Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
07-05-2021 18:04
Static task
static1
Behavioral task
behavioral1
Sample
winlog.exe
Resource
win7v20210408
General
-
Target
winlog.exe
-
Size
696KB
-
MD5
5d2f26ac6b48725279d98aa87eff8506
-
SHA1
7ab3874eb9d316a503133367b12d3628e6dbe264
-
SHA256
06bed76c389db454d5b86a64bf7127a21c013b48d79b3b83511263c424f5cf65
-
SHA512
e81c607ee870bde0e5a84714f1634e19f6959d1f46a4d5ffea2baeba241712ca4f2e2bdf4f6c8794db7b35216ded5d52743b7faac75d3382dd58f88e24294e41
Malware Config
Extracted
xloader
2.3
http://www.zlzntiayc.icu/a6ru/
noseainsight.com
chateaudedigoine.com
tezhonda.com
lowergwyeneddmassage.com
convenienttext.com
quickbookaccountingpros.com
mashburneventcenter.com
marthabymsfashion.com
thearcadela.com
invisiblefingerprint.com
nikadoo.com
artsmartclinton.com
elitetouringinnovations.com
atualizarapp2020.com
nideke1.com
fyj-sh.com
rufflesales.com
algemixdelchef.com
appleoneplus.com
ryosuketanikawa.com
domainsforpharma.com
sxhsti.com
squeakyslimes.com
theccmsacademy.com
ketquavip1.net
hstchwritr.com
cabinettec.com
iiscoder.com
ozdjservices.com
needscheck.com
hammocksrecovery.com
thedaiquiriexplosion.com
tantricgirlclothing.com
stealthpup.com
homehunters-eg.com
buffaloce.com
resilientquality.com
020view.com
cheapyetihats.com
allamericanqueens.com
massagerest.com
photogenic.homes
globalcheapflights.net
kuppers.info
redfiendpub.com
nrbadvogados.com
nighthawkmediagroup.com
gilsilva022pro.com
healthpossibilities.com
japlasmartshop.com
6927199.com
pizzanpickle.com
schnitzel.party
spkariyer.com
amsterdambrownies.com
laboratorioinfodigital.com
retailmedicaldepot.com
registeraccountants.amsterdam
khadeidralegendre.com
indialearninghub.com
xinjidf.com
thehawkproz.com
shpmtents14.com
kelaskaya.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3056-125-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3056-126-0x000000000041D0C0-mapping.dmp xloader behavioral2/memory/4008-133-0x0000000000320000-0x0000000000349000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
winlog.exewinlog.exeNETSTAT.EXEdescription pid process target process PID 3916 set thread context of 3056 3916 winlog.exe winlog.exe PID 3056 set thread context of 2824 3056 winlog.exe Explorer.EXE PID 4008 set thread context of 2824 4008 NETSTAT.EXE Explorer.EXE -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
NETSTAT.EXEpid process 4008 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
winlog.exewinlog.exeNETSTAT.EXEpid process 3916 winlog.exe 3916 winlog.exe 3056 winlog.exe 3056 winlog.exe 3056 winlog.exe 3056 winlog.exe 4008 NETSTAT.EXE 4008 NETSTAT.EXE 4008 NETSTAT.EXE 4008 NETSTAT.EXE 4008 NETSTAT.EXE 4008 NETSTAT.EXE 4008 NETSTAT.EXE 4008 NETSTAT.EXE 4008 NETSTAT.EXE 4008 NETSTAT.EXE 4008 NETSTAT.EXE 4008 NETSTAT.EXE 4008 NETSTAT.EXE 4008 NETSTAT.EXE 4008 NETSTAT.EXE 4008 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
winlog.exeNETSTAT.EXEpid process 3056 winlog.exe 3056 winlog.exe 3056 winlog.exe 4008 NETSTAT.EXE 4008 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
winlog.exewinlog.exeNETSTAT.EXEdescription pid process Token: SeDebugPrivilege 3916 winlog.exe Token: SeDebugPrivilege 3056 winlog.exe Token: SeDebugPrivilege 4008 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
winlog.exeExplorer.EXENETSTAT.EXEdescription pid process target process PID 3916 wrote to memory of 2752 3916 winlog.exe winlog.exe PID 3916 wrote to memory of 2752 3916 winlog.exe winlog.exe PID 3916 wrote to memory of 2752 3916 winlog.exe winlog.exe PID 3916 wrote to memory of 3056 3916 winlog.exe winlog.exe PID 3916 wrote to memory of 3056 3916 winlog.exe winlog.exe PID 3916 wrote to memory of 3056 3916 winlog.exe winlog.exe PID 3916 wrote to memory of 3056 3916 winlog.exe winlog.exe PID 3916 wrote to memory of 3056 3916 winlog.exe winlog.exe PID 3916 wrote to memory of 3056 3916 winlog.exe winlog.exe PID 2824 wrote to memory of 4008 2824 Explorer.EXE NETSTAT.EXE PID 2824 wrote to memory of 4008 2824 Explorer.EXE NETSTAT.EXE PID 2824 wrote to memory of 4008 2824 Explorer.EXE NETSTAT.EXE PID 4008 wrote to memory of 1904 4008 NETSTAT.EXE cmd.exe PID 4008 wrote to memory of 1904 4008 NETSTAT.EXE cmd.exe PID 4008 wrote to memory of 1904 4008 NETSTAT.EXE cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\winlog.exe"C:\Users\Admin\AppData\Local\Temp\winlog.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\winlog.exe"C:\Users\Admin\AppData\Local\Temp\winlog.exe"3⤵PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\winlog.exe"C:\Users\Admin\AppData\Local\Temp\winlog.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3056
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\winlog.exe"3⤵PID:1904
-
-