Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
21-07-2021 21:01
Static task
static1
Behavioral task
behavioral1
Sample
.wininit.exe
Resource
win7v20210408
General
-
Target
.wininit.exe
-
Size
904KB
-
MD5
6c15b3de8c54e5e3339a446af50fc48a
-
SHA1
1133619a11f7410cf2ee2ca0e42324898e524154
-
SHA256
306197e367d32ebeb65e18cd9607f58268f6e4751de77ae1cf8f5270e660c1f6
-
SHA512
6bd0a44da885f085bafa277169c79fcb4411c928b850e16cea3b3119ad81b23a3497c211150ba8cb386a649ef7ed9f89ab026e570844dab2b83762b4dce36a6a
Malware Config
Extracted
xloader
2.3
http://www.tjbc-bearing.com/u6bi/
5588aiai.com
sint-ecommerce.com
epreyn.com
unexpectedbrewing.com
pomiandpam.com
viverdebatatas.com
dirham.world
accademiadelfuturo.net
mengyaheng.com
ilocalrealtor.com
glomiotel.website
metal1sa.com
kslife.net
maxfitnesslakeoconee.com
hoteldeleauvive.com
sidingzhou.com
getvocall.com
basicryptomining.com
indiasofannapolis.com
tresorbrut.com
majesticmanicures.com
fstreamztv.com
gohospo.net
divineryoga.com
daiye.net
shopnjteamstersfc.com
vartomp.wales
xn--ikkonentra-3ib.com
thejasonjournal.com
uluuclub.com
qlitepower.com
edimetics.com
citestaccnt1598597207.com
vincedoeslife.info
itsoriente.com
29atlantic.com
2021cacondo.com
vac.one
rebeccacorreiadance.com
bladingelse.com
vm-agritech-ltd.net
tiltyi.com
buntunm3.com
obluebeltpanomall.com
pvbankonline.com
dlqvisa.com
morganrealtyinc.net
semmedodigital.com
thrivemilano.com
satyamsofficial.com
kitchenchampsclub.com
aervius.com
htchotshot.com
alephpos.com
midfirstprivagebank.com
puzzlesvr.com
tbwhzp.com
kyuramenstatenisland.com
snackwine.com
terangatourisme.com
cophi.net
sdnjjywlc.com
ukdooss.icu
sumayyaejaz.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3136-128-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/3136-129-0x000000000041D040-mapping.dmp xloader behavioral2/memory/3772-135-0x0000000000600000-0x0000000000628000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
.wininit.exe.wininit.execmmon32.exedescription pid process target process PID 2192 set thread context of 3136 2192 .wininit.exe .wininit.exe PID 3136 set thread context of 3016 3136 .wininit.exe Explorer.EXE PID 3772 set thread context of 3016 3772 cmmon32.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 40 IoCs
Processes:
.wininit.execmmon32.exepid process 3136 .wininit.exe 3136 .wininit.exe 3136 .wininit.exe 3136 .wininit.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe 3772 cmmon32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3016 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
.wininit.execmmon32.exepid process 3136 .wininit.exe 3136 .wininit.exe 3136 .wininit.exe 3772 cmmon32.exe 3772 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
.wininit.execmmon32.exedescription pid process Token: SeDebugPrivilege 3136 .wininit.exe Token: SeDebugPrivilege 3772 cmmon32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
.wininit.exeExplorer.EXEcmmon32.exedescription pid process target process PID 2192 wrote to memory of 3136 2192 .wininit.exe .wininit.exe PID 2192 wrote to memory of 3136 2192 .wininit.exe .wininit.exe PID 2192 wrote to memory of 3136 2192 .wininit.exe .wininit.exe PID 2192 wrote to memory of 3136 2192 .wininit.exe .wininit.exe PID 2192 wrote to memory of 3136 2192 .wininit.exe .wininit.exe PID 2192 wrote to memory of 3136 2192 .wininit.exe .wininit.exe PID 3016 wrote to memory of 3772 3016 Explorer.EXE cmmon32.exe PID 3016 wrote to memory of 3772 3016 Explorer.EXE cmmon32.exe PID 3016 wrote to memory of 3772 3016 Explorer.EXE cmmon32.exe PID 3772 wrote to memory of 744 3772 cmmon32.exe cmd.exe PID 3772 wrote to memory of 744 3772 cmmon32.exe cmd.exe PID 3772 wrote to memory of 744 3772 cmmon32.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\.wininit.exe"C:\Users\Admin\AppData\Local\Temp\.wininit.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\.wininit.exe"C:\Users\Admin\AppData\Local\Temp\.wininit.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3136
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\.wininit.exe"3⤵PID:744
-
-