Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
21-01-2022 21:30
Static task
static1
Behavioral task
behavioral1
Sample
TT Transmitted Copy TRVTT2200390.exe
Resource
win7-en-20211208
General
-
Target
TT Transmitted Copy TRVTT2200390.exe
-
Size
706KB
-
MD5
e08f07a15096d5eda6b9af217640692b
-
SHA1
d97dde29c20cc83def959ede08e0194db4cd3453
-
SHA256
071d14c83f00ed98e9c00926273cc741b6de2c4d74b7c02b63dce652ae5b8735
-
SHA512
dc529b138f4083608551dd0028c8d971724a06432000b56f8baf9b787a0e810248f4892a8ad68276f0416d01a52473bc96c6025814f6bde3c434bb8e940c6291
Malware Config
Extracted
xloader
2.5
n8bs
monese-bank.com
silkypumps.xyz
tashabouvier.com
eduardoleonsilva.com
pinnaclecorporaterentals.com
megafluids.com
worldwidecarfans.com
benjamlnesq.com
unitedraxiapp.com
thetanheroes.com
jypmore.quest
indianasheriffs.biz
saintinstead.com
alldansmx.com
trulyproofreading.com
indotogel369.com
mermadekusse.store
radosenterprisellc.com
gseequalservices.com
techride.xyz
2031corp.com
centelytics.com
payperlivecalls.com
iphone13promax.guide
leadslingerstraining.com
generateideasint.com
afgelocal2741.com
n-visionlearning.com
strumagokart.quest
noisesocial.com
completefilmguide.com
mawuyrapaulin.com
heptagonfx.com
hype-clicks.com
uxog0.online
932381.com
trumpetrofnky.xyz
samudombang.com
hairtederionos.com
10karmy.com
nangniubanchanviet.online
brooklynprowellness.com
rockstarcleaningclub.com
rollnwin.top
breastextra.com
zahad-riedel.com
xuebqufvcdbgbqypuywgntpy.store
blogging2success.com
cnshippingagency.com
danielquasar.net
allthingsdog.info
legaltulsa.com
pure-impression.store
jonbeedle.com
ndtailgateofchampions.com
steelhorserescue.com
smart-realy.com
rebornmkt.com
zaktheme.xyz
myfranciscanshoe.com
linkedinupdate.com
fulviopires.com
magicspaces.digital
avtoshop761.com
myveguiolcusbyopappgroup.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1480-62-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1756-68-0x00000000000C0000-0x00000000000E9000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1380 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
TT Transmitted Copy TRVTT2200390.exeTT Transmitted Copy TRVTT2200390.execmd.exedescription pid process target process PID 1592 set thread context of 1480 1592 TT Transmitted Copy TRVTT2200390.exe TT Transmitted Copy TRVTT2200390.exe PID 1480 set thread context of 1192 1480 TT Transmitted Copy TRVTT2200390.exe Explorer.EXE PID 1756 set thread context of 1192 1756 cmd.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 27 IoCs
Processes:
TT Transmitted Copy TRVTT2200390.exeTT Transmitted Copy TRVTT2200390.execmd.exepid process 1592 TT Transmitted Copy TRVTT2200390.exe 1592 TT Transmitted Copy TRVTT2200390.exe 1592 TT Transmitted Copy TRVTT2200390.exe 1592 TT Transmitted Copy TRVTT2200390.exe 1480 TT Transmitted Copy TRVTT2200390.exe 1480 TT Transmitted Copy TRVTT2200390.exe 1756 cmd.exe 1756 cmd.exe 1756 cmd.exe 1756 cmd.exe 1756 cmd.exe 1756 cmd.exe 1756 cmd.exe 1756 cmd.exe 1756 cmd.exe 1756 cmd.exe 1756 cmd.exe 1756 cmd.exe 1756 cmd.exe 1756 cmd.exe 1756 cmd.exe 1756 cmd.exe 1756 cmd.exe 1756 cmd.exe 1756 cmd.exe 1756 cmd.exe 1756 cmd.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
TT Transmitted Copy TRVTT2200390.execmd.exepid process 1480 TT Transmitted Copy TRVTT2200390.exe 1480 TT Transmitted Copy TRVTT2200390.exe 1480 TT Transmitted Copy TRVTT2200390.exe 1756 cmd.exe 1756 cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
TT Transmitted Copy TRVTT2200390.exeTT Transmitted Copy TRVTT2200390.execmd.exedescription pid process Token: SeDebugPrivilege 1592 TT Transmitted Copy TRVTT2200390.exe Token: SeDebugPrivilege 1480 TT Transmitted Copy TRVTT2200390.exe Token: SeDebugPrivilege 1756 cmd.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1192 Explorer.EXE 1192 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1192 Explorer.EXE 1192 Explorer.EXE -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
TT Transmitted Copy TRVTT2200390.exeExplorer.EXEcmd.exedescription pid process target process PID 1592 wrote to memory of 1620 1592 TT Transmitted Copy TRVTT2200390.exe TT Transmitted Copy TRVTT2200390.exe PID 1592 wrote to memory of 1620 1592 TT Transmitted Copy TRVTT2200390.exe TT Transmitted Copy TRVTT2200390.exe PID 1592 wrote to memory of 1620 1592 TT Transmitted Copy TRVTT2200390.exe TT Transmitted Copy TRVTT2200390.exe PID 1592 wrote to memory of 1620 1592 TT Transmitted Copy TRVTT2200390.exe TT Transmitted Copy TRVTT2200390.exe PID 1592 wrote to memory of 1476 1592 TT Transmitted Copy TRVTT2200390.exe TT Transmitted Copy TRVTT2200390.exe PID 1592 wrote to memory of 1476 1592 TT Transmitted Copy TRVTT2200390.exe TT Transmitted Copy TRVTT2200390.exe PID 1592 wrote to memory of 1476 1592 TT Transmitted Copy TRVTT2200390.exe TT Transmitted Copy TRVTT2200390.exe PID 1592 wrote to memory of 1476 1592 TT Transmitted Copy TRVTT2200390.exe TT Transmitted Copy TRVTT2200390.exe PID 1592 wrote to memory of 576 1592 TT Transmitted Copy TRVTT2200390.exe TT Transmitted Copy TRVTT2200390.exe PID 1592 wrote to memory of 576 1592 TT Transmitted Copy TRVTT2200390.exe TT Transmitted Copy TRVTT2200390.exe PID 1592 wrote to memory of 576 1592 TT Transmitted Copy TRVTT2200390.exe TT Transmitted Copy TRVTT2200390.exe PID 1592 wrote to memory of 576 1592 TT Transmitted Copy TRVTT2200390.exe TT Transmitted Copy TRVTT2200390.exe PID 1592 wrote to memory of 1728 1592 TT Transmitted Copy TRVTT2200390.exe TT Transmitted Copy TRVTT2200390.exe PID 1592 wrote to memory of 1728 1592 TT Transmitted Copy TRVTT2200390.exe TT Transmitted Copy TRVTT2200390.exe PID 1592 wrote to memory of 1728 1592 TT Transmitted Copy TRVTT2200390.exe TT Transmitted Copy TRVTT2200390.exe PID 1592 wrote to memory of 1728 1592 TT Transmitted Copy TRVTT2200390.exe TT Transmitted Copy TRVTT2200390.exe PID 1592 wrote to memory of 1480 1592 TT Transmitted Copy TRVTT2200390.exe TT Transmitted Copy TRVTT2200390.exe PID 1592 wrote to memory of 1480 1592 TT Transmitted Copy TRVTT2200390.exe TT Transmitted Copy TRVTT2200390.exe PID 1592 wrote to memory of 1480 1592 TT Transmitted Copy TRVTT2200390.exe TT Transmitted Copy TRVTT2200390.exe PID 1592 wrote to memory of 1480 1592 TT Transmitted Copy TRVTT2200390.exe TT Transmitted Copy TRVTT2200390.exe PID 1592 wrote to memory of 1480 1592 TT Transmitted Copy TRVTT2200390.exe TT Transmitted Copy TRVTT2200390.exe PID 1592 wrote to memory of 1480 1592 TT Transmitted Copy TRVTT2200390.exe TT Transmitted Copy TRVTT2200390.exe PID 1592 wrote to memory of 1480 1592 TT Transmitted Copy TRVTT2200390.exe TT Transmitted Copy TRVTT2200390.exe PID 1192 wrote to memory of 1756 1192 Explorer.EXE cmd.exe PID 1192 wrote to memory of 1756 1192 Explorer.EXE cmd.exe PID 1192 wrote to memory of 1756 1192 Explorer.EXE cmd.exe PID 1192 wrote to memory of 1756 1192 Explorer.EXE cmd.exe PID 1756 wrote to memory of 1380 1756 cmd.exe cmd.exe PID 1756 wrote to memory of 1380 1756 cmd.exe cmd.exe PID 1756 wrote to memory of 1380 1756 cmd.exe cmd.exe PID 1756 wrote to memory of 1380 1756 cmd.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\TT Transmitted Copy TRVTT2200390.exe"C:\Users\Admin\AppData\Local\Temp\TT Transmitted Copy TRVTT2200390.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\TT Transmitted Copy TRVTT2200390.exe"C:\Users\Admin\AppData\Local\Temp\TT Transmitted Copy TRVTT2200390.exe"2⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\TT Transmitted Copy TRVTT2200390.exe"C:\Users\Admin\AppData\Local\Temp\TT Transmitted Copy TRVTT2200390.exe"2⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\TT Transmitted Copy TRVTT2200390.exe"C:\Users\Admin\AppData\Local\Temp\TT Transmitted Copy TRVTT2200390.exe"2⤵PID:576
-
C:\Users\Admin\AppData\Local\Temp\TT Transmitted Copy TRVTT2200390.exe"C:\Users\Admin\AppData\Local\Temp\TT Transmitted Copy TRVTT2200390.exe"2⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\TT Transmitted Copy TRVTT2200390.exe"C:\Users\Admin\AppData\Local\Temp\TT Transmitted Copy TRVTT2200390.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1480
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\TT Transmitted Copy TRVTT2200390.exe"3⤵
- Deletes itself
PID:1380
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1192-71-0x0000000004B90000-0x0000000004C5F000-memory.dmpFilesize
828KB
-
memory/1192-66-0x0000000004A10000-0x0000000004B88000-memory.dmpFilesize
1.5MB
-
memory/1480-61-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1480-65-0x0000000000200000-0x0000000000211000-memory.dmpFilesize
68KB
-
memory/1480-64-0x00000000009E0000-0x0000000000CE3000-memory.dmpFilesize
3.0MB
-
memory/1480-62-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1480-60-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1592-58-0x0000000000650000-0x000000000065E000-memory.dmpFilesize
56KB
-
memory/1592-59-0x00000000020A0000-0x00000000020FE000-memory.dmpFilesize
376KB
-
memory/1592-54-0x0000000000140000-0x00000000001F8000-memory.dmpFilesize
736KB
-
memory/1592-57-0x0000000004DB0000-0x0000000004E50000-memory.dmpFilesize
640KB
-
memory/1592-56-0x0000000004880000-0x0000000004881000-memory.dmpFilesize
4KB
-
memory/1592-55-0x0000000075471000-0x0000000075473000-memory.dmpFilesize
8KB
-
memory/1756-67-0x000000004A6A0000-0x000000004A6EC000-memory.dmpFilesize
304KB
-
memory/1756-68-0x00000000000C0000-0x00000000000E9000-memory.dmpFilesize
164KB
-
memory/1756-69-0x0000000001F60000-0x0000000002263000-memory.dmpFilesize
3.0MB
-
memory/1756-70-0x0000000002270000-0x0000000002300000-memory.dmpFilesize
576KB