Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
07-05-2021 18:04
Static task
static1
Behavioral task
behavioral1
Sample
winlog.exe
Resource
win7v20210408
General
-
Target
winlog.exe
-
Size
696KB
-
MD5
5d2f26ac6b48725279d98aa87eff8506
-
SHA1
7ab3874eb9d316a503133367b12d3628e6dbe264
-
SHA256
06bed76c389db454d5b86a64bf7127a21c013b48d79b3b83511263c424f5cf65
-
SHA512
e81c607ee870bde0e5a84714f1634e19f6959d1f46a4d5ffea2baeba241712ca4f2e2bdf4f6c8794db7b35216ded5d52743b7faac75d3382dd58f88e24294e41
Malware Config
Extracted
xloader
2.3
http://www.zlzntiayc.icu/a6ru/
noseainsight.com
chateaudedigoine.com
tezhonda.com
lowergwyeneddmassage.com
convenienttext.com
quickbookaccountingpros.com
mashburneventcenter.com
marthabymsfashion.com
thearcadela.com
invisiblefingerprint.com
nikadoo.com
artsmartclinton.com
elitetouringinnovations.com
atualizarapp2020.com
nideke1.com
fyj-sh.com
rufflesales.com
algemixdelchef.com
appleoneplus.com
ryosuketanikawa.com
domainsforpharma.com
sxhsti.com
squeakyslimes.com
theccmsacademy.com
ketquavip1.net
hstchwritr.com
cabinettec.com
iiscoder.com
ozdjservices.com
needscheck.com
hammocksrecovery.com
thedaiquiriexplosion.com
tantricgirlclothing.com
stealthpup.com
homehunters-eg.com
buffaloce.com
resilientquality.com
020view.com
cheapyetihats.com
allamericanqueens.com
massagerest.com
photogenic.homes
globalcheapflights.net
kuppers.info
redfiendpub.com
nrbadvogados.com
nighthawkmediagroup.com
gilsilva022pro.com
healthpossibilities.com
japlasmartshop.com
6927199.com
pizzanpickle.com
schnitzel.party
spkariyer.com
amsterdambrownies.com
laboratorioinfodigital.com
retailmedicaldepot.com
registeraccountants.amsterdam
khadeidralegendre.com
indialearninghub.com
xinjidf.com
thehawkproz.com
shpmtents14.com
kelaskaya.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/1608-66-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1608-67-0x000000000041D0C0-mapping.dmp xloader behavioral1/memory/1668-76-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1052 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
winlog.exewinlog.exeraserver.exedescription pid process target process PID 1948 set thread context of 1608 1948 winlog.exe winlog.exe PID 1608 set thread context of 1208 1608 winlog.exe Explorer.EXE PID 1668 set thread context of 1208 1668 raserver.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 9 IoCs
Processes:
winlog.exeraserver.exepid process 1608 winlog.exe 1608 winlog.exe 1668 raserver.exe 1668 raserver.exe 1668 raserver.exe 1668 raserver.exe 1668 raserver.exe 1668 raserver.exe 1668 raserver.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
winlog.exeraserver.exepid process 1608 winlog.exe 1608 winlog.exe 1608 winlog.exe 1668 raserver.exe 1668 raserver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
winlog.exeraserver.exedescription pid process Token: SeDebugPrivilege 1608 winlog.exe Token: SeDebugPrivilege 1668 raserver.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
winlog.exeExplorer.EXEraserver.exedescription pid process target process PID 1948 wrote to memory of 1608 1948 winlog.exe winlog.exe PID 1948 wrote to memory of 1608 1948 winlog.exe winlog.exe PID 1948 wrote to memory of 1608 1948 winlog.exe winlog.exe PID 1948 wrote to memory of 1608 1948 winlog.exe winlog.exe PID 1948 wrote to memory of 1608 1948 winlog.exe winlog.exe PID 1948 wrote to memory of 1608 1948 winlog.exe winlog.exe PID 1948 wrote to memory of 1608 1948 winlog.exe winlog.exe PID 1208 wrote to memory of 1668 1208 Explorer.EXE raserver.exe PID 1208 wrote to memory of 1668 1208 Explorer.EXE raserver.exe PID 1208 wrote to memory of 1668 1208 Explorer.EXE raserver.exe PID 1208 wrote to memory of 1668 1208 Explorer.EXE raserver.exe PID 1668 wrote to memory of 1052 1668 raserver.exe cmd.exe PID 1668 wrote to memory of 1052 1668 raserver.exe cmd.exe PID 1668 wrote to memory of 1052 1668 raserver.exe cmd.exe PID 1668 wrote to memory of 1052 1668 raserver.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\winlog.exe"C:\Users\Admin\AppData\Local\Temp\winlog.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\winlog.exe"C:\Users\Admin\AppData\Local\Temp\winlog.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1608
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\winlog.exe"3⤵
- Deletes itself
PID:1052
-
-