Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
10-12-2021 10:13
Static task
static1
General
-
Target
32121f53dac2e51662a709562a1247db9ff6a76ed8a5efd68492f28b9a25370e.exe
-
Size
993KB
-
MD5
2e81ceb459073a4988b86572485ce064
-
SHA1
537788a13b833bbe3993e6ddd3f4c1abf12caf94
-
SHA256
32121f53dac2e51662a709562a1247db9ff6a76ed8a5efd68492f28b9a25370e
-
SHA512
fa7e4ba4c10db2914051df3dc62108fdf545e1ac26e32498b0fc539bd874146b355c6e59892b870b254fad1f2b4468d99e4872da5f661916ecabfd76bda58b4a
Malware Config
Extracted
xloader
2.5
mwev
http://www.scion-go-getter.com/mwev/
9linefarms.com
meadow-spring.com
texascountrycharts.com
chinatowndeliver.com
grindsword.com
thegurusigavebirthto.com
rip-online.com
lm-safe-keepingtoyof6.xyz
plumbtechconsulting.com
jgoerlach.com
inbloomsolutions.com
foxandmew.com
tikomobile.store
waybunch.com
thepatriottutor.com
qask.top
pharmacylinked.com
ishii-miona.com
sugarandrocks.com
anabolenpower.net
my9m.com
ywboxiong.xyz
primetire.net
yshxdys.com
royallecleaning.com
xtrategit.com
almashrabia.net
bundlezandco.com
sandman.network
vinhomes-grand-park.com
jbarecipes.com
squareleatherbox.net
breathechurch.digital
wodemcil.com
carthy.foundation
galimfish.com
reflectbag.com
lheteclase.quest
yourvirtualevent.services
custercountycritique.com
liyahgadgets.com
sweetascaramelllc.com
lzgirlz.com
flydubaime.com
aanhanger-verhuur.com
schooldiry.com
theroadtorodriguez.com
mrteez.club
gxystgs.com
runz.online
kometbux.com
mintyhelper.com
bestinvest-4u.com
bjxxc.com
e-readertnpasumo5.xyz
experimentwithoutlimits.com
21yingyang.com
recbi56ni.com
tabulose-milfs-live.com
uglyatoz.com
websitessample.com
gogopficg.xyz
fourthandwhiteoak.com
fulvousemollientplanet.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3504-125-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/3504-126-0x000000000041D480-mapping.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
32121f53dac2e51662a709562a1247db9ff6a76ed8a5efd68492f28b9a25370e.exedescription pid process target process PID 2172 set thread context of 3504 2172 32121f53dac2e51662a709562a1247db9ff6a76ed8a5efd68492f28b9a25370e.exe 32121f53dac2e51662a709562a1247db9ff6a76ed8a5efd68492f28b9a25370e.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
32121f53dac2e51662a709562a1247db9ff6a76ed8a5efd68492f28b9a25370e.exepid process 3504 32121f53dac2e51662a709562a1247db9ff6a76ed8a5efd68492f28b9a25370e.exe 3504 32121f53dac2e51662a709562a1247db9ff6a76ed8a5efd68492f28b9a25370e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
32121f53dac2e51662a709562a1247db9ff6a76ed8a5efd68492f28b9a25370e.exedescription pid process target process PID 2172 wrote to memory of 3504 2172 32121f53dac2e51662a709562a1247db9ff6a76ed8a5efd68492f28b9a25370e.exe 32121f53dac2e51662a709562a1247db9ff6a76ed8a5efd68492f28b9a25370e.exe PID 2172 wrote to memory of 3504 2172 32121f53dac2e51662a709562a1247db9ff6a76ed8a5efd68492f28b9a25370e.exe 32121f53dac2e51662a709562a1247db9ff6a76ed8a5efd68492f28b9a25370e.exe PID 2172 wrote to memory of 3504 2172 32121f53dac2e51662a709562a1247db9ff6a76ed8a5efd68492f28b9a25370e.exe 32121f53dac2e51662a709562a1247db9ff6a76ed8a5efd68492f28b9a25370e.exe PID 2172 wrote to memory of 3504 2172 32121f53dac2e51662a709562a1247db9ff6a76ed8a5efd68492f28b9a25370e.exe 32121f53dac2e51662a709562a1247db9ff6a76ed8a5efd68492f28b9a25370e.exe PID 2172 wrote to memory of 3504 2172 32121f53dac2e51662a709562a1247db9ff6a76ed8a5efd68492f28b9a25370e.exe 32121f53dac2e51662a709562a1247db9ff6a76ed8a5efd68492f28b9a25370e.exe PID 2172 wrote to memory of 3504 2172 32121f53dac2e51662a709562a1247db9ff6a76ed8a5efd68492f28b9a25370e.exe 32121f53dac2e51662a709562a1247db9ff6a76ed8a5efd68492f28b9a25370e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\32121f53dac2e51662a709562a1247db9ff6a76ed8a5efd68492f28b9a25370e.exe"C:\Users\Admin\AppData\Local\Temp\32121f53dac2e51662a709562a1247db9ff6a76ed8a5efd68492f28b9a25370e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\32121f53dac2e51662a709562a1247db9ff6a76ed8a5efd68492f28b9a25370e.exe"C:\Users\Admin\AppData\Local\Temp\32121f53dac2e51662a709562a1247db9ff6a76ed8a5efd68492f28b9a25370e.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2172-115-0x0000000000710000-0x0000000000711000-memory.dmpFilesize
4KB
-
memory/2172-117-0x0000000005550000-0x0000000005551000-memory.dmpFilesize
4KB
-
memory/2172-118-0x00000000050F0000-0x00000000050F1000-memory.dmpFilesize
4KB
-
memory/2172-119-0x0000000005020000-0x0000000005021000-memory.dmpFilesize
4KB
-
memory/2172-120-0x0000000008570000-0x0000000008577000-memory.dmpFilesize
28KB
-
memory/2172-121-0x0000000008580000-0x0000000008581000-memory.dmpFilesize
4KB
-
memory/2172-122-0x0000000005050000-0x000000000554E000-memory.dmpFilesize
5.0MB
-
memory/2172-123-0x00000000085E0000-0x00000000085E1000-memory.dmpFilesize
4KB
-
memory/2172-124-0x0000000008680000-0x0000000008797000-memory.dmpFilesize
1.1MB
-
memory/3504-125-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3504-126-0x000000000041D480-mapping.dmp
-
memory/3504-127-0x0000000001910000-0x0000000001C30000-memory.dmpFilesize
3.1MB