodystory.com
purecraft-hemp.com
wseysfgvc.icu
poxiaolipin.com
qcheap3dshop.com
oxifencelabs.com
communityhealingproject.com
verolee.com
ecologia-circular.net
blimpcitybrewing.com
tmd-consulting.com
yourfuturevisionspb.com
your-russian-bride.com
fanamfmradio.com
canespanking.com
algerie24news.com
3rdeyeinvestigations.com
sdgxyy.net
gabimslogistics.com
projet-allegria-musique.com
369sg.xyz
vittalittashop.com
esportzmanager.com
healthbigbang.com
childcarecms.com
1of1holdings.com
souvian.com
contorig2.com
antoniettaargese.com
ecolutionshop.com
acustom.net
pureandtotalrelaxation.com
serverbrake.com
getgochugang.com
toyou1st.com
thankuvets.info
654327.com
shapirocousins.com
everligrey.com
gopowergo.com
spalabo.net
themedicareenroll.com
gaminotransport.com
mamerholding.com
memorialist-outset.info
vylol.com
streetleadz.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1312-126-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/1312-127-0x000000000041D030-mapping.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
0e947ac360cb2f49dd978d7b4c4f9d6d.exedescription pid process target process PID 708 set thread context of 1312 708 0e947ac360cb2f49dd978d7b4c4f9d6d.exe 0e947ac360cb2f49dd978d7b4c4f9d6d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
0e947ac360cb2f49dd978d7b4c4f9d6d.exepid process 1312 0e947ac360cb2f49dd978d7b4c4f9d6d.exe 1312 0e947ac360cb2f49dd978d7b4c4f9d6d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
0e947ac360cb2f49dd978d7b4c4f9d6d.exedescription pid process target process PID 708 wrote to memory of 1312 708 0e947ac360cb2f49dd978d7b4c4f9d6d.exe 0e947ac360cb2f49dd978d7b4c4f9d6d.exe PID 708 wrote to memory of 1312 708 0e947ac360cb2f49dd978d7b4c4f9d6d.exe 0e947ac360cb2f49dd978d7b4c4f9d6d.exe PID 708 wrote to memory of 1312 708 0e947ac360cb2f49dd978d7b4c4f9d6d.exe 0e947ac360cb2f49dd978d7b4c4f9d6d.exe PID 708 wrote to memory of 1312 708 0e947ac360cb2f49dd978d7b4c4f9d6d.exe 0e947ac360cb2f49dd978d7b4c4f9d6d.exe PID 708 wrote to memory of 1312 708 0e947ac360cb2f49dd978d7b4c4f9d6d.exe 0e947ac360cb2f49dd978d7b4c4f9d6d.exe PID 708 wrote to memory of 1312 708 0e947ac360cb2f49dd978d7b4c4f9d6d.exe 0e947ac360cb2f49dd978d7b4c4f9d6d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e947ac360cb2f49dd978d7b4c4f9d6d.exe"C:\Users\Admin\AppData\Local\Temp\0e947ac360cb2f49dd978d7b4c4f9d6d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Users\Admin\AppData\Local\Temp\0e947ac360cb2f49dd978d7b4c4f9d6d.exe"C:\Users\Admin\AppData\Local\Temp\0e947ac360cb2f49dd978d7b4c4f9d6d.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1312