Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
24-09-2021 13:09
Static task
static1
General
-
Target
d84f2a05198d85dd6f2bf606fe6e24f7ca929cff9796d6b7f269bb8e7cf8b2a7.exe
-
Size
421KB
-
MD5
859a1a6574e4a09027f729908318b282
-
SHA1
bf7c9e96ca263d7811f7357f8645af42b04c093b
-
SHA256
d84f2a05198d85dd6f2bf606fe6e24f7ca929cff9796d6b7f269bb8e7cf8b2a7
-
SHA512
4163390db6bf2d8f66e8575e8d116df222e8d72b97037eca614fdb2d94d8cd686c31eb4593ce1164dfc398fe03a7b3ac97bfee61fc2e3ddb27e566c39cb234ec
Malware Config
Extracted
xloader
2.5
arup
http://www.sapphiretype.com/arup/
mezonpezon.com
bellapbd.com
xn--2kr800ab2z.group
cupecoysuites.com
extractselect.com
cherrycooky.com
reshawna.com
bluewinetours.com
dez2fly.com
washedproductions.com
om-asahi-kasei-jp.com
talkingpoint.tours
avaspacecompany.com
fbtvmall.com
trocaoferta.com
mionegozio.com
reitschuetz.com
basepicks.com
networkagricity.com
kastore.club
groovydeer.com
realisa.net
891708.com
naveenachittibiyina.com
guizhouawj.com
royaltortoisecookieco.online
scubafarm.com
sibo.care
rapi-vet.com
metaid.website
shadoworksart.com
gratitudegalore.com
penhal.com
fetch-an-us-itchy.zone
melisaakyolicmimarlik.com
yiweise.com
sofasstorremolinos.com
rfanil.com
metaverselemon.com
theholidaymovieplanner.com
n4sins.com
fortcor.com
galaxysingle.com
gzwqpsyj.com
azur-riviera-rental.com
bharathpaperbagmachine.com
pinup722bk.com
darkness.global
theihearthotel.com
wecowork.net
big-thoughtconsulting.com
ricartepinlac.com
beatsingh.com
xn--e6qg25lq0kdudqy7g.com
zkingstore.com
gd83574.com
jiajssie.xyz
patientempowered.care
tiannuoxxrp.top
itsnalab.com
ioumal.com
bellinghamapartment.com
sakibotchi.com
jessicapets.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1520-125-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1520-126-0x000000000041D4B0-mapping.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
d84f2a05198d85dd6f2bf606fe6e24f7ca929cff9796d6b7f269bb8e7cf8b2a7.exedescription pid process target process PID 2372 set thread context of 1520 2372 d84f2a05198d85dd6f2bf606fe6e24f7ca929cff9796d6b7f269bb8e7cf8b2a7.exe d84f2a05198d85dd6f2bf606fe6e24f7ca929cff9796d6b7f269bb8e7cf8b2a7.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
d84f2a05198d85dd6f2bf606fe6e24f7ca929cff9796d6b7f269bb8e7cf8b2a7.exepid process 1520 d84f2a05198d85dd6f2bf606fe6e24f7ca929cff9796d6b7f269bb8e7cf8b2a7.exe 1520 d84f2a05198d85dd6f2bf606fe6e24f7ca929cff9796d6b7f269bb8e7cf8b2a7.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
d84f2a05198d85dd6f2bf606fe6e24f7ca929cff9796d6b7f269bb8e7cf8b2a7.exedescription pid process target process PID 2372 wrote to memory of 1520 2372 d84f2a05198d85dd6f2bf606fe6e24f7ca929cff9796d6b7f269bb8e7cf8b2a7.exe d84f2a05198d85dd6f2bf606fe6e24f7ca929cff9796d6b7f269bb8e7cf8b2a7.exe PID 2372 wrote to memory of 1520 2372 d84f2a05198d85dd6f2bf606fe6e24f7ca929cff9796d6b7f269bb8e7cf8b2a7.exe d84f2a05198d85dd6f2bf606fe6e24f7ca929cff9796d6b7f269bb8e7cf8b2a7.exe PID 2372 wrote to memory of 1520 2372 d84f2a05198d85dd6f2bf606fe6e24f7ca929cff9796d6b7f269bb8e7cf8b2a7.exe d84f2a05198d85dd6f2bf606fe6e24f7ca929cff9796d6b7f269bb8e7cf8b2a7.exe PID 2372 wrote to memory of 1520 2372 d84f2a05198d85dd6f2bf606fe6e24f7ca929cff9796d6b7f269bb8e7cf8b2a7.exe d84f2a05198d85dd6f2bf606fe6e24f7ca929cff9796d6b7f269bb8e7cf8b2a7.exe PID 2372 wrote to memory of 1520 2372 d84f2a05198d85dd6f2bf606fe6e24f7ca929cff9796d6b7f269bb8e7cf8b2a7.exe d84f2a05198d85dd6f2bf606fe6e24f7ca929cff9796d6b7f269bb8e7cf8b2a7.exe PID 2372 wrote to memory of 1520 2372 d84f2a05198d85dd6f2bf606fe6e24f7ca929cff9796d6b7f269bb8e7cf8b2a7.exe d84f2a05198d85dd6f2bf606fe6e24f7ca929cff9796d6b7f269bb8e7cf8b2a7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d84f2a05198d85dd6f2bf606fe6e24f7ca929cff9796d6b7f269bb8e7cf8b2a7.exe"C:\Users\Admin\AppData\Local\Temp\d84f2a05198d85dd6f2bf606fe6e24f7ca929cff9796d6b7f269bb8e7cf8b2a7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\d84f2a05198d85dd6f2bf606fe6e24f7ca929cff9796d6b7f269bb8e7cf8b2a7.exe"C:\Users\Admin\AppData\Local\Temp\d84f2a05198d85dd6f2bf606fe6e24f7ca929cff9796d6b7f269bb8e7cf8b2a7.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1520-125-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1520-126-0x000000000041D4B0-mapping.dmp
-
memory/1520-127-0x00000000013D0000-0x00000000016F0000-memory.dmpFilesize
3.1MB
-
memory/2372-115-0x00000000002E0000-0x00000000002E1000-memory.dmpFilesize
4KB
-
memory/2372-117-0x0000000005120000-0x0000000005121000-memory.dmpFilesize
4KB
-
memory/2372-118-0x0000000004B70000-0x0000000004B71000-memory.dmpFilesize
4KB
-
memory/2372-119-0x0000000004C20000-0x000000000511E000-memory.dmpFilesize
5.0MB
-
memory/2372-120-0x0000000004CF0000-0x0000000004CF1000-memory.dmpFilesize
4KB
-
memory/2372-121-0x0000000006FC0000-0x0000000006FC1000-memory.dmpFilesize
4KB
-
memory/2372-122-0x0000000004EC0000-0x0000000004EC4000-memory.dmpFilesize
16KB
-
memory/2372-123-0x0000000007440000-0x000000000749C000-memory.dmpFilesize
368KB
-
memory/2372-124-0x00000000074A0000-0x00000000074CC000-memory.dmpFilesize
176KB