Analysis
-
max time kernel
113s -
max time network
118s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
29-10-2021 21:39
Static task
static1
General
-
Target
eed781a42769761d30787cecd662c5b6ba70589724a456d09ae008e1bd68835f.exe
-
Size
375KB
-
MD5
1463a8e3cbd8b63c709495a91ff95506
-
SHA1
d9840f1e6c9e94f6ec2f55703e2dfdd49598f89c
-
SHA256
eed781a42769761d30787cecd662c5b6ba70589724a456d09ae008e1bd68835f
-
SHA512
924e9444779ac3e9be6196bd58f2cef4aae3f2230694fe1ad0777efe079c324b072a1e98f0bb1ca077f099739c21057f1fe53c3950384291116c742aade445a9
Malware Config
Extracted
xloader
2.5
euzn
http://www.heser.net/euzn/
235296tyc.com
gold12guide.art
baibuaherb.com
weberwines.tax
chezvitoria.com
aidenb.tech
pitchdeckservice.com
surgeryforfdf.xyz
workunvaccinated.com
hrtaro.com
yourotcs.com
sonimultispecialityclinic.com
consultantadvisors.com
pentesting-consulting.com
dantechs.digital
longshifa.online
taweilai.net
imyusuke.com
cashndashfinancial.com
fasiglimt.quest
jakital.com
graywolfdesign.com
pepeavatar.com
predixlogisticscourier.com
football-transfer-news.pro
herbalmedication.xyz
esd66.com
janesgalant.quest
abcrefreshments.com
chaoxy.com
rediscoveringyouhealing.com
mcrjadr5.xyz
n4sins.com
faithful-presence.com
013yu.xyz
isystemslanka.com
newbeautydk.com
ethiopia-info.com
hgaffiliates.net
anodynemedicalmassage.com
esohgroup.com
clinicamonicabarros.com
rafathecook.com
londonescort.xyz
dreamites.com
webtiyan.com
cnnautorepair.com
soposhshop.com
aarohaninsight2021.com
arceprojects.com
mecasso.store
mirai-energy.com
barwg.com
angeescollections-shop.com
xinlishiqiaoqiao.xyz
linuxsauce.net
dirbn.com
anandiaper.xyz
blackpanther.online
livinwoodbridgefarms.com
diepraxiskommunikation.com
radiosaptshahid.com
gofieldtest.com
minxtales.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1828-124-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1828-125-0x000000000041D420-mapping.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
eed781a42769761d30787cecd662c5b6ba70589724a456d09ae008e1bd68835f.exedescription pid process target process PID 1876 set thread context of 1828 1876 eed781a42769761d30787cecd662c5b6ba70589724a456d09ae008e1bd68835f.exe eed781a42769761d30787cecd662c5b6ba70589724a456d09ae008e1bd68835f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
eed781a42769761d30787cecd662c5b6ba70589724a456d09ae008e1bd68835f.exepid process 1828 eed781a42769761d30787cecd662c5b6ba70589724a456d09ae008e1bd68835f.exe 1828 eed781a42769761d30787cecd662c5b6ba70589724a456d09ae008e1bd68835f.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
eed781a42769761d30787cecd662c5b6ba70589724a456d09ae008e1bd68835f.exedescription pid process target process PID 1876 wrote to memory of 1828 1876 eed781a42769761d30787cecd662c5b6ba70589724a456d09ae008e1bd68835f.exe eed781a42769761d30787cecd662c5b6ba70589724a456d09ae008e1bd68835f.exe PID 1876 wrote to memory of 1828 1876 eed781a42769761d30787cecd662c5b6ba70589724a456d09ae008e1bd68835f.exe eed781a42769761d30787cecd662c5b6ba70589724a456d09ae008e1bd68835f.exe PID 1876 wrote to memory of 1828 1876 eed781a42769761d30787cecd662c5b6ba70589724a456d09ae008e1bd68835f.exe eed781a42769761d30787cecd662c5b6ba70589724a456d09ae008e1bd68835f.exe PID 1876 wrote to memory of 1828 1876 eed781a42769761d30787cecd662c5b6ba70589724a456d09ae008e1bd68835f.exe eed781a42769761d30787cecd662c5b6ba70589724a456d09ae008e1bd68835f.exe PID 1876 wrote to memory of 1828 1876 eed781a42769761d30787cecd662c5b6ba70589724a456d09ae008e1bd68835f.exe eed781a42769761d30787cecd662c5b6ba70589724a456d09ae008e1bd68835f.exe PID 1876 wrote to memory of 1828 1876 eed781a42769761d30787cecd662c5b6ba70589724a456d09ae008e1bd68835f.exe eed781a42769761d30787cecd662c5b6ba70589724a456d09ae008e1bd68835f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\eed781a42769761d30787cecd662c5b6ba70589724a456d09ae008e1bd68835f.exe"C:\Users\Admin\AppData\Local\Temp\eed781a42769761d30787cecd662c5b6ba70589724a456d09ae008e1bd68835f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\eed781a42769761d30787cecd662c5b6ba70589724a456d09ae008e1bd68835f.exe"C:\Users\Admin\AppData\Local\Temp\eed781a42769761d30787cecd662c5b6ba70589724a456d09ae008e1bd68835f.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1828-124-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1828-125-0x000000000041D420-mapping.dmp
-
memory/1828-126-0x00000000010B0000-0x00000000013D0000-memory.dmpFilesize
3.1MB
-
memory/1876-115-0x0000000000C70000-0x0000000000C71000-memory.dmpFilesize
4KB
-
memory/1876-117-0x0000000005A40000-0x0000000005A41000-memory.dmpFilesize
4KB
-
memory/1876-118-0x00000000055E0000-0x00000000055E1000-memory.dmpFilesize
4KB
-
memory/1876-119-0x0000000005540000-0x0000000005A3E000-memory.dmpFilesize
5.0MB
-
memory/1876-120-0x0000000005570000-0x0000000005571000-memory.dmpFilesize
4KB
-
memory/1876-121-0x00000000059F0000-0x00000000059F6000-memory.dmpFilesize
24KB
-
memory/1876-122-0x0000000008EB0000-0x0000000008EB1000-memory.dmpFilesize
4KB
-
memory/1876-123-0x0000000008F50000-0x0000000008F9A000-memory.dmpFilesize
296KB