Analysis
-
max time kernel
1s -
max time network
39s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
22-07-2021 08:03
Static task
static1
Behavioral task
behavioral1
Sample
686dc98567009e47eac88e95804b9dde.exe
Resource
win7v20210408
General
-
Target
686dc98567009e47eac88e95804b9dde.exe
-
Size
172KB
-
MD5
686dc98567009e47eac88e95804b9dde
-
SHA1
5788c30289d12f69d5cf323049d8d3c3a3e73cda
-
SHA256
11d84c7f9c579c2e58f4acc04d488d5f1c6cc0439609099eabec42444f5ef952
-
SHA512
1450afd067710a6c2385858a2d4c7a0afeb02516885ec2515de696fc89c18f985097089af39708ba0e8088547f6fcc0a6285136a5175c169be764d9ec40924ce
Malware Config
Extracted
xloader
2.3
http://www.extinctionbrews.com/dy8g/
mzyxi-rkah-y.net
okinawarongnho.com
qq66520.com
nimbus.watch
cwdelrio.com
regalshopper.com
avito-payment.life
jorgeporcayo.com
galvinsky.digital
guys-only.com
asmfruits-almacenes.com
boatrace-life04.net
cochez.club
thelastvictor.net
janieleconte.com
ivoirepneus.com
saludflv.info
mydreamtv.net
austinphy.com
cajunseafoodstcloud.com
13006608192.com
clear3media.com
thegrowclinic.com
findfoodshop.com
livegaming.store
greensei.com
atmaapothecary.com
builtbydawn.com
wthcoffee.com
melodezu.com
oikoschain.com
matcitekids.com
killrstudio.com
doityourselfism.com
monsoonnerd.com
swissbankmusic.com
envisionfordheights.com
invisiongc.net
aizaibali.com
professioneconsulenza.net
chaneabond.com
theamercianhouseboat.com
scuolatua.com
surivaganza.com
xn--vuq722jwngjre.com
quiteimediato.space
ecofingers.com
manageoceanaccount.com
cindywillardrealtor.com
garimpeirastore.online
tinsley.website
fitnesstwentytwenty.com
thenorthgoldline.com
scuolacounselingroma.com
iwccgroup.com
wideawakemomma.com
anthonysavillemiddleschool.com
sprinkleresources.com
ravexim3.com
onedadtwodudes.com
shxytl.com
iriscloudvideo.com
theshapecreator.com
vermogenswerte.com
Signatures
-
Xloader Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1404-62-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
686dc98567009e47eac88e95804b9dde.exedescription pid process target process PID 520 set thread context of 1404 520 686dc98567009e47eac88e95804b9dde.exe 686dc98567009e47eac88e95804b9dde.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
686dc98567009e47eac88e95804b9dde.exepid process 1404 686dc98567009e47eac88e95804b9dde.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
686dc98567009e47eac88e95804b9dde.exepid process 520 686dc98567009e47eac88e95804b9dde.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
686dc98567009e47eac88e95804b9dde.exedescription pid process target process PID 520 wrote to memory of 1404 520 686dc98567009e47eac88e95804b9dde.exe 686dc98567009e47eac88e95804b9dde.exe PID 520 wrote to memory of 1404 520 686dc98567009e47eac88e95804b9dde.exe 686dc98567009e47eac88e95804b9dde.exe PID 520 wrote to memory of 1404 520 686dc98567009e47eac88e95804b9dde.exe 686dc98567009e47eac88e95804b9dde.exe PID 520 wrote to memory of 1404 520 686dc98567009e47eac88e95804b9dde.exe 686dc98567009e47eac88e95804b9dde.exe PID 520 wrote to memory of 1404 520 686dc98567009e47eac88e95804b9dde.exe 686dc98567009e47eac88e95804b9dde.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\686dc98567009e47eac88e95804b9dde.exe"C:\Users\Admin\AppData\Local\Temp\686dc98567009e47eac88e95804b9dde.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\686dc98567009e47eac88e95804b9dde.exe"C:\Users\Admin\AppData\Local\Temp\686dc98567009e47eac88e95804b9dde.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/520-59-0x0000000075C31000-0x0000000075C33000-memory.dmpFilesize
8KB
-
memory/520-61-0x0000000000340000-0x0000000000342000-memory.dmpFilesize
8KB
-
memory/1404-60-0x000000000041D090-mapping.dmp
-
memory/1404-62-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1404-63-0x0000000000770000-0x0000000000A73000-memory.dmpFilesize
3.0MB