Analysis
-
max time kernel
152s -
max time network
153s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
09-11-2021 12:59
Static task
static1
Behavioral task
behavioral1
Sample
SOA & INV FOR OCT'21.exe
Resource
win7-en-20211104
General
-
Target
SOA & INV FOR OCT'21.exe
-
Size
426KB
-
MD5
6807709a74cde5eafc0f8c668a13be81
-
SHA1
460279d69c1ddd6d36ed25e7985e9e2bbad7ad65
-
SHA256
696ba6fed0994cac4e47993f336820499cd3faf3ce4713d4e0be0ea0d91748af
-
SHA512
bd75b2f3aaa316028e489eec30df49cd02ce6320ba3faebe24ac88f177434ca45638cb7118972ff86e9c16d2a44caf1cb400bcc42363fc9de7cbf96dd872f032
Malware Config
Extracted
xloader
2.5
u0n0
http://www.52xjg3.xyz/u0n0/
learnwithvr.net
minismi2.com
slimfitbottle.com
gzartisan.com
fullfamilyclub.com
adaptationstudios.com
domynt.com
aboydnfuid.com
dirtroaddesigns.net
timhortons-ca.xyz
gladiator-111.com
breakingza.com
njjbds.com
keithrgordon.com
litestore365.host
unichromegame.com
wundversorgung-tirol.com
wholistic-choice.com
shingletownrrn.com
kapikenya.com
kermmehienon.quest
harunowellness.com
avrknastyrke.quest
mpujadas.com
bonbyk.xyz
twozilla.com
abrahamguestacademy.com
canwasysce.com
cangshu76.xyz
clinicadeconsultanta.com
fazdesignmalta.com
localcommunityspace.com
subdlt.com
gothambody.net
tongtongticket.com
giadinhmarket.xyz
jessaniholdings.com
sebika.com
infinitygamesonline.net
denton4.com
ctenemuhos.quest
governerdsummerfun.com
69988.club
2pnlx3.biz
radhikamobilerajasen.online
myborntoshare.com
mdkfsdf.info
dj6688a.com
feelinthorny.com
minimart.digital
offprize.xyz
niallsinclair.com
iclouds.today
xn--80ajy8a.xn--80asehdb
marionutrishop.com
yanglaowenku.com
youngmotorist.com
unavidaparaserfeliz.com
linknhomkin.com
webwarez.net
sabrinaxmendes.com
nurix.agency
bancosabadellnow.com
totalpopsociety.com
Signatures
-
Xloader Payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/776-127-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/776-128-0x000000000041D440-mapping.dmp xloader behavioral2/memory/776-131-0x0000000000A10000-0x0000000000B5A000-memory.dmp xloader behavioral2/memory/2268-136-0x0000000000530000-0x0000000000559000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
SOA & INV FOR OCT'21.exeSOA & INV FOR OCT'21.exesystray.exedescription pid process target process PID 2720 set thread context of 776 2720 SOA & INV FOR OCT'21.exe SOA & INV FOR OCT'21.exe PID 776 set thread context of 2416 776 SOA & INV FOR OCT'21.exe Explorer.EXE PID 2268 set thread context of 2416 2268 systray.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 44 IoCs
Processes:
SOA & INV FOR OCT'21.exeSOA & INV FOR OCT'21.exesystray.exepid process 2720 SOA & INV FOR OCT'21.exe 2720 SOA & INV FOR OCT'21.exe 776 SOA & INV FOR OCT'21.exe 776 SOA & INV FOR OCT'21.exe 776 SOA & INV FOR OCT'21.exe 776 SOA & INV FOR OCT'21.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe 2268 systray.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2416 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
SOA & INV FOR OCT'21.exesystray.exepid process 776 SOA & INV FOR OCT'21.exe 776 SOA & INV FOR OCT'21.exe 776 SOA & INV FOR OCT'21.exe 2268 systray.exe 2268 systray.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
SOA & INV FOR OCT'21.exeSOA & INV FOR OCT'21.exesystray.exedescription pid process Token: SeDebugPrivilege 2720 SOA & INV FOR OCT'21.exe Token: SeDebugPrivilege 776 SOA & INV FOR OCT'21.exe Token: SeDebugPrivilege 2268 systray.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
SOA & INV FOR OCT'21.exeExplorer.EXEsystray.exedescription pid process target process PID 2720 wrote to memory of 772 2720 SOA & INV FOR OCT'21.exe SOA & INV FOR OCT'21.exe PID 2720 wrote to memory of 772 2720 SOA & INV FOR OCT'21.exe SOA & INV FOR OCT'21.exe PID 2720 wrote to memory of 772 2720 SOA & INV FOR OCT'21.exe SOA & INV FOR OCT'21.exe PID 2720 wrote to memory of 776 2720 SOA & INV FOR OCT'21.exe SOA & INV FOR OCT'21.exe PID 2720 wrote to memory of 776 2720 SOA & INV FOR OCT'21.exe SOA & INV FOR OCT'21.exe PID 2720 wrote to memory of 776 2720 SOA & INV FOR OCT'21.exe SOA & INV FOR OCT'21.exe PID 2720 wrote to memory of 776 2720 SOA & INV FOR OCT'21.exe SOA & INV FOR OCT'21.exe PID 2720 wrote to memory of 776 2720 SOA & INV FOR OCT'21.exe SOA & INV FOR OCT'21.exe PID 2720 wrote to memory of 776 2720 SOA & INV FOR OCT'21.exe SOA & INV FOR OCT'21.exe PID 2416 wrote to memory of 2268 2416 Explorer.EXE systray.exe PID 2416 wrote to memory of 2268 2416 Explorer.EXE systray.exe PID 2416 wrote to memory of 2268 2416 Explorer.EXE systray.exe PID 2268 wrote to memory of 3192 2268 systray.exe cmd.exe PID 2268 wrote to memory of 3192 2268 systray.exe cmd.exe PID 2268 wrote to memory of 3192 2268 systray.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\SOA & INV FOR OCT'21.exe"C:\Users\Admin\AppData\Local\Temp\SOA & INV FOR OCT'21.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\SOA & INV FOR OCT'21.exe"C:\Users\Admin\AppData\Local\Temp\SOA & INV FOR OCT'21.exe"3⤵PID:772
-
-
C:\Users\Admin\AppData\Local\Temp\SOA & INV FOR OCT'21.exe"C:\Users\Admin\AppData\Local\Temp\SOA & INV FOR OCT'21.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:776
-
-
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\SOA & INV FOR OCT'21.exe"3⤵PID:3192
-
-