Analysis
-
max time kernel
2s -
max time network
54s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
27-07-2021 16:11
Static task
static1
Behavioral task
behavioral1
Sample
321ebf1c2e57ae454232ee12b6892164.exe
Resource
win7v20210408
General
-
Target
321ebf1c2e57ae454232ee12b6892164.exe
-
Size
383KB
-
MD5
321ebf1c2e57ae454232ee12b6892164
-
SHA1
db9f088a05203a6caf9656e59731f027adfe1bd0
-
SHA256
3759a4136f3ab450b1c26121511bdfea101baf948b580af60516c8c2d5c7b900
-
SHA512
afc14c50480f173932da1c0f7d80ef7667eb95a8c8f66279f8481c4ef85a669c8c0ac15582b6762521b78d34af7510c374dd1b30e3fd14e1d273639b4c85e083
Malware Config
Extracted
xloader
2.3
http://www.extinctionbrews.com/dy8g/
mzyxi-rkah-y.net
okinawarongnho.com
qq66520.com
nimbus.watch
cwdelrio.com
regalshopper.com
avito-payment.life
jorgeporcayo.com
galvinsky.digital
guys-only.com
asmfruits-almacenes.com
boatrace-life04.net
cochez.club
thelastvictor.net
janieleconte.com
ivoirepneus.com
saludflv.info
mydreamtv.net
austinphy.com
cajunseafoodstcloud.com
13006608192.com
clear3media.com
thegrowclinic.com
findfoodshop.com
livegaming.store
greensei.com
atmaapothecary.com
builtbydawn.com
wthcoffee.com
melodezu.com
oikoschain.com
matcitekids.com
killrstudio.com
doityourselfism.com
monsoonnerd.com
swissbankmusic.com
envisionfordheights.com
invisiongc.net
aizaibali.com
professioneconsulenza.net
chaneabond.com
theamercianhouseboat.com
scuolatua.com
surivaganza.com
xn--vuq722jwngjre.com
quiteimediato.space
ecofingers.com
manageoceanaccount.com
cindywillardrealtor.com
garimpeirastore.online
tinsley.website
fitnesstwentytwenty.com
thenorthgoldline.com
scuolacounselingroma.com
iwccgroup.com
wideawakemomma.com
anthonysavillemiddleschool.com
sprinkleresources.com
ravexim3.com
onedadtwodudes.com
shxytl.com
iriscloudvideo.com
theshapecreator.com
vermogenswerte.com
Signatures
-
Xloader Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1964-63-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
321ebf1c2e57ae454232ee12b6892164.exedescription pid process target process PID 1092 set thread context of 1964 1092 321ebf1c2e57ae454232ee12b6892164.exe 321ebf1c2e57ae454232ee12b6892164.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
321ebf1c2e57ae454232ee12b6892164.exepid process 1964 321ebf1c2e57ae454232ee12b6892164.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
321ebf1c2e57ae454232ee12b6892164.exepid process 1092 321ebf1c2e57ae454232ee12b6892164.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
321ebf1c2e57ae454232ee12b6892164.exedescription pid process target process PID 1092 wrote to memory of 1964 1092 321ebf1c2e57ae454232ee12b6892164.exe 321ebf1c2e57ae454232ee12b6892164.exe PID 1092 wrote to memory of 1964 1092 321ebf1c2e57ae454232ee12b6892164.exe 321ebf1c2e57ae454232ee12b6892164.exe PID 1092 wrote to memory of 1964 1092 321ebf1c2e57ae454232ee12b6892164.exe 321ebf1c2e57ae454232ee12b6892164.exe PID 1092 wrote to memory of 1964 1092 321ebf1c2e57ae454232ee12b6892164.exe 321ebf1c2e57ae454232ee12b6892164.exe PID 1092 wrote to memory of 1964 1092 321ebf1c2e57ae454232ee12b6892164.exe 321ebf1c2e57ae454232ee12b6892164.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\321ebf1c2e57ae454232ee12b6892164.exe"C:\Users\Admin\AppData\Local\Temp\321ebf1c2e57ae454232ee12b6892164.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\321ebf1c2e57ae454232ee12b6892164.exe"C:\Users\Admin\AppData\Local\Temp\321ebf1c2e57ae454232ee12b6892164.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1092-60-0x0000000075AF1000-0x0000000075AF3000-memory.dmpFilesize
8KB
-
memory/1092-62-0x0000000000260000-0x0000000000262000-memory.dmpFilesize
8KB
-
memory/1964-61-0x000000000041D090-mapping.dmp
-
memory/1964-63-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1964-64-0x0000000000860000-0x0000000000B63000-memory.dmpFilesize
3.0MB