Analysis
-
max time kernel
111s -
max time network
118s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
27-01-2022 12:16
Static task
static1
General
-
Target
93d19d496e71478cf23769d45f29c123fcf591ba4c12771da2b7639bb7bb5e2e.exe
-
Size
389KB
-
MD5
1d4b78626c774f17888d9bd427732d56
-
SHA1
14e6dfe56d773bd8481030f7fa2e56c718d96220
-
SHA256
93d19d496e71478cf23769d45f29c123fcf591ba4c12771da2b7639bb7bb5e2e
-
SHA512
02a50e5591a5f8440aec3ec2f8cb41e350662c4d39128c3fb6ea7fe01cdf256b03c8fd35e99358133b86f557f6f7f334465d8d2daef937aa2aec0c8b510f69d7
Malware Config
Extracted
xloader
2.5
yrcy
ordermws-brands.com
jkbswj.com
dairatwsl.com
lewismiddleton.com
hevenorfeed.com
kovogueshop.com
cyberitconsultingz.com
besrbee.com
workerscompfl1.com
wayfinderacu.com
smplkindness.com
servicesitcy.com
babyvv.com
fly-crypto.com
chahuima.com
trist-n.tech
minjia56.com
oded.top
mes-dents-blanches.com
nethunsleather.com
onlinesindh.com
genrage.com
bhalawat.com
5gwirelesszone.com
semejnyjochag.com
shopvintageallure.com
laqueenbeautybar.supplies
hominyprintingmuseum.com
taksimbet13.com
fairytalesinc.com
loversscout.com
nxn-n.com
lovebydarius.store
mintnft.tours
snowjamproductiosmedia.com
boraviajar.website
cryptointelcenter.com
m2momshealth.com
perfectionbyinjection.com
cletechsolutions.com
skin4trade.com
a9d7c19f0282.com
waltersswholesale.com
lendsoar.com
virginialandsforsale.com
shinepatio.com
nba2klocker.team
picturebookoriginals.com
chatteusa.com
bodevolidu.quest
certidaoja.com
scgxjp.com
cbd-cannabis-store.com
kadinisigi.com
vacoveco.com
hostedexchangemaintainces.com
hf59184.com
jingguanfm.com
browsealto.com
kymyra.com
xrgoods.com
dtsddcpj.com
uptimisedmc.com
redsigndesign.com
drmichaelirvine.com
Signatures
-
Xloader Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/3336-125-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
93d19d496e71478cf23769d45f29c123fcf591ba4c12771da2b7639bb7bb5e2e.exedescription pid process target process PID 2656 set thread context of 3336 2656 93d19d496e71478cf23769d45f29c123fcf591ba4c12771da2b7639bb7bb5e2e.exe 93d19d496e71478cf23769d45f29c123fcf591ba4c12771da2b7639bb7bb5e2e.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
93d19d496e71478cf23769d45f29c123fcf591ba4c12771da2b7639bb7bb5e2e.exepid process 3336 93d19d496e71478cf23769d45f29c123fcf591ba4c12771da2b7639bb7bb5e2e.exe 3336 93d19d496e71478cf23769d45f29c123fcf591ba4c12771da2b7639bb7bb5e2e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
93d19d496e71478cf23769d45f29c123fcf591ba4c12771da2b7639bb7bb5e2e.exedescription pid process target process PID 2656 wrote to memory of 3336 2656 93d19d496e71478cf23769d45f29c123fcf591ba4c12771da2b7639bb7bb5e2e.exe 93d19d496e71478cf23769d45f29c123fcf591ba4c12771da2b7639bb7bb5e2e.exe PID 2656 wrote to memory of 3336 2656 93d19d496e71478cf23769d45f29c123fcf591ba4c12771da2b7639bb7bb5e2e.exe 93d19d496e71478cf23769d45f29c123fcf591ba4c12771da2b7639bb7bb5e2e.exe PID 2656 wrote to memory of 3336 2656 93d19d496e71478cf23769d45f29c123fcf591ba4c12771da2b7639bb7bb5e2e.exe 93d19d496e71478cf23769d45f29c123fcf591ba4c12771da2b7639bb7bb5e2e.exe PID 2656 wrote to memory of 3336 2656 93d19d496e71478cf23769d45f29c123fcf591ba4c12771da2b7639bb7bb5e2e.exe 93d19d496e71478cf23769d45f29c123fcf591ba4c12771da2b7639bb7bb5e2e.exe PID 2656 wrote to memory of 3336 2656 93d19d496e71478cf23769d45f29c123fcf591ba4c12771da2b7639bb7bb5e2e.exe 93d19d496e71478cf23769d45f29c123fcf591ba4c12771da2b7639bb7bb5e2e.exe PID 2656 wrote to memory of 3336 2656 93d19d496e71478cf23769d45f29c123fcf591ba4c12771da2b7639bb7bb5e2e.exe 93d19d496e71478cf23769d45f29c123fcf591ba4c12771da2b7639bb7bb5e2e.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\93d19d496e71478cf23769d45f29c123fcf591ba4c12771da2b7639bb7bb5e2e.exe"C:\Users\Admin\AppData\Local\Temp\93d19d496e71478cf23769d45f29c123fcf591ba4c12771da2b7639bb7bb5e2e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\93d19d496e71478cf23769d45f29c123fcf591ba4c12771da2b7639bb7bb5e2e.exe"C:\Users\Admin\AppData\Local\Temp\93d19d496e71478cf23769d45f29c123fcf591ba4c12771da2b7639bb7bb5e2e.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2656-117-0x0000000000180000-0x00000000001E8000-memory.dmpFilesize
416KB
-
memory/2656-118-0x0000000004E70000-0x000000000536E000-memory.dmpFilesize
5.0MB
-
memory/2656-119-0x0000000004A50000-0x0000000004AE2000-memory.dmpFilesize
584KB
-
memory/2656-120-0x0000000004A20000-0x0000000004A2A000-memory.dmpFilesize
40KB
-
memory/2656-121-0x0000000004970000-0x0000000004E6E000-memory.dmpFilesize
5.0MB
-
memory/2656-122-0x0000000004C60000-0x0000000004C6C000-memory.dmpFilesize
48KB
-
memory/2656-123-0x0000000007180000-0x000000000721C000-memory.dmpFilesize
624KB
-
memory/2656-124-0x0000000007300000-0x0000000007362000-memory.dmpFilesize
392KB
-
memory/3336-125-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3336-126-0x0000000000F80000-0x00000000012A0000-memory.dmpFilesize
3.1MB