Analysis
-
max time kernel
109s -
max time network
110s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
04-05-2021 14:48
Static task
static1
Behavioral task
behavioral1
Sample
fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe
Resource
win7v20210410
General
-
Target
fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe
-
Size
728KB
-
MD5
64af41000584694858d0fcc37b1bf69b
-
SHA1
707c77c61fafdd736c1e02bfdbc8ce7ce24cc759
-
SHA256
fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa
-
SHA512
dff4927081ff280eb4e707660c596adfbf8ada0f02cdbf8dd2414cb368b8036708558e854b892eda7dc0049c11df6ff1044cb0ec7c9ae9a32851ba3790fd7177
Malware Config
Extracted
xloader
2.3
http://www.pedroiniesta.net/n7ad/
orchardevent.com
inthebeginningshop.com
keodm.com
hangthejury.com
cannabisllp.com
letsratethis.com
milanfashionperu.com
adcvip.com
professionalcprclasses.com
checkmytradesmanswork.com
sloanksmith.com
apnajamshedpur.com
665448.com
zryld.com
cabot.city
graet.design
furbabiesandflowers.com
silkisensations.com
sawubonastore.com
screenwinz18.com
freecleanlimpieza.com
kthayerart.com
domennyarendi12.net
buffalobooze.com
1066704.com
godstrader.com
wheyfordays.com
liquidacion-express.com
cinmax.xyz
evamikko.com
bestsellerselect.com
fr-doms1.xyz
publicoon.com
sciencecopy.com
buenosbison.icu
senecadeer.com
madisonroselove.com
momanent.com
colabchat.com
oodledesigns.com
dowershop.com
shop-daily.info
ivoyletdigital.com
cqyuebing.net
market-failure10.com
lcpcap.com
textmining.pro
rodrigueslawgroup.com
justwearshape.com
famharmonie.com
sublimationsuperstore.com
xoyicgv.icu
ejaysaffordablewebdesigns62.xyz
sendanangelofhope.com
ezglassandgifts.com
stpl.world
weddingmaskswv.com
iprognos.com
louanatummers.com
businessboxitalia.network
hk-duravit.com
bbss2020.com
tomojapanesetogo.com
organicmatico.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3044-125-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3044-126-0x000000000041D090-mapping.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exedescription pid process target process PID 784 set thread context of 3044 784 fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exepid process 3044 fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe 3044 fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exedescription pid process target process PID 784 wrote to memory of 3044 784 fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe PID 784 wrote to memory of 3044 784 fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe PID 784 wrote to memory of 3044 784 fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe PID 784 wrote to memory of 3044 784 fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe PID 784 wrote to memory of 3044 784 fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe PID 784 wrote to memory of 3044 784 fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe"C:\Users\Admin\AppData\Local\Temp\fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe"C:\Users\Admin\AppData\Local\Temp\fea7b692b71803eb020f04ec1a5f8118f5845910d9677fdb4636d9a7d209d0fa.bin.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/784-114-0x0000000000460000-0x0000000000461000-memory.dmpFilesize
4KB
-
memory/784-116-0x0000000004F20000-0x0000000004F21000-memory.dmpFilesize
4KB
-
memory/784-117-0x00000000054C0000-0x00000000054C1000-memory.dmpFilesize
4KB
-
memory/784-118-0x0000000004FC0000-0x0000000004FC1000-memory.dmpFilesize
4KB
-
memory/784-119-0x0000000004FC0000-0x00000000054BE000-memory.dmpFilesize
5.0MB
-
memory/784-120-0x0000000002A20000-0x0000000002A21000-memory.dmpFilesize
4KB
-
memory/784-121-0x0000000005060000-0x0000000005061000-memory.dmpFilesize
4KB
-
memory/784-122-0x00000000050D0000-0x00000000050DE000-memory.dmpFilesize
56KB
-
memory/784-123-0x0000000000E60000-0x0000000000F07000-memory.dmpFilesize
668KB
-
memory/784-124-0x0000000000F10000-0x0000000000F71000-memory.dmpFilesize
388KB
-
memory/3044-125-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3044-126-0x000000000041D090-mapping.dmp
-
memory/3044-128-0x0000000001AD0000-0x0000000001DF0000-memory.dmpFilesize
3.1MB