Analysis
-
max time kernel
135s -
max time network
137s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
04-05-2021 14:48
Static task
static1
Behavioral task
behavioral1
Sample
fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe
Resource
win7v20210410
General
-
Target
fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe
-
Size
728KB
-
MD5
64af41000584694858d0fcc37b1bf69b
-
SHA1
707c77c61fafdd736c1e02bfdbc8ce7ce24cc759
-
SHA256
fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa
-
SHA512
dff4927081ff280eb4e707660c596adfbf8ada0f02cdbf8dd2414cb368b8036708558e854b892eda7dc0049c11df6ff1044cb0ec7c9ae9a32851ba3790fd7177
Malware Config
Extracted
xloader
2.3
http://www.pedroiniesta.net/n7ad/
orchardevent.com
inthebeginningshop.com
keodm.com
hangthejury.com
cannabisllp.com
letsratethis.com
milanfashionperu.com
adcvip.com
professionalcprclasses.com
checkmytradesmanswork.com
sloanksmith.com
apnajamshedpur.com
665448.com
zryld.com
cabot.city
graet.design
furbabiesandflowers.com
silkisensations.com
sawubonastore.com
screenwinz18.com
freecleanlimpieza.com
kthayerart.com
domennyarendi12.net
buffalobooze.com
1066704.com
godstrader.com
wheyfordays.com
liquidacion-express.com
cinmax.xyz
evamikko.com
bestsellerselect.com
fr-doms1.xyz
publicoon.com
sciencecopy.com
buenosbison.icu
senecadeer.com
madisonroselove.com
momanent.com
colabchat.com
oodledesigns.com
dowershop.com
shop-daily.info
ivoyletdigital.com
cqyuebing.net
market-failure10.com
lcpcap.com
textmining.pro
rodrigueslawgroup.com
justwearshape.com
famharmonie.com
sublimationsuperstore.com
xoyicgv.icu
ejaysaffordablewebdesigns62.xyz
sendanangelofhope.com
ezglassandgifts.com
stpl.world
weddingmaskswv.com
iprognos.com
louanatummers.com
businessboxitalia.network
hk-duravit.com
bbss2020.com
tomojapanesetogo.com
organicmatico.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/564-66-0x000000000041D090-mapping.dmp xloader behavioral1/memory/564-65-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exedescription pid process target process PID 788 set thread context of 564 788 fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exepid process 564 fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exedescription pid process target process PID 788 wrote to memory of 564 788 fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe PID 788 wrote to memory of 564 788 fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe PID 788 wrote to memory of 564 788 fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe PID 788 wrote to memory of 564 788 fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe PID 788 wrote to memory of 564 788 fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe PID 788 wrote to memory of 564 788 fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe PID 788 wrote to memory of 564 788 fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe"C:\Users\Admin\AppData\Local\Temp\fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe"C:\Users\Admin\AppData\Local\Temp\fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/564-66-0x000000000041D090-mapping.dmp
-
memory/564-65-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/564-68-0x0000000000B80000-0x0000000000E83000-memory.dmpFilesize
3.0MB
-
memory/788-59-0x0000000000AC0000-0x0000000000AC1000-memory.dmpFilesize
4KB
-
memory/788-61-0x0000000000450000-0x000000000045E000-memory.dmpFilesize
56KB
-
memory/788-62-0x0000000004D80000-0x0000000004D81000-memory.dmpFilesize
4KB
-
memory/788-63-0x0000000004FE0000-0x0000000005087000-memory.dmpFilesize
668KB
-
memory/788-64-0x0000000002110000-0x0000000002171000-memory.dmpFilesize
388KB