Analysis
-
max time kernel
123s -
max time network
131s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
08-10-2021 17:07
Static task
static1
General
-
Target
4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe
-
Size
50KB
-
MD5
9d95cf845f980370aec4ab7a815f1803
-
SHA1
a21b5d35b87a3ca35dbf313689d720c07903c9e7
-
SHA256
4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4
-
SHA512
1607ac27b7cf4c033f6b24e618939ab8a635fb44eb3801fd079494590b44ccb3720271456e6d3fd6e37f74d02128923c4bd8bb1580dbe5051547bd2dac98d0d6
Malware Config
Extracted
xloader
2.5
mexq
http://www.aliexpress-br.com/mexq/
cyebang.com
hcswwsz.com
50003008.com
yfly624.xyz
trungtamhohap.xyz
sotlbb.com
bizhan69.com
brandmty.net
fucibou.xyz
orderinformantmailer.store
nobleminers.com
divinevoid.com
quickappraisal.net
adventuretravelsworld.com
ashainitiativemp.com
ikkbs-a02.com
rd26x.com
goraeda.com
abbastanza.info
andypartridge.photography
xn--aprendes-espaol-brb.com
jrceleste.com
bestwarsawhotels.com
fospine.online
rayofdesign.online
hablamarca.com
nichellejonesrealtor.com
zamarasystem.com
thepropertygoat.com
fightfigures.com
mxconglomerate.com
elecoder.com
mabnapakhsh.com
girlspiter.club
xn--lcka2cufqed6765c4ef1x1g.xyz
cancleaningpros.com
galestorm.net
besrbee.com
sjmdesignstudio.com
kickonlines.com
generateyourart.com
promiseface.com
searchingspacespot.com
jovemmilionario.com
paomovar.com
dogiadunggiare.online
uniqued.net
glassrootsstudio.com
rabenteec.com
asistente-ti.com
xn--l6qw76agwi5rjeuzk9q.com
azapsolutions.com
wmh3gk2fzw2m.biz
districonio.com
dapekdelivery.com
vintagepaseo.com
od0aew1pox.com
iphone13promax.design
texttheruffleddaisy.com
umdasch-lagertechnik.com
growthabove.com
eltacorancherofoodtruck.com
gafoodstamps.com
mzalluom.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1308-121-0x0000000000400000-0x0000000000453000-memory.dmp xloader behavioral1/memory/1308-122-0x000000000041D4F0-mapping.dmp xloader -
Suspicious use of NtSetInformationThreadHideFromDebugger 14 IoCs
Processes:
4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exepid process 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exedescription pid process target process PID 2404 set thread context of 1308 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1312 2404 WerFault.exe 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
Processes:
4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exeWerFault.exepid process 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 1308 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 1308 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 1312 WerFault.exe 1312 WerFault.exe 1312 WerFault.exe 1312 WerFault.exe 1312 WerFault.exe 1312 WerFault.exe 1312 WerFault.exe 1312 WerFault.exe 1312 WerFault.exe 1312 WerFault.exe 1312 WerFault.exe 1312 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exeWerFault.exedescription pid process Token: SeDebugPrivilege 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe Token: SeRestorePrivilege 1312 WerFault.exe Token: SeBackupPrivilege 1312 WerFault.exe Token: SeDebugPrivilege 1312 WerFault.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exedescription pid process target process PID 2404 wrote to memory of 496 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe PID 2404 wrote to memory of 496 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe PID 2404 wrote to memory of 496 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe PID 2404 wrote to memory of 1288 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe PID 2404 wrote to memory of 1288 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe PID 2404 wrote to memory of 1288 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe PID 2404 wrote to memory of 1308 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe PID 2404 wrote to memory of 1308 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe PID 2404 wrote to memory of 1308 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe PID 2404 wrote to memory of 1308 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe PID 2404 wrote to memory of 1308 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe PID 2404 wrote to memory of 1308 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe PID 2404 wrote to memory of 1308 2404 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe 4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe"C:\Users\Admin\AppData\Local\Temp\4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe"C:\Users\Admin\AppData\Local\Temp\4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe"C:\Users\Admin\AppData\Local\Temp\4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe"C:\Users\Admin\AppData\Local\Temp\4dc95a3bcf000bee17c567dcb6047c2e523641ad704f6e677421e817440c51f4.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2404 -s 17842⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1308-121-0x0000000000400000-0x0000000000453000-memory.dmpFilesize
332KB
-
memory/1308-122-0x000000000041D4F0-mapping.dmp
-
memory/1308-123-0x0000000000F20000-0x0000000001240000-memory.dmpFilesize
3.1MB
-
memory/2404-115-0x0000000000740000-0x0000000000741000-memory.dmpFilesize
4KB
-
memory/2404-117-0x0000000004F50000-0x0000000004F51000-memory.dmpFilesize
4KB
-
memory/2404-118-0x0000000005110000-0x0000000005111000-memory.dmpFilesize
4KB
-
memory/2404-119-0x0000000005BE0000-0x0000000005C4A000-memory.dmpFilesize
424KB
-
memory/2404-120-0x00000000061C0000-0x00000000061C1000-memory.dmpFilesize
4KB