Analysis
-
max time kernel
120s -
max time network
141s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-01-2022 13:59
Static task
static1
Behavioral task
behavioral1
Sample
SNO22 PriceLetter595406_RACX-159814.exe
Resource
win7-en-20211208
General
-
Target
SNO22 PriceLetter595406_RACX-159814.exe
-
Size
7KB
-
MD5
7088f42f3e34585a113c57d472e7f6e9
-
SHA1
a3bae33f21a6068eb3c76bc3e74c61df20d5596b
-
SHA256
472f77899f797ab92af8a3b5eacbf827ce8e287971f4dd3a9f23ae00d7b25475
-
SHA512
4a86a834ad2a6cc35ab62aa0af9cd8d9c87d9fa1daf1c8328cba856fc27569c8c7d89e64be714805fdc65af6022d5602c08237f5a1344fc6ff7e9d1c54fccb01
Malware Config
Extracted
xloader
2.5
p8ce
wishmeluck1.xyz
nawabumi.com
terra.fish
eoraipsumami.quest
awakeningyourid.com
csyein.com
tslsinteligentes.com
cataractusa.com
capitalwheelstogo.com
staffremotely.com
trashbinwasher.com
blaneyparkrendezvous.com
yolrt.com
northendtaproom.com
showgeini.com
b95206.com
almcpersonaltraining.com
lovabledoodleshome.com
woodlandstationcondos.com
nikahlive.com
sassholesentiments.com
bupis44.info
salahiheartclinic.com
loveandpersonality.com
electric-cortex.com
beijixing-zs.com
proper-sa.com
legacyfamilypartners.com
psidsamor.com
schotinderoos.com
kosma-concept.com
onitled.com
zscyyds.xyz
mannatgroups.com
radweb-demo.com
lambanghieuquangcao.info
antabatik.com
lerongclub.com
mobssvipshop.com
dr-walther.com
ibexitconsultants.com
cnyprospects.com
j9mkt64.com
archer-claims.com
lggrandinn.com
jowhp.com
outdoormz.store
cantikgroup.company
2brothersprinting.com
ginamodernart.com
koupeespen.quest
senerants.tech
designthrottle.com
emquality.com
cerulesafe.com
orascomservice.com
skinsotight.com
premiumconciergemarbella.com
cottagepor.xyz
gwayav.com
johnguidesyou.com
corporativokale.com
jskswj.com
xinico.info
gebaeudetechnik-burscheid.com
Signatures
-
Xloader Payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2572-123-0x00000000003C0000-0x00000000003E9000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
SNO22 PriceLetter595406_RACX-159814.exedescription pid process target process PID 2648 set thread context of 2572 2648 SNO22 PriceLetter595406_RACX-159814.exe aspnet_regbrowsers.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2552 2572 WerFault.exe aspnet_regbrowsers.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
WerFault.exepid process 2552 WerFault.exe 2552 WerFault.exe 2552 WerFault.exe 2552 WerFault.exe 2552 WerFault.exe 2552 WerFault.exe 2552 WerFault.exe 2552 WerFault.exe 2552 WerFault.exe 2552 WerFault.exe 2552 WerFault.exe 2552 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
SNO22 PriceLetter595406_RACX-159814.exeWerFault.exedescription pid process Token: SeDebugPrivilege 2648 SNO22 PriceLetter595406_RACX-159814.exe Token: SeRestorePrivilege 2552 WerFault.exe Token: SeBackupPrivilege 2552 WerFault.exe Token: SeDebugPrivilege 2552 WerFault.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
SNO22 PriceLetter595406_RACX-159814.exedescription pid process target process PID 2648 wrote to memory of 2572 2648 SNO22 PriceLetter595406_RACX-159814.exe aspnet_regbrowsers.exe PID 2648 wrote to memory of 2572 2648 SNO22 PriceLetter595406_RACX-159814.exe aspnet_regbrowsers.exe PID 2648 wrote to memory of 2572 2648 SNO22 PriceLetter595406_RACX-159814.exe aspnet_regbrowsers.exe PID 2648 wrote to memory of 2572 2648 SNO22 PriceLetter595406_RACX-159814.exe aspnet_regbrowsers.exe PID 2648 wrote to memory of 2572 2648 SNO22 PriceLetter595406_RACX-159814.exe aspnet_regbrowsers.exe PID 2648 wrote to memory of 2572 2648 SNO22 PriceLetter595406_RACX-159814.exe aspnet_regbrowsers.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SNO22 PriceLetter595406_RACX-159814.exe"C:\Users\Admin\AppData\Local\Temp\SNO22 PriceLetter595406_RACX-159814.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_regbrowsers.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2572 -s 1923⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2572-123-0x00000000003C0000-0x00000000003E9000-memory.dmpFilesize
164KB
-
memory/2648-118-0x0000000000740000-0x0000000000748000-memory.dmpFilesize
32KB
-
memory/2648-119-0x0000000005000000-0x0000000005001000-memory.dmpFilesize
4KB
-
memory/2648-120-0x0000000002890000-0x00000000028A4000-memory.dmpFilesize
80KB
-
memory/2648-121-0x0000000007AA0000-0x0000000007B3C000-memory.dmpFilesize
624KB