Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
03-05-2021 08:06
Static task
static1
Behavioral task
behavioral1
Sample
a3aa510e_by_Libranalysis.exe
Resource
win7v20210410
General
-
Target
a3aa510e_by_Libranalysis.exe
-
Size
531KB
-
MD5
a3aa510eb6f74e8dfc7a8c3bcd0fedf6
-
SHA1
286e81ec896f6746a1ca48e59dc6735c25249a37
-
SHA256
3f359e1a20563017c2f66a4e01136fbd73a9293ca1ce3df2dd880a94b9eee23e
-
SHA512
28c5048dda26762d5859488ef46cc222de632174e35d62e07b05ede307ec35309fd5636b53ba454e26386fb7033a8ae60f3cfe920b075cc1373589b14dfee2aa
Malware Config
Extracted
xloader
2.3
http://www.jqjdgw.com/ued5/
italiancosmeticbeauty.com
zhima7.com
phresheffect.com
comp-savvy.net
xjhtcaum.com
copperbrassgermkey.com
smero.financial
opticsoptimum.com
pisanosportpraxis.com
pediatricfeedrates.com
binsogleam.com
sarahseatter.com
wywatershed.com
smellyhomeshop.com
naviorchidlife.com
cunerier.com
thecornercomputers.com
brightwoodcollection.com
taxprep-repsolutions.net
phukien4u.net
crezcayemprenda.com
terrasroraima.com
vinkot.com
endthefatblogs.com
nwmicrobefreesolutions.com
chandlerguo.com
pacificedgesunglasses.com
hurrygift.com
felocacasa.com
zoom-sides.com
dovesprinklers.com
caravaggioclothing.com
renchengjixie.com
hfctzdsns.club
sukaa.tech
gurukulmitra.com
thedailyprocrastinator.com
xinxiu.store
woodlanddentalcarefl.com
pyperpay.com
fabularo.com
tvdajiang14.com
ihatesammamish.com
bbluebelttvwdbuy.com
replenish-skin.com
qf577.com
freemoneyfornursingschool.com
lpida.com
schmelzens.com
exuberantemodafeminina.com
babylandclothing.com
designer-dropship.com
sbeconlineacademy.com
homeandcabinwoodsigns.com
cqxiangcida.com
806queen.com
metropolisgrowlers.com
easycremationserviceusa.com
greenpis0n.com
vagasportal.com
hargsgroup.com
hyrerecruiting.com
carlsonwagonlit.sucks
beischabig.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1776-66-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1776-67-0x000000000041D070-mapping.dmp xloader behavioral1/memory/552-75-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 744 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
a3aa510e_by_Libranalysis.exea3aa510e_by_Libranalysis.exewininit.exedescription pid process target process PID 1116 set thread context of 1776 1116 a3aa510e_by_Libranalysis.exe a3aa510e_by_Libranalysis.exe PID 1776 set thread context of 1292 1776 a3aa510e_by_Libranalysis.exe Explorer.EXE PID 552 set thread context of 1292 552 wininit.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
a3aa510e_by_Libranalysis.exewininit.exepid process 1776 a3aa510e_by_Libranalysis.exe 1776 a3aa510e_by_Libranalysis.exe 552 wininit.exe 552 wininit.exe 552 wininit.exe 552 wininit.exe 552 wininit.exe 552 wininit.exe 552 wininit.exe 552 wininit.exe 552 wininit.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
a3aa510e_by_Libranalysis.exewininit.exepid process 1776 a3aa510e_by_Libranalysis.exe 1776 a3aa510e_by_Libranalysis.exe 1776 a3aa510e_by_Libranalysis.exe 552 wininit.exe 552 wininit.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
a3aa510e_by_Libranalysis.exewininit.exedescription pid process Token: SeDebugPrivilege 1776 a3aa510e_by_Libranalysis.exe Token: SeDebugPrivilege 552 wininit.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
a3aa510e_by_Libranalysis.exeExplorer.EXEwininit.exedescription pid process target process PID 1116 wrote to memory of 1776 1116 a3aa510e_by_Libranalysis.exe a3aa510e_by_Libranalysis.exe PID 1116 wrote to memory of 1776 1116 a3aa510e_by_Libranalysis.exe a3aa510e_by_Libranalysis.exe PID 1116 wrote to memory of 1776 1116 a3aa510e_by_Libranalysis.exe a3aa510e_by_Libranalysis.exe PID 1116 wrote to memory of 1776 1116 a3aa510e_by_Libranalysis.exe a3aa510e_by_Libranalysis.exe PID 1116 wrote to memory of 1776 1116 a3aa510e_by_Libranalysis.exe a3aa510e_by_Libranalysis.exe PID 1116 wrote to memory of 1776 1116 a3aa510e_by_Libranalysis.exe a3aa510e_by_Libranalysis.exe PID 1116 wrote to memory of 1776 1116 a3aa510e_by_Libranalysis.exe a3aa510e_by_Libranalysis.exe PID 1292 wrote to memory of 552 1292 Explorer.EXE wininit.exe PID 1292 wrote to memory of 552 1292 Explorer.EXE wininit.exe PID 1292 wrote to memory of 552 1292 Explorer.EXE wininit.exe PID 1292 wrote to memory of 552 1292 Explorer.EXE wininit.exe PID 552 wrote to memory of 744 552 wininit.exe cmd.exe PID 552 wrote to memory of 744 552 wininit.exe cmd.exe PID 552 wrote to memory of 744 552 wininit.exe cmd.exe PID 552 wrote to memory of 744 552 wininit.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\a3aa510e_by_Libranalysis.exe"C:\Users\Admin\AppData\Local\Temp\a3aa510e_by_Libranalysis.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\a3aa510e_by_Libranalysis.exe"C:\Users\Admin\AppData\Local\Temp\a3aa510e_by_Libranalysis.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1776 -
C:\Windows\SysWOW64\wininit.exe"C:\Windows\SysWOW64\wininit.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\a3aa510e_by_Libranalysis.exe"3⤵
- Deletes itself
PID:744