Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
24-09-2021 11:26
Static task
static1
Behavioral task
behavioral1
Sample
859a1a6574e4a09027f729908318b282.exe
Resource
win7-en-20210920
General
-
Target
859a1a6574e4a09027f729908318b282.exe
-
Size
421KB
-
MD5
859a1a6574e4a09027f729908318b282
-
SHA1
bf7c9e96ca263d7811f7357f8645af42b04c093b
-
SHA256
d84f2a05198d85dd6f2bf606fe6e24f7ca929cff9796d6b7f269bb8e7cf8b2a7
-
SHA512
4163390db6bf2d8f66e8575e8d116df222e8d72b97037eca614fdb2d94d8cd686c31eb4593ce1164dfc398fe03a7b3ac97bfee61fc2e3ddb27e566c39cb234ec
Malware Config
Extracted
xloader
2.5
arup
http://www.sapphiretype.com/arup/
mezonpezon.com
bellapbd.com
xn--2kr800ab2z.group
cupecoysuites.com
extractselect.com
cherrycooky.com
reshawna.com
bluewinetours.com
dez2fly.com
washedproductions.com
om-asahi-kasei-jp.com
talkingpoint.tours
avaspacecompany.com
fbtvmall.com
trocaoferta.com
mionegozio.com
reitschuetz.com
basepicks.com
networkagricity.com
kastore.club
groovydeer.com
realisa.net
891708.com
naveenachittibiyina.com
guizhouawj.com
royaltortoisecookieco.online
scubafarm.com
sibo.care
rapi-vet.com
metaid.website
shadoworksart.com
gratitudegalore.com
penhal.com
fetch-an-us-itchy.zone
melisaakyolicmimarlik.com
yiweise.com
sofasstorremolinos.com
rfanil.com
metaverselemon.com
theholidaymovieplanner.com
n4sins.com
fortcor.com
galaxysingle.com
gzwqpsyj.com
azur-riviera-rental.com
bharathpaperbagmachine.com
pinup722bk.com
darkness.global
theihearthotel.com
wecowork.net
big-thoughtconsulting.com
ricartepinlac.com
beatsingh.com
xn--e6qg25lq0kdudqy7g.com
zkingstore.com
gd83574.com
jiajssie.xyz
patientempowered.care
tiannuoxxrp.top
itsnalab.com
ioumal.com
bellinghamapartment.com
sakibotchi.com
jessicapets.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1424-125-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1424-126-0x000000000041D4B0-mapping.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
859a1a6574e4a09027f729908318b282.exedescription pid process target process PID 3592 set thread context of 1424 3592 859a1a6574e4a09027f729908318b282.exe 859a1a6574e4a09027f729908318b282.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
859a1a6574e4a09027f729908318b282.exepid process 1424 859a1a6574e4a09027f729908318b282.exe 1424 859a1a6574e4a09027f729908318b282.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
859a1a6574e4a09027f729908318b282.exedescription pid process target process PID 3592 wrote to memory of 1424 3592 859a1a6574e4a09027f729908318b282.exe 859a1a6574e4a09027f729908318b282.exe PID 3592 wrote to memory of 1424 3592 859a1a6574e4a09027f729908318b282.exe 859a1a6574e4a09027f729908318b282.exe PID 3592 wrote to memory of 1424 3592 859a1a6574e4a09027f729908318b282.exe 859a1a6574e4a09027f729908318b282.exe PID 3592 wrote to memory of 1424 3592 859a1a6574e4a09027f729908318b282.exe 859a1a6574e4a09027f729908318b282.exe PID 3592 wrote to memory of 1424 3592 859a1a6574e4a09027f729908318b282.exe 859a1a6574e4a09027f729908318b282.exe PID 3592 wrote to memory of 1424 3592 859a1a6574e4a09027f729908318b282.exe 859a1a6574e4a09027f729908318b282.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\859a1a6574e4a09027f729908318b282.exe"C:\Users\Admin\AppData\Local\Temp\859a1a6574e4a09027f729908318b282.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\859a1a6574e4a09027f729908318b282.exe"C:\Users\Admin\AppData\Local\Temp\859a1a6574e4a09027f729908318b282.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1424-125-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1424-126-0x000000000041D4B0-mapping.dmp
-
memory/1424-127-0x00000000019B0000-0x0000000001CD0000-memory.dmpFilesize
3.1MB
-
memory/3592-115-0x0000000000D30000-0x0000000000D31000-memory.dmpFilesize
4KB
-
memory/3592-117-0x00000000059E0000-0x00000000059E1000-memory.dmpFilesize
4KB
-
memory/3592-118-0x00000000055D0000-0x00000000055D1000-memory.dmpFilesize
4KB
-
memory/3592-119-0x0000000005670000-0x0000000005671000-memory.dmpFilesize
4KB
-
memory/3592-120-0x00000000054E0000-0x00000000059DE000-memory.dmpFilesize
5.0MB
-
memory/3592-121-0x00000000079E0000-0x00000000079E1000-memory.dmpFilesize
4KB
-
memory/3592-122-0x0000000005920000-0x0000000005924000-memory.dmpFilesize
16KB
-
memory/3592-123-0x0000000007D90000-0x0000000007DEC000-memory.dmpFilesize
368KB
-
memory/3592-124-0x0000000007DF0000-0x0000000007E1C000-memory.dmpFilesize
176KB