Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-en-20211014 -
submitted
23-11-2021 11:01
Static task
static1
Behavioral task
behavioral1
Sample
c01d5c630294241db988b68176f2d00f.exe
Resource
win7-en-20211014
General
-
Target
c01d5c630294241db988b68176f2d00f.exe
-
Size
473KB
-
MD5
c01d5c630294241db988b68176f2d00f
-
SHA1
2f53b05dcc5b3d5b13457f7452c4626f647fb887
-
SHA256
e65d1335f3495f7d469bea81683253ee0845b3b3980cfaea09c4a7837a6c66eb
-
SHA512
144d9633b19611a98af9858a8a6868fd3e023821de9d221428b9d91ebff83a1a3e6c97c3c8b4c22baff610e56ce641787d49fe65cffec973a140fef44a3f6c5a
Malware Config
Extracted
xloader
2.5
ef6c
http://www.fis.photos/ef6c/
gicaredocs.com
govusergroup.com
conversationspit.com
brondairy.com
rjtherealest.com
xn--9m1bq8wgkag3rjvb.com
mylori.net
softandcute.store
ahljsm.com
shacksolid.com
weekendmusecollection.com
gaminghallarna.net
pgonline111.online
44mpt.xyz
ambrandt.com
eddytattoo.com
blendeqes.com
upinmyfeels.com
lacucinadesign.com
docomoau.xyz
xn--90armbk7e.online
xzq585858.net
kidzgovroom.com
lhznqyl.press
publicationsplace.com
jakante.com
csspadding.com
test-testjisdnsec.store
lafabriqueabeilleassurances.com
clf010.com
buybabysnuggle.com
uzmdrmustafaalperaykanat.com
levanttradegroup.com
arcflorals.com
kinglot2499.com
freekagyans.com
region10group.gmbh
yeyelm744.com
thehomedesigncentre.com
vngc.xyz
szesdkj.com
charlottewright.online
planetgreennetwork.com
pacifica7.com
analogueadapt.com
sensorypantry.com
narbaal.com
restaurant-utopia.xyz
golnay.com
szyyglass.com
redelirevearyseuiop.xyz
goldsteelconstruction.com
discovercotswoldcottages.com
geniuseven.net
apricitee.com
stopmoshenik.online
ya2gh.com
instatechnovelz.com
dbe648.com
seifjuban.com
conquershirts.store
totalcovidtravel.com
pamperotrabajo.com
satellitphonestore.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1604-63-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1604-64-0x000000000041D3D0-mapping.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
c01d5c630294241db988b68176f2d00f.exedescription pid process target process PID 552 set thread context of 1604 552 c01d5c630294241db988b68176f2d00f.exe c01d5c630294241db988b68176f2d00f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
c01d5c630294241db988b68176f2d00f.exec01d5c630294241db988b68176f2d00f.exepid process 552 c01d5c630294241db988b68176f2d00f.exe 1604 c01d5c630294241db988b68176f2d00f.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
c01d5c630294241db988b68176f2d00f.exedescription pid process Token: SeDebugPrivilege 552 c01d5c630294241db988b68176f2d00f.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
c01d5c630294241db988b68176f2d00f.exedescription pid process target process PID 552 wrote to memory of 808 552 c01d5c630294241db988b68176f2d00f.exe c01d5c630294241db988b68176f2d00f.exe PID 552 wrote to memory of 808 552 c01d5c630294241db988b68176f2d00f.exe c01d5c630294241db988b68176f2d00f.exe PID 552 wrote to memory of 808 552 c01d5c630294241db988b68176f2d00f.exe c01d5c630294241db988b68176f2d00f.exe PID 552 wrote to memory of 808 552 c01d5c630294241db988b68176f2d00f.exe c01d5c630294241db988b68176f2d00f.exe PID 552 wrote to memory of 1604 552 c01d5c630294241db988b68176f2d00f.exe c01d5c630294241db988b68176f2d00f.exe PID 552 wrote to memory of 1604 552 c01d5c630294241db988b68176f2d00f.exe c01d5c630294241db988b68176f2d00f.exe PID 552 wrote to memory of 1604 552 c01d5c630294241db988b68176f2d00f.exe c01d5c630294241db988b68176f2d00f.exe PID 552 wrote to memory of 1604 552 c01d5c630294241db988b68176f2d00f.exe c01d5c630294241db988b68176f2d00f.exe PID 552 wrote to memory of 1604 552 c01d5c630294241db988b68176f2d00f.exe c01d5c630294241db988b68176f2d00f.exe PID 552 wrote to memory of 1604 552 c01d5c630294241db988b68176f2d00f.exe c01d5c630294241db988b68176f2d00f.exe PID 552 wrote to memory of 1604 552 c01d5c630294241db988b68176f2d00f.exe c01d5c630294241db988b68176f2d00f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c01d5c630294241db988b68176f2d00f.exe"C:\Users\Admin\AppData\Local\Temp\c01d5c630294241db988b68176f2d00f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\c01d5c630294241db988b68176f2d00f.exe"C:\Users\Admin\AppData\Local\Temp\c01d5c630294241db988b68176f2d00f.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\c01d5c630294241db988b68176f2d00f.exe"C:\Users\Admin\AppData\Local\Temp\c01d5c630294241db988b68176f2d00f.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/552-55-0x0000000000970000-0x0000000000971000-memory.dmpFilesize
4KB
-
memory/552-57-0x0000000076431000-0x0000000076433000-memory.dmpFilesize
8KB
-
memory/552-58-0x0000000004890000-0x0000000004891000-memory.dmpFilesize
4KB
-
memory/552-59-0x0000000000560000-0x0000000000564000-memory.dmpFilesize
16KB
-
memory/552-60-0x0000000004A70000-0x0000000004AC9000-memory.dmpFilesize
356KB
-
memory/1604-61-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1604-62-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1604-63-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1604-64-0x000000000041D3D0-mapping.dmp
-
memory/1604-65-0x00000000009F0000-0x0000000000CF3000-memory.dmpFilesize
3.0MB