Analysis
-
max time kernel
110s -
max time network
121s -
platform
windows10_x64 -
resource
win10-en-20211104 -
submitted
13-11-2021 22:15
Static task
static1
General
-
Target
e7cabf681ce8989913c4c78c8f539a791c852e0e637f359d2a399b91dc676506.exe
-
Size
700KB
-
MD5
abbd913fabcce80fe6c14f8103800378
-
SHA1
bbfd5bd99597e246fe61dc8fa4cbaa99c1808b1b
-
SHA256
e7cabf681ce8989913c4c78c8f539a791c852e0e637f359d2a399b91dc676506
-
SHA512
7eb56ebeac274545ccbf91ed01e1290ccd168b5b506a027993745ad6d8255ed652d32c1570218aca10434c40c7218f5e088e8d2021b30f8eef674d22dcc64655
Malware Config
Extracted
xloader
2.5
n58i
http://www.makingitreignz.com/n58i/
charlottebishop.com
afafshawwabibi.com
salomesac.com
albaelectric.info
ashcm.com
cxlgroups.com
kbittesting.com
stogelair.com
dgredg.com
smokersoutletinc.com
gdmo112.com
innovationmotive.xyz
outbarter.info
abevegege.online
peterjhill.com
fubosportsbetting.com
probristow.com
despirad.com
halloweengeneral.com
milesofsmileskinder.com
luly-boo.com
noordinaryinsurance.com
buildertest342.com
drivelingo.com
idaivos.com
ebonycamsworld.com
mooknationmedia.com
brenthagenbuch.net
rwatyz40s.xyz
ceramicfinishing.com
maliya-interiors.com
ghlmadesimple.com
4546768.rest
povxxxvideos.com
szqkjy.com
1rmg.tech
miskarangsimpang.xyz
jgjec.com
preventpor.xyz
mcdonnellanalytics.store
dsknit.com
high-clicks2.com
niceauto.mobi
kadenselection.com
firuzekahve.com
emiliaclarkedaily.net
trianglepost.press
wellorise.store
bolder.equipment
metropolitanprolifestyle.com
berthagiles.top
tanba-dekanshofarm.net
publicitysocial.com
kosener.com
atelierdesignstudio.com
solosix.club
triimio.com
sukoteishu.com
industrialsblockxchange.com
jsyonghui.com
aspenceramica.com
daikondefense.com
estudioamlegal.com
abetttermountbethel.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3084-125-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/3084-126-0x000000000041D470-mapping.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
e7cabf681ce8989913c4c78c8f539a791c852e0e637f359d2a399b91dc676506.exedescription pid process target process PID 2568 set thread context of 3084 2568 e7cabf681ce8989913c4c78c8f539a791c852e0e637f359d2a399b91dc676506.exe e7cabf681ce8989913c4c78c8f539a791c852e0e637f359d2a399b91dc676506.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
e7cabf681ce8989913c4c78c8f539a791c852e0e637f359d2a399b91dc676506.exepid process 3084 e7cabf681ce8989913c4c78c8f539a791c852e0e637f359d2a399b91dc676506.exe 3084 e7cabf681ce8989913c4c78c8f539a791c852e0e637f359d2a399b91dc676506.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
e7cabf681ce8989913c4c78c8f539a791c852e0e637f359d2a399b91dc676506.exedescription pid process Token: SeDebugPrivilege 2568 e7cabf681ce8989913c4c78c8f539a791c852e0e637f359d2a399b91dc676506.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
e7cabf681ce8989913c4c78c8f539a791c852e0e637f359d2a399b91dc676506.exedescription pid process target process PID 2568 wrote to memory of 3084 2568 e7cabf681ce8989913c4c78c8f539a791c852e0e637f359d2a399b91dc676506.exe e7cabf681ce8989913c4c78c8f539a791c852e0e637f359d2a399b91dc676506.exe PID 2568 wrote to memory of 3084 2568 e7cabf681ce8989913c4c78c8f539a791c852e0e637f359d2a399b91dc676506.exe e7cabf681ce8989913c4c78c8f539a791c852e0e637f359d2a399b91dc676506.exe PID 2568 wrote to memory of 3084 2568 e7cabf681ce8989913c4c78c8f539a791c852e0e637f359d2a399b91dc676506.exe e7cabf681ce8989913c4c78c8f539a791c852e0e637f359d2a399b91dc676506.exe PID 2568 wrote to memory of 3084 2568 e7cabf681ce8989913c4c78c8f539a791c852e0e637f359d2a399b91dc676506.exe e7cabf681ce8989913c4c78c8f539a791c852e0e637f359d2a399b91dc676506.exe PID 2568 wrote to memory of 3084 2568 e7cabf681ce8989913c4c78c8f539a791c852e0e637f359d2a399b91dc676506.exe e7cabf681ce8989913c4c78c8f539a791c852e0e637f359d2a399b91dc676506.exe PID 2568 wrote to memory of 3084 2568 e7cabf681ce8989913c4c78c8f539a791c852e0e637f359d2a399b91dc676506.exe e7cabf681ce8989913c4c78c8f539a791c852e0e637f359d2a399b91dc676506.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7cabf681ce8989913c4c78c8f539a791c852e0e637f359d2a399b91dc676506.exe"C:\Users\Admin\AppData\Local\Temp\e7cabf681ce8989913c4c78c8f539a791c852e0e637f359d2a399b91dc676506.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\e7cabf681ce8989913c4c78c8f539a791c852e0e637f359d2a399b91dc676506.exe"C:\Users\Admin\AppData\Local\Temp\e7cabf681ce8989913c4c78c8f539a791c852e0e637f359d2a399b91dc676506.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2568-118-0x0000000000280000-0x0000000000281000-memory.dmpFilesize
4KB
-
memory/2568-120-0x0000000005430000-0x0000000005431000-memory.dmpFilesize
4KB
-
memory/2568-121-0x0000000004D60000-0x0000000004D61000-memory.dmpFilesize
4KB
-
memory/2568-122-0x0000000004E00000-0x0000000004E01000-memory.dmpFilesize
4KB
-
memory/2568-123-0x0000000004D40000-0x0000000004D41000-memory.dmpFilesize
4KB
-
memory/2568-124-0x0000000004F20000-0x0000000004F21000-memory.dmpFilesize
4KB
-
memory/3084-125-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3084-126-0x000000000041D470-mapping.dmp
-
memory/3084-127-0x0000000000E10000-0x0000000001130000-memory.dmpFilesize
3.1MB