Analysis
-
max time kernel
120s -
max time network
129s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
11-11-2021 18:41
Static task
static1
Behavioral task
behavioral1
Sample
1dadf13b8e0441e370eacb0b774c64e9.exe
Resource
win7-en-20211104
General
-
Target
1dadf13b8e0441e370eacb0b774c64e9.exe
-
Size
428KB
-
MD5
1dadf13b8e0441e370eacb0b774c64e9
-
SHA1
ad139b332854cdb6afb1c25548c72e5f59cda993
-
SHA256
211285d0278cfa608b2f7e0280641bdb07816ddca9fb7b8d70d9f0c8cf7bdb6e
-
SHA512
e086f7238871070896e2454e1ab6c6f7248039742d67089f8e7c14fabbc890ca23b3ca1d240881f386af316f15f9192f20df85b15bf4d9c7b27ce4305098eb50
Malware Config
Extracted
xloader
2.5
unzn
http://www.davanamays.com/unzn/
xiulf.com
highcountrymortar.com
523561.com
marketingagency.tools
ganmovie.net
nationaalcontactpunt.com
sirrbter.com
begizas.xyz
missimi-fashion.com
munixc.info
daas.support
spaceworbc.com
faithtruthresolve.com
gymkub.com
thegrayverse.xyz
artisanmakefurniture.com
029tryy.com
ijuubx.biz
iphone13promax.club
techuniversus.com
samrgov.xyz
grownupcurl.com
sj0755.net
beekeeperkit.com
richessesabondantes.com
xclgjgjh.net
webworkscork.com
vedepviet365.com
bretabeameven.com
cdzsmhw.com
clearperspective.biz
tigrg5g784sh.biz
bbezan011.xyz
mycar.store
mansooralobeidli.com
ascensionmemberszoom.com
unlimitedrehab.com
wozka.top
askylarkgoods.com
rj793.com
prosvalor.com
primetimeexpress.com
boixosnoisperu.com
mmasportgear.com
concertiranian.net
hyponymys.info
maila.one
yti0fyic.xyz
shashiprayag.com
speedprosmotorsports.com
westchestercountyjunkcars.com
patienceinmypocket.com
rausachbaoloc.com
plexregroup.com
outsydercs.com
foodandflour.com
lenacrypto.xyz
homeservicetoday.net
marthaperry.com
vmtcyd4q8.com
shamefulguys.com
loccssol.store
gnarledportra.xyz
042atk.xyz
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3640-128-0x000000000041D430-mapping.dmp xloader behavioral2/memory/3640-127-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
1dadf13b8e0441e370eacb0b774c64e9.exedescription pid process target process PID 1852 set thread context of 3640 1852 1dadf13b8e0441e370eacb0b774c64e9.exe 1dadf13b8e0441e370eacb0b774c64e9.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
1dadf13b8e0441e370eacb0b774c64e9.exe1dadf13b8e0441e370eacb0b774c64e9.exepid process 1852 1dadf13b8e0441e370eacb0b774c64e9.exe 1852 1dadf13b8e0441e370eacb0b774c64e9.exe 3640 1dadf13b8e0441e370eacb0b774c64e9.exe 3640 1dadf13b8e0441e370eacb0b774c64e9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
1dadf13b8e0441e370eacb0b774c64e9.exedescription pid process Token: SeDebugPrivilege 1852 1dadf13b8e0441e370eacb0b774c64e9.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
1dadf13b8e0441e370eacb0b774c64e9.exedescription pid process target process PID 1852 wrote to memory of 3616 1852 1dadf13b8e0441e370eacb0b774c64e9.exe 1dadf13b8e0441e370eacb0b774c64e9.exe PID 1852 wrote to memory of 3616 1852 1dadf13b8e0441e370eacb0b774c64e9.exe 1dadf13b8e0441e370eacb0b774c64e9.exe PID 1852 wrote to memory of 3616 1852 1dadf13b8e0441e370eacb0b774c64e9.exe 1dadf13b8e0441e370eacb0b774c64e9.exe PID 1852 wrote to memory of 3640 1852 1dadf13b8e0441e370eacb0b774c64e9.exe 1dadf13b8e0441e370eacb0b774c64e9.exe PID 1852 wrote to memory of 3640 1852 1dadf13b8e0441e370eacb0b774c64e9.exe 1dadf13b8e0441e370eacb0b774c64e9.exe PID 1852 wrote to memory of 3640 1852 1dadf13b8e0441e370eacb0b774c64e9.exe 1dadf13b8e0441e370eacb0b774c64e9.exe PID 1852 wrote to memory of 3640 1852 1dadf13b8e0441e370eacb0b774c64e9.exe 1dadf13b8e0441e370eacb0b774c64e9.exe PID 1852 wrote to memory of 3640 1852 1dadf13b8e0441e370eacb0b774c64e9.exe 1dadf13b8e0441e370eacb0b774c64e9.exe PID 1852 wrote to memory of 3640 1852 1dadf13b8e0441e370eacb0b774c64e9.exe 1dadf13b8e0441e370eacb0b774c64e9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1dadf13b8e0441e370eacb0b774c64e9.exe"C:\Users\Admin\AppData\Local\Temp\1dadf13b8e0441e370eacb0b774c64e9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1dadf13b8e0441e370eacb0b774c64e9.exe"C:\Users\Admin\AppData\Local\Temp\1dadf13b8e0441e370eacb0b774c64e9.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\1dadf13b8e0441e370eacb0b774c64e9.exe"C:\Users\Admin\AppData\Local\Temp\1dadf13b8e0441e370eacb0b774c64e9.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1852-118-0x0000000000970000-0x0000000000971000-memory.dmpFilesize
4KB
-
memory/1852-120-0x0000000005680000-0x0000000005681000-memory.dmpFilesize
4KB
-
memory/1852-121-0x0000000005220000-0x0000000005221000-memory.dmpFilesize
4KB
-
memory/1852-123-0x0000000005390000-0x0000000005391000-memory.dmpFilesize
4KB
-
memory/1852-122-0x0000000005180000-0x000000000567E000-memory.dmpFilesize
5.0MB
-
memory/1852-124-0x00000000054D0000-0x00000000054D7000-memory.dmpFilesize
28KB
-
memory/1852-125-0x0000000005FA0000-0x0000000005FA1000-memory.dmpFilesize
4KB
-
memory/1852-126-0x0000000006040000-0x0000000006086000-memory.dmpFilesize
280KB
-
memory/3640-128-0x000000000041D430-mapping.dmp
-
memory/3640-127-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3640-129-0x00000000018F0000-0x0000000001C10000-memory.dmpFilesize
3.1MB