Analysis
-
max time kernel
133s -
max time network
136s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
03-05-2021 07:03
Static task
static1
Behavioral task
behavioral1
Sample
ada8b1320a6f303fbd5c09d3dab2235a.exe
Resource
win7v20210410
General
-
Target
ada8b1320a6f303fbd5c09d3dab2235a.exe
-
Size
734KB
-
MD5
ada8b1320a6f303fbd5c09d3dab2235a
-
SHA1
127abb366bfbc70bdb90d0339333b02261eb2140
-
SHA256
703a9d816bb422e4d2adeee4f7b6df250bf0441004c0939a03e927400420d9b9
-
SHA512
64e7c304b70911735ad1225d9ad080805f5667b63216308906bb8d8a8463c01dfd1dc43c0b62ebca0c3eab2831d8d17889f4205bfece85e4fc0dfaaca5f98f76
Malware Config
Extracted
xloader
2.3
http://www.ejsuniqueclasses.com/f0sg/
deondevemaagua.com
highcolorchem.com
remax-pros-sd.com
smartmotiontrans.com
staltower.com
raiseamerican.com
io-tonix.com
llawenydd.com
minkladieshaircollections.com
ataria.net
roofers-baltimore.com
infinityventura.com
dvdxbase.com
babebrowpen.com
rascontractingllc.com
designingdreamshome.com
groobefunnels.com
americanstatesapparel.com
theketodesserts.com
bend-a-knee.com
qqxs365.com
coveconnected.info
ss-cinc.com
lunahiaboutique.com
whdjhqvka.icu
dorcoleta.com
httpthehappylife.com
cpdgatine.icu
bloodbluemoons.com
caiwuwaimao.com
wellnowwhat.life
essential.care
totalawesomedetailing.com
magiccarpetcleaningedmondok.com
bayluxuryguide.com
gdjiehong.com
gablek.com
reminiscentscandles.com
philorise.com
bsmw.net
livetohelporg.com
adamu.trade
ibhoagies.com
aintthem.com
fullermma.com
diplomainternacional.com
bocahomehealthcare.com
atexpertcleaning.com
senmec23.com
empireofconsciousness.com
sahinkuyumcumalzemeleri.com
otr163.com
mariacolom.net
gameballd.com
stillwater.info
onegrain.net
ttotools.net
photosot.com
aretehi.com
veorepuestos.com
iteux.com
diskon80persen.xyz
ajrun.club
estuyaradiofm.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1632-125-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1632-126-0x000000000041D0A0-mapping.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
ada8b1320a6f303fbd5c09d3dab2235a.exedescription pid process target process PID 508 set thread context of 1632 508 ada8b1320a6f303fbd5c09d3dab2235a.exe ada8b1320a6f303fbd5c09d3dab2235a.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ada8b1320a6f303fbd5c09d3dab2235a.exepid process 1632 ada8b1320a6f303fbd5c09d3dab2235a.exe 1632 ada8b1320a6f303fbd5c09d3dab2235a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
ada8b1320a6f303fbd5c09d3dab2235a.exedescription pid process target process PID 508 wrote to memory of 1632 508 ada8b1320a6f303fbd5c09d3dab2235a.exe ada8b1320a6f303fbd5c09d3dab2235a.exe PID 508 wrote to memory of 1632 508 ada8b1320a6f303fbd5c09d3dab2235a.exe ada8b1320a6f303fbd5c09d3dab2235a.exe PID 508 wrote to memory of 1632 508 ada8b1320a6f303fbd5c09d3dab2235a.exe ada8b1320a6f303fbd5c09d3dab2235a.exe PID 508 wrote to memory of 1632 508 ada8b1320a6f303fbd5c09d3dab2235a.exe ada8b1320a6f303fbd5c09d3dab2235a.exe PID 508 wrote to memory of 1632 508 ada8b1320a6f303fbd5c09d3dab2235a.exe ada8b1320a6f303fbd5c09d3dab2235a.exe PID 508 wrote to memory of 1632 508 ada8b1320a6f303fbd5c09d3dab2235a.exe ada8b1320a6f303fbd5c09d3dab2235a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ada8b1320a6f303fbd5c09d3dab2235a.exe"C:\Users\Admin\AppData\Local\Temp\ada8b1320a6f303fbd5c09d3dab2235a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:508 -
C:\Users\Admin\AppData\Local\Temp\ada8b1320a6f303fbd5c09d3dab2235a.exe"C:\Users\Admin\AppData\Local\Temp\ada8b1320a6f303fbd5c09d3dab2235a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1632