Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
05-05-2021 15:00
Static task
static1
Behavioral task
behavioral1
Sample
so.exe
Resource
win7v20210410
General
-
Target
so.exe
-
Size
650KB
-
MD5
5551346aa9f251895021b95a2a7cc390
-
SHA1
acbcecf7599d3c33f6f2a36c0947cfc633d0a406
-
SHA256
9e189d8d48a66d2f53c972275642da7cbc8ad51b20f04cf1d592bef360db50cf
-
SHA512
35e43a0f2ef1dd2dfaf921d8af3a4f3ef0f4675479d496141358561c84a3b8c8b1a5bd9497fe6c26757d3e6637edab538ac587d73bc6d47e9b90b751abf55ba3
Malware Config
Extracted
xloader
2.3
http://www.cats16.com/8u3b/
pipienta.com
wisdomfest.net
jenniferreich.com
bigcanoehomesforless.com
kayandbernard.com
offerbuildingsecrets.com
benleefoto.com
contactlesssoftware.tech
statenislandplumbing.info
lifestylemedicineservices.com
blazerplanning.com
fnatic-skins.club
effectivemarketinginc.com
babyshopit.com
2000deal.com
k12paymentcemter.com
spwakd.com
lesreponses.com
abundando.com
hawkspremierfhc.com
midwestmadeclothing.com
kamuakuinisiapa.com
swirlingheadjewelry.com
donelys.com
stiloksero.com
hoangphucsolar.com
gb-contracting.com
girlboyfriends.com
decadejam.com
glassfullcoffee.com
todoparaconstruccion.com
anygivenrunday.com
newgalaxyindia.com
dahlonegaforless.com
blue-light.tech
web-evo.com
armmotive.com
mollysmulligan.com
penislandbrewer.com
wgrimao.com
dxm-int.net
sarmaayagroup.com
timbraunmusician.com
amazoncovid19tracer.com
peaknband.com
pyqxlz.com
palomachurch.com
surfboardwarehouse.net
burundiacademyst.com
pltcoin.com
workinglifestyle.com
vickybowskill.com
ottawahomevalues.info
jtrainterrain.com
francescoiocca.com
metallitypiercing.com
lashsavings.com
discjockeydelraybeach.com
indicraftsvilla.com
tbq.xyz
arfjkacsgatfzbazpdth.com
appsend.online
cunerier.com
orospucocuguatmaca.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/432-67-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/432-68-0x000000000041D0A0-mapping.dmp xloader behavioral1/memory/1332-76-0x00000000000D0000-0x00000000000F9000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 384 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
so.exeso.execmstp.exedescription pid process target process PID 1088 set thread context of 432 1088 so.exe so.exe PID 432 set thread context of 1248 432 so.exe Explorer.EXE PID 1332 set thread context of 1248 1332 cmstp.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
so.execmstp.exepid process 432 so.exe 432 so.exe 1332 cmstp.exe 1332 cmstp.exe 1332 cmstp.exe 1332 cmstp.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
so.execmstp.exepid process 432 so.exe 432 so.exe 432 so.exe 1332 cmstp.exe 1332 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
so.execmstp.exedescription pid process Token: SeDebugPrivilege 432 so.exe Token: SeDebugPrivilege 1332 cmstp.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
so.exepid process 1088 so.exe 1088 so.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
so.exeExplorer.EXEcmstp.exedescription pid process target process PID 1088 wrote to memory of 432 1088 so.exe so.exe PID 1088 wrote to memory of 432 1088 so.exe so.exe PID 1088 wrote to memory of 432 1088 so.exe so.exe PID 1088 wrote to memory of 432 1088 so.exe so.exe PID 1088 wrote to memory of 432 1088 so.exe so.exe PID 1088 wrote to memory of 432 1088 so.exe so.exe PID 1088 wrote to memory of 432 1088 so.exe so.exe PID 1248 wrote to memory of 1332 1248 Explorer.EXE cmstp.exe PID 1248 wrote to memory of 1332 1248 Explorer.EXE cmstp.exe PID 1248 wrote to memory of 1332 1248 Explorer.EXE cmstp.exe PID 1248 wrote to memory of 1332 1248 Explorer.EXE cmstp.exe PID 1248 wrote to memory of 1332 1248 Explorer.EXE cmstp.exe PID 1248 wrote to memory of 1332 1248 Explorer.EXE cmstp.exe PID 1248 wrote to memory of 1332 1248 Explorer.EXE cmstp.exe PID 1332 wrote to memory of 384 1332 cmstp.exe cmd.exe PID 1332 wrote to memory of 384 1332 cmstp.exe cmd.exe PID 1332 wrote to memory of 384 1332 cmstp.exe cmd.exe PID 1332 wrote to memory of 384 1332 cmstp.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\so.exe"C:\Users\Admin\AppData\Local\Temp\so.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\so.exe"C:\Users\Admin\AppData\Local\Temp\so.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:432
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\so.exe"3⤵
- Deletes itself
PID:384
-
-