Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
13-12-2021 20:12
Static task
static1
Behavioral task
behavioral1
Sample
f25f99160f53de6443616a127637d90a.exe
Resource
win7-en-20211208
General
-
Target
f25f99160f53de6443616a127637d90a.exe
-
Size
1.2MB
-
MD5
f25f99160f53de6443616a127637d90a
-
SHA1
fc2d05b74442ce84eaee52562b74ed85371f0777
-
SHA256
660fe8ad69670eeba2c95a5a011a8bf98b0effb5398cf1ff6c3a8a759a3bc0c8
-
SHA512
d3ee70b73a4f37ce0dbce6a81031db7781b7c2f1be6c66dde7c2f94e94752599759e2e8fa66eb2a02b79ff4fcec1cdd971b6ff1fd37955b3796002572fb386e1
Malware Config
Extracted
xloader
2.5
ef6c
http://www.fis.photos/ef6c/
gicaredocs.com
govusergroup.com
conversationspit.com
brondairy.com
rjtherealest.com
xn--9m1bq8wgkag3rjvb.com
mylori.net
softandcute.store
ahljsm.com
shacksolid.com
weekendmusecollection.com
gaminghallarna.net
pgonline111.online
44mpt.xyz
ambrandt.com
eddytattoo.com
blendeqes.com
upinmyfeels.com
lacucinadesign.com
docomoau.xyz
xn--90armbk7e.online
xzq585858.net
kidzgovroom.com
lhznqyl.press
publicationsplace.com
jakante.com
csspadding.com
test-testjisdnsec.store
lafabriqueabeilleassurances.com
clf010.com
buybabysnuggle.com
uzmdrmustafaalperaykanat.com
levanttradegroup.com
arcflorals.com
kinglot2499.com
freekagyans.com
region10group.gmbh
yeyelm744.com
thehomedesigncentre.com
vngc.xyz
szesdkj.com
charlottewright.online
planetgreennetwork.com
pacifica7.com
analogueadapt.com
sensorypantry.com
narbaal.com
restaurant-utopia.xyz
golnay.com
szyyglass.com
redelirevearyseuiop.xyz
goldsteelconstruction.com
discovercotswoldcottages.com
geniuseven.net
apricitee.com
stopmoshenik.online
ya2gh.com
instatechnovelz.com
dbe648.com
seifjuban.com
conquershirts.store
totalcovidtravel.com
pamperotrabajo.com
satellitphonestore.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3924-127-0x000000000041D3D0-mapping.dmp xloader behavioral2/memory/3924-126-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
f25f99160f53de6443616a127637d90a.exedescription pid process target process PID 2080 set thread context of 3924 2080 f25f99160f53de6443616a127637d90a.exe f25f99160f53de6443616a127637d90a.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
f25f99160f53de6443616a127637d90a.exepid process 3924 f25f99160f53de6443616a127637d90a.exe 3924 f25f99160f53de6443616a127637d90a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
f25f99160f53de6443616a127637d90a.exedescription pid process target process PID 2080 wrote to memory of 3924 2080 f25f99160f53de6443616a127637d90a.exe f25f99160f53de6443616a127637d90a.exe PID 2080 wrote to memory of 3924 2080 f25f99160f53de6443616a127637d90a.exe f25f99160f53de6443616a127637d90a.exe PID 2080 wrote to memory of 3924 2080 f25f99160f53de6443616a127637d90a.exe f25f99160f53de6443616a127637d90a.exe PID 2080 wrote to memory of 3924 2080 f25f99160f53de6443616a127637d90a.exe f25f99160f53de6443616a127637d90a.exe PID 2080 wrote to memory of 3924 2080 f25f99160f53de6443616a127637d90a.exe f25f99160f53de6443616a127637d90a.exe PID 2080 wrote to memory of 3924 2080 f25f99160f53de6443616a127637d90a.exe f25f99160f53de6443616a127637d90a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f25f99160f53de6443616a127637d90a.exe"C:\Users\Admin\AppData\Local\Temp\f25f99160f53de6443616a127637d90a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f25f99160f53de6443616a127637d90a.exe"C:\Users\Admin\AppData\Local\Temp\f25f99160f53de6443616a127637d90a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2080-116-0x0000000000420000-0x0000000000421000-memory.dmpFilesize
4KB
-
memory/2080-118-0x00000000054A0000-0x00000000054A1000-memory.dmpFilesize
4KB
-
memory/2080-119-0x0000000004FA0000-0x0000000004FA1000-memory.dmpFilesize
4KB
-
memory/2080-120-0x0000000004E60000-0x0000000004EF2000-memory.dmpFilesize
584KB
-
memory/2080-121-0x0000000005060000-0x0000000005061000-memory.dmpFilesize
4KB
-
memory/2080-122-0x0000000005470000-0x0000000005478000-memory.dmpFilesize
32KB
-
memory/2080-123-0x0000000008460000-0x0000000008461000-memory.dmpFilesize
4KB
-
memory/2080-124-0x00000000087D0000-0x00000000087D1000-memory.dmpFilesize
4KB
-
memory/2080-125-0x0000000008870000-0x0000000008986000-memory.dmpFilesize
1.1MB
-
memory/3924-127-0x000000000041D3D0-mapping.dmp
-
memory/3924-126-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3924-128-0x0000000001150000-0x0000000001470000-memory.dmpFilesize
3.1MB