Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
27-01-2022 14:55
Static task
static1
Behavioral task
behavioral1
Sample
2f7c9029b930382a47dc1559e4127d78.exe
Resource
win7-en-20211208
General
-
Target
2f7c9029b930382a47dc1559e4127d78.exe
-
Size
387KB
-
MD5
2f7c9029b930382a47dc1559e4127d78
-
SHA1
51399a722779b33442d47b3a147114503cb9dc71
-
SHA256
32fea88907cbefd31749cedfc8b85d3775fca2f65b15594dde355624b3ad7cc8
-
SHA512
5fc3a74ee8ed72dfae8e167dc5f3228c60c44ab462139eefa21a0943eeca5f768889197b154d1c4afc921715197bf591924c123c17195619a016cb3cdc39f37c
Malware Config
Extracted
xloader
2.5
i5nb
monkenram.com
ryhairclinic.com
smtrbrndmethod.com
skvela-plet.com
1sa.space
duplicatedaves.com
tudesafiofit.com
stolenartnfts.com
htmconfeccoes.com
popitparadise.com
brightlightservices.net
restaurangveckan.one
yourlittlehelp.store
vsley.com
xxxpornmodels.com
lei.ink
ouch247tap.com
paradgmpharma.com
airdrop-binance.com
hip-hopyhvqha.online
ezsoftwaresystems.xyz
detailingglaze.com
cobblestoneconstructions.net
026atk.xyz
tautautautautau.com
elsulu.com
makeup-first.xyz
wowsitdown.com
sparkling-sunshine.com
gsjbd3.club
myhkterstugroup.net
dixieexpressllc.net
zjglwl.com
tahaniflower.com
jstongwei.com
stardm.agency
globalesportsadministration.com
alltherapist.net
shopifymarket.us
urbanmicchile.com
aqarhub-eg.com
palmbeachdesignbuild.com
conscious.investments
724761.com
pinio.info
thelivinginfinite.club
jerrys0428.xyz
asinment.com
honourhiers.com
devisaudia.com
zacors-th.com
haolie166.com
corbachi.xyz
araksoft.online
intimateadulttoys.com
muckbud.com
dayinsousse.com
kenkou-sya.com
alias-group.tech
jahidhasantuhin.com
dauxanhdaumoe.xyz
growbevy.com
alfilermarketing.com
zenahaircarenyc.com
fertilnieste.quest
Signatures
-
Xloader Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/708-62-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
2f7c9029b930382a47dc1559e4127d78.exedescription pid process target process PID 1212 set thread context of 708 1212 2f7c9029b930382a47dc1559e4127d78.exe 2f7c9029b930382a47dc1559e4127d78.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
2f7c9029b930382a47dc1559e4127d78.exepid process 708 2f7c9029b930382a47dc1559e4127d78.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
2f7c9029b930382a47dc1559e4127d78.exedescription pid process target process PID 1212 wrote to memory of 708 1212 2f7c9029b930382a47dc1559e4127d78.exe 2f7c9029b930382a47dc1559e4127d78.exe PID 1212 wrote to memory of 708 1212 2f7c9029b930382a47dc1559e4127d78.exe 2f7c9029b930382a47dc1559e4127d78.exe PID 1212 wrote to memory of 708 1212 2f7c9029b930382a47dc1559e4127d78.exe 2f7c9029b930382a47dc1559e4127d78.exe PID 1212 wrote to memory of 708 1212 2f7c9029b930382a47dc1559e4127d78.exe 2f7c9029b930382a47dc1559e4127d78.exe PID 1212 wrote to memory of 708 1212 2f7c9029b930382a47dc1559e4127d78.exe 2f7c9029b930382a47dc1559e4127d78.exe PID 1212 wrote to memory of 708 1212 2f7c9029b930382a47dc1559e4127d78.exe 2f7c9029b930382a47dc1559e4127d78.exe PID 1212 wrote to memory of 708 1212 2f7c9029b930382a47dc1559e4127d78.exe 2f7c9029b930382a47dc1559e4127d78.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f7c9029b930382a47dc1559e4127d78.exe"C:\Users\Admin\AppData\Local\Temp\2f7c9029b930382a47dc1559e4127d78.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\2f7c9029b930382a47dc1559e4127d78.exe"C:\Users\Admin\AppData\Local\Temp\2f7c9029b930382a47dc1559e4127d78.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/708-60-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/708-61-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/708-62-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/708-63-0x0000000000AA0000-0x0000000000DA3000-memory.dmpFilesize
3.0MB
-
memory/1212-55-0x0000000000190000-0x00000000001F8000-memory.dmpFilesize
416KB
-
memory/1212-56-0x0000000075D61000-0x0000000075D63000-memory.dmpFilesize
8KB
-
memory/1212-57-0x0000000001F10000-0x0000000001F11000-memory.dmpFilesize
4KB
-
memory/1212-58-0x0000000000690000-0x000000000069C000-memory.dmpFilesize
48KB
-
memory/1212-59-0x0000000004F70000-0x0000000004FD2000-memory.dmpFilesize
392KB