Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
30-04-2021 13:09
Static task
static1
Behavioral task
behavioral1
Sample
PO#10244.exe
Resource
win7v20210410
General
-
Target
PO#10244.exe
-
Size
717KB
-
MD5
c4192fc5d072aff733b9c9e3b5d165da
-
SHA1
2c4e6cae1c3ef562452cc4e6caebd6f5511bc11a
-
SHA256
a42564801d666f9a210723ee247df72d71d93274e7556920957d5a98b237ab2c
-
SHA512
c59d51540089ddd00309e328620f11386326c1687a8f2e2318e42f2fbda93d66a0153d5493971ce7eee8f624a61ef52295e729438f1d41289a393ada9f4b3613
Malware Config
Extracted
xloader
2.3
http://www.hysjs168.com/uv34/
lattakia-imbiss.com
helenafinaltouch.com
yogamays.com
habangli.com
embraceblm.com
freeurlsite.com
szxanpet.com
inspirationalsblog.com
calibratefirearms.net
chelseashalza.com
ihdeuruim.com
symbolofsafety.com
albanyhumanesociety.net
exclusiveoffer.bet
888yuntu.com
maraitime.com
caletaexperience.com
dreamlikeliving.com
wolvesmito.club
zbyunjin.com
senkrononline.com
thesugarbasket.com
organiccbgoil.com
amazoncor.xyz
dofus-tr.com
bhzconstrutora.com
onlinepaintandsips.com
sandybottomsflipflops.com
paobuyingxiong.com
wokeinteractive.com
furbabiesandflowers.com
hellojesse.com
ssssummit.com
vaiu-ks.com
akb48-loveantena.com
wagsorganics.com
import-union.com
sxrqsgs.icu
72loca.com
ssc018.com
jewelta.com
buildingdigitalmind.com
pantechinsulation.com
cobakoreksinjinx.com
mischurretes.com
contorig2.com
julesecurity.com
soccer-yokouchi.club
gofourd.com
holdimob.com
omorashi-mania.com
ytksw.com
gsf-fashon.com
bogolacke.com
odislewis.com
shenzhenmaojinchang.com
kimsfist.com
xsites-dev.xyz
buraktradingltd.com
muldentaxi.com
supergurlmarketing.com
areametalurgia.com
dejikatsu.com
pcbet999.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1196-126-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/1196-127-0x000000000041CFC0-mapping.dmp xloader behavioral2/memory/2084-134-0x0000000000C00000-0x0000000000C28000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
PO#10244.exeRegSvcs.exewscript.exedescription pid process target process PID 3924 set thread context of 1196 3924 PO#10244.exe RegSvcs.exe PID 1196 set thread context of 3052 1196 RegSvcs.exe Explorer.EXE PID 2084 set thread context of 3052 2084 wscript.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
PO#10244.exeRegSvcs.exewscript.exepid process 3924 PO#10244.exe 1196 RegSvcs.exe 1196 RegSvcs.exe 1196 RegSvcs.exe 1196 RegSvcs.exe 2084 wscript.exe 2084 wscript.exe 2084 wscript.exe 2084 wscript.exe 2084 wscript.exe 2084 wscript.exe 2084 wscript.exe 2084 wscript.exe 2084 wscript.exe 2084 wscript.exe 2084 wscript.exe 2084 wscript.exe 2084 wscript.exe 2084 wscript.exe 2084 wscript.exe 2084 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
RegSvcs.exewscript.exepid process 1196 RegSvcs.exe 1196 RegSvcs.exe 1196 RegSvcs.exe 2084 wscript.exe 2084 wscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
PO#10244.exeRegSvcs.exewscript.exedescription pid process Token: SeDebugPrivilege 3924 PO#10244.exe Token: SeDebugPrivilege 1196 RegSvcs.exe Token: SeDebugPrivilege 2084 wscript.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
PO#10244.exeExplorer.EXEwscript.exedescription pid process target process PID 3924 wrote to memory of 1196 3924 PO#10244.exe RegSvcs.exe PID 3924 wrote to memory of 1196 3924 PO#10244.exe RegSvcs.exe PID 3924 wrote to memory of 1196 3924 PO#10244.exe RegSvcs.exe PID 3924 wrote to memory of 1196 3924 PO#10244.exe RegSvcs.exe PID 3924 wrote to memory of 1196 3924 PO#10244.exe RegSvcs.exe PID 3924 wrote to memory of 1196 3924 PO#10244.exe RegSvcs.exe PID 3052 wrote to memory of 2084 3052 Explorer.EXE wscript.exe PID 3052 wrote to memory of 2084 3052 Explorer.EXE wscript.exe PID 3052 wrote to memory of 2084 3052 Explorer.EXE wscript.exe PID 2084 wrote to memory of 2340 2084 wscript.exe cmd.exe PID 2084 wrote to memory of 2340 2084 wscript.exe cmd.exe PID 2084 wrote to memory of 2340 2084 wscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\PO#10244.exe"C:\Users\Admin\AppData\Local\Temp\PO#10244.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1196 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:2340