Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
03-05-2021 12:01
Static task
static1
Behavioral task
behavioral1
Sample
74ed218c_by_Libranalysis.exe
Resource
win7v20210408
General
-
Target
74ed218c_by_Libranalysis.exe
-
Size
775KB
-
MD5
74ed218c2c421e3978445a1edbe40a08
-
SHA1
16d950eae07654c9805d4476928c4c8d7d12fcc1
-
SHA256
b32ad3bf2b79e411ca0450c1d5430d12c9bb73c269e0838ee512bc816fcce3b7
-
SHA512
0cb4af6ad1434d4140d0e055fc77de2543c9ea9babe077de27184b1628cbdc8f32530c5f0c2f4b3e1199459c0521e67415421525070c0870e75dc09105bf94d6
Malware Config
Extracted
xloader
2.3
http://www.cats16.com/8u3b/
pipienta.com
wisdomfest.net
jenniferreich.com
bigcanoehomesforless.com
kayandbernard.com
offerbuildingsecrets.com
benleefoto.com
contactlesssoftware.tech
statenislandplumbing.info
lifestylemedicineservices.com
blazerplanning.com
fnatic-skins.club
effectivemarketinginc.com
babyshopit.com
2000deal.com
k12paymentcemter.com
spwakd.com
lesreponses.com
abundando.com
hawkspremierfhc.com
midwestmadeclothing.com
kamuakuinisiapa.com
swirlingheadjewelry.com
donelys.com
stiloksero.com
hoangphucsolar.com
gb-contracting.com
girlboyfriends.com
decadejam.com
glassfullcoffee.com
todoparaconstruccion.com
anygivenrunday.com
newgalaxyindia.com
dahlonegaforless.com
blue-light.tech
web-evo.com
armmotive.com
mollysmulligan.com
penislandbrewer.com
wgrimao.com
dxm-int.net
sarmaayagroup.com
timbraunmusician.com
amazoncovid19tracer.com
peaknband.com
pyqxlz.com
palomachurch.com
surfboardwarehouse.net
burundiacademyst.com
pltcoin.com
workinglifestyle.com
vickybowskill.com
ottawahomevalues.info
jtrainterrain.com
francescoiocca.com
metallitypiercing.com
lashsavings.com
discjockeydelraybeach.com
indicraftsvilla.com
tbq.xyz
arfjkacsgatfzbazpdth.com
appsend.online
cunerier.com
orospucocuguatmaca.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1044-66-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1044-67-0x000000000041D0A0-mapping.dmp xloader behavioral1/memory/1512-75-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1152 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
74ed218c_by_Libranalysis.exe74ed218c_by_Libranalysis.execontrol.exedescription pid process target process PID 1840 set thread context of 1044 1840 74ed218c_by_Libranalysis.exe 74ed218c_by_Libranalysis.exe PID 1044 set thread context of 1200 1044 74ed218c_by_Libranalysis.exe Explorer.EXE PID 1512 set thread context of 1200 1512 control.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
74ed218c_by_Libranalysis.exe74ed218c_by_Libranalysis.execontrol.exepid process 1840 74ed218c_by_Libranalysis.exe 1840 74ed218c_by_Libranalysis.exe 1840 74ed218c_by_Libranalysis.exe 1044 74ed218c_by_Libranalysis.exe 1044 74ed218c_by_Libranalysis.exe 1512 control.exe 1512 control.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
74ed218c_by_Libranalysis.execontrol.exepid process 1044 74ed218c_by_Libranalysis.exe 1044 74ed218c_by_Libranalysis.exe 1044 74ed218c_by_Libranalysis.exe 1512 control.exe 1512 control.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
74ed218c_by_Libranalysis.exe74ed218c_by_Libranalysis.execontrol.exedescription pid process Token: SeDebugPrivilege 1840 74ed218c_by_Libranalysis.exe Token: SeDebugPrivilege 1044 74ed218c_by_Libranalysis.exe Token: SeDebugPrivilege 1512 control.exe -
Suspicious use of WriteProcessMemory 27 IoCs
Processes:
74ed218c_by_Libranalysis.exeExplorer.EXEcontrol.exedescription pid process target process PID 1840 wrote to memory of 1796 1840 74ed218c_by_Libranalysis.exe 74ed218c_by_Libranalysis.exe PID 1840 wrote to memory of 1796 1840 74ed218c_by_Libranalysis.exe 74ed218c_by_Libranalysis.exe PID 1840 wrote to memory of 1796 1840 74ed218c_by_Libranalysis.exe 74ed218c_by_Libranalysis.exe PID 1840 wrote to memory of 1796 1840 74ed218c_by_Libranalysis.exe 74ed218c_by_Libranalysis.exe PID 1840 wrote to memory of 752 1840 74ed218c_by_Libranalysis.exe 74ed218c_by_Libranalysis.exe PID 1840 wrote to memory of 752 1840 74ed218c_by_Libranalysis.exe 74ed218c_by_Libranalysis.exe PID 1840 wrote to memory of 752 1840 74ed218c_by_Libranalysis.exe 74ed218c_by_Libranalysis.exe PID 1840 wrote to memory of 752 1840 74ed218c_by_Libranalysis.exe 74ed218c_by_Libranalysis.exe PID 1840 wrote to memory of 1696 1840 74ed218c_by_Libranalysis.exe 74ed218c_by_Libranalysis.exe PID 1840 wrote to memory of 1696 1840 74ed218c_by_Libranalysis.exe 74ed218c_by_Libranalysis.exe PID 1840 wrote to memory of 1696 1840 74ed218c_by_Libranalysis.exe 74ed218c_by_Libranalysis.exe PID 1840 wrote to memory of 1696 1840 74ed218c_by_Libranalysis.exe 74ed218c_by_Libranalysis.exe PID 1840 wrote to memory of 1044 1840 74ed218c_by_Libranalysis.exe 74ed218c_by_Libranalysis.exe PID 1840 wrote to memory of 1044 1840 74ed218c_by_Libranalysis.exe 74ed218c_by_Libranalysis.exe PID 1840 wrote to memory of 1044 1840 74ed218c_by_Libranalysis.exe 74ed218c_by_Libranalysis.exe PID 1840 wrote to memory of 1044 1840 74ed218c_by_Libranalysis.exe 74ed218c_by_Libranalysis.exe PID 1840 wrote to memory of 1044 1840 74ed218c_by_Libranalysis.exe 74ed218c_by_Libranalysis.exe PID 1840 wrote to memory of 1044 1840 74ed218c_by_Libranalysis.exe 74ed218c_by_Libranalysis.exe PID 1840 wrote to memory of 1044 1840 74ed218c_by_Libranalysis.exe 74ed218c_by_Libranalysis.exe PID 1200 wrote to memory of 1512 1200 Explorer.EXE control.exe PID 1200 wrote to memory of 1512 1200 Explorer.EXE control.exe PID 1200 wrote to memory of 1512 1200 Explorer.EXE control.exe PID 1200 wrote to memory of 1512 1200 Explorer.EXE control.exe PID 1512 wrote to memory of 1152 1512 control.exe cmd.exe PID 1512 wrote to memory of 1152 1512 control.exe cmd.exe PID 1512 wrote to memory of 1152 1512 control.exe cmd.exe PID 1512 wrote to memory of 1152 1512 control.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\74ed218c_by_Libranalysis.exe"C:\Users\Admin\AppData\Local\Temp\74ed218c_by_Libranalysis.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\74ed218c_by_Libranalysis.exe"C:\Users\Admin\AppData\Local\Temp\74ed218c_by_Libranalysis.exe"3⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\74ed218c_by_Libranalysis.exe"C:\Users\Admin\AppData\Local\Temp\74ed218c_by_Libranalysis.exe"3⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\74ed218c_by_Libranalysis.exe"C:\Users\Admin\AppData\Local\Temp\74ed218c_by_Libranalysis.exe"3⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\74ed218c_by_Libranalysis.exe"C:\Users\Admin\AppData\Local\Temp\74ed218c_by_Libranalysis.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1044 -
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\74ed218c_by_Libranalysis.exe"3⤵
- Deletes itself
PID:1152