Analysis
-
max time kernel
61s -
max time network
126s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
21-07-2021 19:08
Static task
static1
Behavioral task
behavioral1
Sample
6c15b3de8c54e5e3339a446af50fc48a.exe
Resource
win7v20210408
General
-
Target
6c15b3de8c54e5e3339a446af50fc48a.exe
-
Size
904KB
-
MD5
6c15b3de8c54e5e3339a446af50fc48a
-
SHA1
1133619a11f7410cf2ee2ca0e42324898e524154
-
SHA256
306197e367d32ebeb65e18cd9607f58268f6e4751de77ae1cf8f5270e660c1f6
-
SHA512
6bd0a44da885f085bafa277169c79fcb4411c928b850e16cea3b3119ad81b23a3497c211150ba8cb386a649ef7ed9f89ab026e570844dab2b83762b4dce36a6a
Malware Config
Extracted
xloader
2.3
http://www.tjbc-bearing.com/u6bi/
5588aiai.com
sint-ecommerce.com
epreyn.com
unexpectedbrewing.com
pomiandpam.com
viverdebatatas.com
dirham.world
accademiadelfuturo.net
mengyaheng.com
ilocalrealtor.com
glomiotel.website
metal1sa.com
kslife.net
maxfitnesslakeoconee.com
hoteldeleauvive.com
sidingzhou.com
getvocall.com
basicryptomining.com
indiasofannapolis.com
tresorbrut.com
majesticmanicures.com
fstreamztv.com
gohospo.net
divineryoga.com
daiye.net
shopnjteamstersfc.com
vartomp.wales
xn--ikkonentra-3ib.com
thejasonjournal.com
uluuclub.com
qlitepower.com
edimetics.com
citestaccnt1598597207.com
vincedoeslife.info
itsoriente.com
29atlantic.com
2021cacondo.com
vac.one
rebeccacorreiadance.com
bladingelse.com
vm-agritech-ltd.net
tiltyi.com
buntunm3.com
obluebeltpanomall.com
pvbankonline.com
dlqvisa.com
morganrealtyinc.net
semmedodigital.com
thrivemilano.com
satyamsofficial.com
kitchenchampsclub.com
aervius.com
htchotshot.com
alephpos.com
midfirstprivagebank.com
puzzlesvr.com
tbwhzp.com
kyuramenstatenisland.com
snackwine.com
terangatourisme.com
cophi.net
sdnjjywlc.com
ukdooss.icu
sumayyaejaz.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3776-128-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/3776-129-0x000000000041D040-mapping.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
6c15b3de8c54e5e3339a446af50fc48a.exedescription pid process target process PID 3944 set thread context of 3776 3944 6c15b3de8c54e5e3339a446af50fc48a.exe 6c15b3de8c54e5e3339a446af50fc48a.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
6c15b3de8c54e5e3339a446af50fc48a.exepid process 3776 6c15b3de8c54e5e3339a446af50fc48a.exe 3776 6c15b3de8c54e5e3339a446af50fc48a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
6c15b3de8c54e5e3339a446af50fc48a.exedescription pid process target process PID 3944 wrote to memory of 3776 3944 6c15b3de8c54e5e3339a446af50fc48a.exe 6c15b3de8c54e5e3339a446af50fc48a.exe PID 3944 wrote to memory of 3776 3944 6c15b3de8c54e5e3339a446af50fc48a.exe 6c15b3de8c54e5e3339a446af50fc48a.exe PID 3944 wrote to memory of 3776 3944 6c15b3de8c54e5e3339a446af50fc48a.exe 6c15b3de8c54e5e3339a446af50fc48a.exe PID 3944 wrote to memory of 3776 3944 6c15b3de8c54e5e3339a446af50fc48a.exe 6c15b3de8c54e5e3339a446af50fc48a.exe PID 3944 wrote to memory of 3776 3944 6c15b3de8c54e5e3339a446af50fc48a.exe 6c15b3de8c54e5e3339a446af50fc48a.exe PID 3944 wrote to memory of 3776 3944 6c15b3de8c54e5e3339a446af50fc48a.exe 6c15b3de8c54e5e3339a446af50fc48a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\6c15b3de8c54e5e3339a446af50fc48a.exe"C:\Users\Admin\AppData\Local\Temp\6c15b3de8c54e5e3339a446af50fc48a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\6c15b3de8c54e5e3339a446af50fc48a.exe"C:\Users\Admin\AppData\Local\Temp\6c15b3de8c54e5e3339a446af50fc48a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3776
-