Analysis
-
max time kernel
140s -
max time network
57s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
28-09-2021 06:16
Static task
static1
Behavioral task
behavioral1
Sample
51195e0d79dacd68acd8b5bcbc356ab1.exe
Resource
win7v20210408
General
-
Target
51195e0d79dacd68acd8b5bcbc356ab1.exe
-
Size
378KB
-
MD5
51195e0d79dacd68acd8b5bcbc356ab1
-
SHA1
b2578edd7f1a89474639271df4c7cf0cba336a05
-
SHA256
129d230573fdb00a681a7f0c507bc16d2efcd08c4408f544f1d7653162b2cd92
-
SHA512
81cb6dc51d75a4bf734ba73ad30175c80066953ded42b46fe16935eb8cc5ed4fa8513f6082707e1ad42c0bb60723b45dc7963ef72ea57d8e18cc2ec43d7720e8
Malware Config
Extracted
xloader
2.5
mjyv
http://www.simpeltattofor.men/mjyv/
wenyuexuan.com
tropicaldepression.info
healthylifefit.com
reemletenleafy.com
jmrrve.com
mabduh.com
esomvw.com
selfcaresereneneness.com
murdabudz.com
meinemail.online
brandqrcodes.com
live-in-pflege.com
nickrecovery.com
ziototoristorante.com
chatcure.com
corlora.com
localagentlab.com
yogo7.net
krveop.com
heianswer.xyz
idproslot.xyz
anielleharris.com
lebonaharchitects.com
chilestew.com
ventasdecasasylotes.xyz
welcome-sber.store
ahmedintisher.com
pastlinks.com
productprinting.online
babybox.media
volteraenergy.net
chinatowndeliver.com
behiscalm.com
totalselfconfidence.net
single-on-purpose.com
miyonbuilding.com
medicalmanagementinc.info
bellaalubo.com
dubaibiologicdentist.com
jspagnier-graveur.com
deskbk.com
thehauntdepot.com
5fbuy.com
calmingscience.com
luvnecklace.com
noun-bug.com
mysenarai.com
socialmediaplugin.com
livinglovinglincoln.com
vaxfreeschool.com
bjjinmei.com
p60p.com
upgradepklohb.xyz
georges-lego.com
lkkogltoyof4.xyz
fryhealty.com
peacetransformationpath.com
lightfootsteps.com
recreativemysteriousgift.com
luminoza.website
mccorklehometeam.com
car-insurance-rates-x2.info
serpasboutiquedecarnes.com
1971event.com
Signatures
-
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1808-65-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1808-66-0x000000000041D460-mapping.dmp xloader -
Downloads MZ/PE file
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
51195e0d79dacd68acd8b5bcbc356ab1.exedescription pid process target process PID 748 set thread context of 1808 748 51195e0d79dacd68acd8b5bcbc356ab1.exe 51195e0d79dacd68acd8b5bcbc356ab1.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2004 748 WerFault.exe 51195e0d79dacd68acd8b5bcbc356ab1.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
51195e0d79dacd68acd8b5bcbc356ab1.exeWerFault.exepid process 1808 51195e0d79dacd68acd8b5bcbc356ab1.exe 2004 WerFault.exe 2004 WerFault.exe 2004 WerFault.exe 2004 WerFault.exe 2004 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
WerFault.exepid process 2004 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
51195e0d79dacd68acd8b5bcbc356ab1.exeWerFault.exedescription pid process Token: SeDebugPrivilege 748 51195e0d79dacd68acd8b5bcbc356ab1.exe Token: SeDebugPrivilege 2004 WerFault.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
51195e0d79dacd68acd8b5bcbc356ab1.exedescription pid process target process PID 748 wrote to memory of 1808 748 51195e0d79dacd68acd8b5bcbc356ab1.exe 51195e0d79dacd68acd8b5bcbc356ab1.exe PID 748 wrote to memory of 1808 748 51195e0d79dacd68acd8b5bcbc356ab1.exe 51195e0d79dacd68acd8b5bcbc356ab1.exe PID 748 wrote to memory of 1808 748 51195e0d79dacd68acd8b5bcbc356ab1.exe 51195e0d79dacd68acd8b5bcbc356ab1.exe PID 748 wrote to memory of 1808 748 51195e0d79dacd68acd8b5bcbc356ab1.exe 51195e0d79dacd68acd8b5bcbc356ab1.exe PID 748 wrote to memory of 1808 748 51195e0d79dacd68acd8b5bcbc356ab1.exe 51195e0d79dacd68acd8b5bcbc356ab1.exe PID 748 wrote to memory of 1808 748 51195e0d79dacd68acd8b5bcbc356ab1.exe 51195e0d79dacd68acd8b5bcbc356ab1.exe PID 748 wrote to memory of 1808 748 51195e0d79dacd68acd8b5bcbc356ab1.exe 51195e0d79dacd68acd8b5bcbc356ab1.exe PID 748 wrote to memory of 1808 748 51195e0d79dacd68acd8b5bcbc356ab1.exe 51195e0d79dacd68acd8b5bcbc356ab1.exe PID 748 wrote to memory of 1808 748 51195e0d79dacd68acd8b5bcbc356ab1.exe 51195e0d79dacd68acd8b5bcbc356ab1.exe PID 748 wrote to memory of 1808 748 51195e0d79dacd68acd8b5bcbc356ab1.exe 51195e0d79dacd68acd8b5bcbc356ab1.exe PID 748 wrote to memory of 2004 748 51195e0d79dacd68acd8b5bcbc356ab1.exe WerFault.exe PID 748 wrote to memory of 2004 748 51195e0d79dacd68acd8b5bcbc356ab1.exe WerFault.exe PID 748 wrote to memory of 2004 748 51195e0d79dacd68acd8b5bcbc356ab1.exe WerFault.exe PID 748 wrote to memory of 2004 748 51195e0d79dacd68acd8b5bcbc356ab1.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\51195e0d79dacd68acd8b5bcbc356ab1.exe"C:\Users\Admin\AppData\Local\Temp\51195e0d79dacd68acd8b5bcbc356ab1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\51195e0d79dacd68acd8b5bcbc356ab1.exe"C:\Users\Admin\AppData\Local\Temp\51195e0d79dacd68acd8b5bcbc356ab1.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 15602⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/748-60-0x00000000008C0000-0x00000000008C1000-memory.dmpFilesize
4KB
-
memory/748-62-0x0000000075451000-0x0000000075453000-memory.dmpFilesize
8KB
-
memory/748-63-0x0000000004930000-0x0000000004931000-memory.dmpFilesize
4KB
-
memory/748-64-0x0000000000340000-0x000000000035C000-memory.dmpFilesize
112KB
-
memory/1808-65-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1808-66-0x000000000041D460-mapping.dmp
-
memory/1808-68-0x0000000000AC0000-0x0000000000DC3000-memory.dmpFilesize
3.0MB
-
memory/2004-67-0x0000000000000000-mapping.dmp
-
memory/2004-69-0x00000000003D0000-0x00000000003D1000-memory.dmpFilesize
4KB