Analysis
-
max time kernel
52s -
max time network
117s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
19-08-2021 14:31
Static task
static1
Behavioral task
behavioral1
Sample
b911af1e5d84afbe42050f97cef3573b.exe
Resource
win7v20210408
General
-
Target
b911af1e5d84afbe42050f97cef3573b.exe
-
Size
856KB
-
MD5
b911af1e5d84afbe42050f97cef3573b
-
SHA1
706a40efe57a6351736054e3758de58573465a95
-
SHA256
b40312b973ddb1ec411375991f52c6d19204e650d90507445782aaa05bc02e46
-
SHA512
7effa2081a2e6e04fdee3d4696944a5d2bb80a16e8e2d173c173c80958e4ab69a9a9c52e8bcbb587a358ef6836569e298167acd9b05c4f0cedcdd31b6cdf440d
Malware Config
Extracted
xloader
2.3
ahdu
http://www.casinoregio.com/ahdu/
premiumfreebie.com
spintheblackestcircles.com
okaidoku-shop.net
zonaseguradregistropremios.com
wzocflfow.com
maanyah.com
warrioredjuan.com
uniquelypizza.com
wondertreehr.com
ddriiverzautozs.com
mattenterline.com
urenium.com
salonjedibreakthrough.com
imgkurd.com
pierrejacqueslyon.com
quimicasurandina.com
jkpfukgmt.icu
ansariclinic.com
ashleysema.design
arkadiafoliage.com
fhstzy.com
beautyandherocean.com
hgw234.com
whiteclawdogseltzer.com
montecitobeaches.com
weixinseo.xyz
javpanel.com
mayonnaiseplant.com
shooternetsports.com
withagecny.com
northernloss.com
theshedscharityshop.com
mi-darulaman.com
sezginotel.com
dreamcricketpro.com
mail-globo-com-webmails.com
seucorpofit.com
konversiondigital.com
nirvavacenter.com
communicateforfreedom.com
maxwellgroupphyscians.com
ltcy4.com
find-my-kids.com
gromov-plc.com
premiercovidscreening.com
telemedde.com
ifapt.com
getopalace.com
ralsendo.com
weinsurebars.com
bainrix.com
precisionprobusiness.com
therussellpinto.com
resepindonesia.space
obluedotpanobuy.com
vrev.net
source824.xyz
betsunmacougold.com
mabtas.com
mazcommunity.com
blockchainwallet.solutions
valentineennett.xyz
dolcevazquez.com
institutobalcarceolavarria.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3992-124-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3992-125-0x000000000041D080-mapping.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b911af1e5d84afbe42050f97cef3573b.exedescription pid process target process PID 636 set thread context of 3992 636 b911af1e5d84afbe42050f97cef3573b.exe b911af1e5d84afbe42050f97cef3573b.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
b911af1e5d84afbe42050f97cef3573b.exeb911af1e5d84afbe42050f97cef3573b.exepid process 636 b911af1e5d84afbe42050f97cef3573b.exe 636 b911af1e5d84afbe42050f97cef3573b.exe 3992 b911af1e5d84afbe42050f97cef3573b.exe 3992 b911af1e5d84afbe42050f97cef3573b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
b911af1e5d84afbe42050f97cef3573b.exedescription pid process Token: SeDebugPrivilege 636 b911af1e5d84afbe42050f97cef3573b.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
b911af1e5d84afbe42050f97cef3573b.exedescription pid process target process PID 636 wrote to memory of 1248 636 b911af1e5d84afbe42050f97cef3573b.exe b911af1e5d84afbe42050f97cef3573b.exe PID 636 wrote to memory of 1248 636 b911af1e5d84afbe42050f97cef3573b.exe b911af1e5d84afbe42050f97cef3573b.exe PID 636 wrote to memory of 1248 636 b911af1e5d84afbe42050f97cef3573b.exe b911af1e5d84afbe42050f97cef3573b.exe PID 636 wrote to memory of 3992 636 b911af1e5d84afbe42050f97cef3573b.exe b911af1e5d84afbe42050f97cef3573b.exe PID 636 wrote to memory of 3992 636 b911af1e5d84afbe42050f97cef3573b.exe b911af1e5d84afbe42050f97cef3573b.exe PID 636 wrote to memory of 3992 636 b911af1e5d84afbe42050f97cef3573b.exe b911af1e5d84afbe42050f97cef3573b.exe PID 636 wrote to memory of 3992 636 b911af1e5d84afbe42050f97cef3573b.exe b911af1e5d84afbe42050f97cef3573b.exe PID 636 wrote to memory of 3992 636 b911af1e5d84afbe42050f97cef3573b.exe b911af1e5d84afbe42050f97cef3573b.exe PID 636 wrote to memory of 3992 636 b911af1e5d84afbe42050f97cef3573b.exe b911af1e5d84afbe42050f97cef3573b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b911af1e5d84afbe42050f97cef3573b.exe"C:\Users\Admin\AppData\Local\Temp\b911af1e5d84afbe42050f97cef3573b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\b911af1e5d84afbe42050f97cef3573b.exe"C:\Users\Admin\AppData\Local\Temp\b911af1e5d84afbe42050f97cef3573b.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\b911af1e5d84afbe42050f97cef3573b.exe"C:\Users\Admin\AppData\Local\Temp\b911af1e5d84afbe42050f97cef3573b.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/636-114-0x0000000000A00000-0x0000000000A01000-memory.dmpFilesize
4KB
-
memory/636-116-0x0000000005980000-0x0000000005981000-memory.dmpFilesize
4KB
-
memory/636-117-0x0000000005320000-0x0000000005321000-memory.dmpFilesize
4KB
-
memory/636-118-0x00000000053C0000-0x00000000053C1000-memory.dmpFilesize
4KB
-
memory/636-119-0x0000000005280000-0x0000000005312000-memory.dmpFilesize
584KB
-
memory/636-120-0x00000000052F0000-0x00000000052F1000-memory.dmpFilesize
4KB
-
memory/636-121-0x00000000056F0000-0x0000000005701000-memory.dmpFilesize
68KB
-
memory/636-122-0x0000000007A20000-0x0000000007AC3000-memory.dmpFilesize
652KB
-
memory/636-123-0x000000000A130000-0x000000000A164000-memory.dmpFilesize
208KB
-
memory/3992-124-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3992-125-0x000000000041D080-mapping.dmp
-
memory/3992-126-0x0000000001320000-0x0000000001640000-memory.dmpFilesize
3.1MB