Analysis
-
max time kernel
128s -
max time network
130s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
06-11-2021 09:35
Static task
static1
Behavioral task
behavioral1
Sample
5917d602f423946e08474241e6a731a7.exe
Resource
win7-en-20211104
General
-
Target
5917d602f423946e08474241e6a731a7.exe
-
Size
438KB
-
MD5
5917d602f423946e08474241e6a731a7
-
SHA1
3cebe4b56204cee8b1eb168840bccf439f2d09b0
-
SHA256
e86bb6d494e6720f0eaecd5a18c8e7c55324a1a301c5111f98a94d82fe295574
-
SHA512
5ec95638d00578cf4c1b4e0be6ffb08f78af0419efea4eef3fab686fa637db3b2e836af6ab63f36aa33f7b2df78c5a22dab02fff6ae346831f81af590a11f947
Malware Config
Extracted
xloader
2.5
noha
http://www.mglracing.com/noha/
iphone13promax.support
trailer-racks.xyz
overseaspoolservice.com
r2d2u.com
dawajeju.com
nextgenproxyvote.com
xn--vhqp8mm8dbtz.group
commonsenserisk.com
cmcqgxtyd.com
data2form.com
bois-applique.com
originallollipop.com
lj0008lj.net
spfldvaccineday.info
phalcosnusa.com
llcmastermachine.com
onlyforu14.rest
bestmarketingautomations.com
officialswitchmusic.com
thepretenseofjustice.com
authenticradio.net
standardizedsubmissions.com
aegnoshipping.com
478762.com
inclusionchecks.com
number-is-04.net
yyds9527.space
big-thought.com
controle2.email
groupninemed.com
fisworkdeck.com
imonbayazid.com
pixlrz.com
headlinebysmp.com
simulatefuck.com
efficientmother.com
wkshops22012.xyz
artehamburguer.com
beauallenpoetry.com
bonairemarathon.com
sprintfingers.com
ranbix.com
denghaoxin.club
jillianvansice.com
purpledge.com
mariadimitropoulou.com
surveyplanetgroup.tech
apocalyptoapertureserrature.net
cbd-cannabis.store
dirtcheapfire.com
xn--zbss74a16j.xn--czru2d
auth-appsgo.com
estchemdelat.space
kweeka.money
marketingtipsntricks.com
dayandwestbeauty.com
paddlercentral.com
nongminle.net
aodesai.store
evtasimaucretleri.com
micj7873.com
unarecord.com
zsnhviig.xyz
hallmark-transport.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/1632-124-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1632-125-0x000000000041D490-mapping.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5917d602f423946e08474241e6a731a7.exedescription pid process target process PID 2504 set thread context of 1632 2504 5917d602f423946e08474241e6a731a7.exe 5917d602f423946e08474241e6a731a7.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
5917d602f423946e08474241e6a731a7.exepid process 1632 5917d602f423946e08474241e6a731a7.exe 1632 5917d602f423946e08474241e6a731a7.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
5917d602f423946e08474241e6a731a7.exedescription pid process target process PID 2504 wrote to memory of 1632 2504 5917d602f423946e08474241e6a731a7.exe 5917d602f423946e08474241e6a731a7.exe PID 2504 wrote to memory of 1632 2504 5917d602f423946e08474241e6a731a7.exe 5917d602f423946e08474241e6a731a7.exe PID 2504 wrote to memory of 1632 2504 5917d602f423946e08474241e6a731a7.exe 5917d602f423946e08474241e6a731a7.exe PID 2504 wrote to memory of 1632 2504 5917d602f423946e08474241e6a731a7.exe 5917d602f423946e08474241e6a731a7.exe PID 2504 wrote to memory of 1632 2504 5917d602f423946e08474241e6a731a7.exe 5917d602f423946e08474241e6a731a7.exe PID 2504 wrote to memory of 1632 2504 5917d602f423946e08474241e6a731a7.exe 5917d602f423946e08474241e6a731a7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5917d602f423946e08474241e6a731a7.exe"C:\Users\Admin\AppData\Local\Temp\5917d602f423946e08474241e6a731a7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\5917d602f423946e08474241e6a731a7.exe"C:\Users\Admin\AppData\Local\Temp\5917d602f423946e08474241e6a731a7.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1632-124-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1632-125-0x000000000041D490-mapping.dmp
-
memory/1632-126-0x0000000001300000-0x0000000001620000-memory.dmpFilesize
3.1MB
-
memory/2504-115-0x0000000000530000-0x0000000000531000-memory.dmpFilesize
4KB
-
memory/2504-117-0x0000000005400000-0x0000000005401000-memory.dmpFilesize
4KB
-
memory/2504-118-0x0000000004FA0000-0x0000000004FA1000-memory.dmpFilesize
4KB
-
memory/2504-119-0x0000000004F20000-0x0000000004F21000-memory.dmpFilesize
4KB
-
memory/2504-120-0x0000000004F00000-0x00000000053FE000-memory.dmpFilesize
5.0MB
-
memory/2504-121-0x00000000053E0000-0x00000000053E6000-memory.dmpFilesize
24KB
-
memory/2504-122-0x00000000076B0000-0x00000000076B1000-memory.dmpFilesize
4KB
-
memory/2504-123-0x0000000007660000-0x00000000076AC000-memory.dmpFilesize
304KB