Analysis
-
max time kernel
111s -
max time network
120s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
24-11-2021 08:02
Static task
static1
General
-
Target
25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe
-
Size
525KB
-
MD5
2047db38e2d0017545a2842b5266b9ad
-
SHA1
298b391c34e934bda7808a54e601b6c64dfba05c
-
SHA256
25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b
-
SHA512
42301389bb71daf31c8ac50640eee94a6e7ecef85e07e7ff3f78d3a6e69eb68207ffadb50cc417bf724ce124c6c21e7eb16f1baaf9fb05c1fbabae07d1481fd7
Malware Config
Extracted
xloader
2.5
u0n0
http://www.52xjg3.xyz/u0n0/
learnwithvr.net
minismi2.com
slimfitbottle.com
gzartisan.com
fullfamilyclub.com
adaptationstudios.com
domynt.com
aboydnfuid.com
dirtroaddesigns.net
timhortons-ca.xyz
gladiator-111.com
breakingza.com
njjbds.com
keithrgordon.com
litestore365.host
unichromegame.com
wundversorgung-tirol.com
wholistic-choice.com
shingletownrrn.com
kapikenya.com
kermmehienon.quest
harunowellness.com
avrknastyrke.quest
mpujadas.com
bonbyk.xyz
twozilla.com
abrahamguestacademy.com
canwasysce.com
cangshu76.xyz
clinicadeconsultanta.com
fazdesignmalta.com
localcommunityspace.com
subdlt.com
gothambody.net
tongtongticket.com
giadinhmarket.xyz
jessaniholdings.com
sebika.com
infinitygamesonline.net
denton4.com
ctenemuhos.quest
governerdsummerfun.com
69988.club
2pnlx3.biz
radhikamobilerajasen.online
myborntoshare.com
mdkfsdf.info
dj6688a.com
feelinthorny.com
minimart.digital
offprize.xyz
niallsinclair.com
iclouds.today
xn--80ajy8a.xn--80asehdb
marionutrishop.com
yanglaowenku.com
youngmotorist.com
unavidaparaserfeliz.com
linknhomkin.com
webwarez.net
sabrinaxmendes.com
nurix.agency
bancosabadellnow.com
totalpopsociety.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1800-127-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1800-128-0x000000000041D440-mapping.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exedescription pid process target process PID 3744 set thread context of 1800 3744 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exepid process 3744 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe 3744 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe 3744 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe 3744 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe 1800 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe 1800 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exedescription pid process Token: SeDebugPrivilege 3744 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exedescription pid process target process PID 3744 wrote to memory of 3204 3744 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe PID 3744 wrote to memory of 3204 3744 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe PID 3744 wrote to memory of 3204 3744 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe PID 3744 wrote to memory of 2804 3744 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe PID 3744 wrote to memory of 2804 3744 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe PID 3744 wrote to memory of 2804 3744 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe PID 3744 wrote to memory of 1800 3744 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe PID 3744 wrote to memory of 1800 3744 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe PID 3744 wrote to memory of 1800 3744 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe PID 3744 wrote to memory of 1800 3744 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe PID 3744 wrote to memory of 1800 3744 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe PID 3744 wrote to memory of 1800 3744 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe 25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe"C:\Users\Admin\AppData\Local\Temp\25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe"C:\Users\Admin\AppData\Local\Temp\25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe"C:\Users\Admin\AppData\Local\Temp\25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe"C:\Users\Admin\AppData\Local\Temp\25e4adba5d0ef98cb4f2a30b964254c5189d687d8af747533fe380907f36173b.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1800-127-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1800-128-0x000000000041D440-mapping.dmp
-
memory/1800-129-0x0000000000F70000-0x0000000001290000-memory.dmpFilesize
3.1MB
-
memory/3744-118-0x0000000000760000-0x0000000000761000-memory.dmpFilesize
4KB
-
memory/3744-120-0x00000000054D0000-0x00000000054D1000-memory.dmpFilesize
4KB
-
memory/3744-121-0x0000000005070000-0x0000000005071000-memory.dmpFilesize
4KB
-
memory/3744-122-0x0000000004FD0000-0x00000000054CE000-memory.dmpFilesize
5.0MB
-
memory/3744-123-0x0000000005030000-0x0000000005031000-memory.dmpFilesize
4KB
-
memory/3744-124-0x00000000085B0000-0x00000000085B4000-memory.dmpFilesize
16KB
-
memory/3744-125-0x00000000088E0000-0x00000000088E1000-memory.dmpFilesize
4KB
-
memory/3744-126-0x0000000008A80000-0x0000000008AD9000-memory.dmpFilesize
356KB