Analysis
-
max time kernel
171s -
max time network
174s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
21-02-2022 11:26
Static task
static1
Behavioral task
behavioral1
Sample
Materials.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Materials.exe
Resource
win10v2004-en-20220113
General
-
Target
Materials.exe
-
Size
357KB
-
MD5
8bd9a34cf06fa228b4ccd401808723cc
-
SHA1
e17daeaf2e0dcfdbaf026866c00fefb0beb47520
-
SHA256
38f3aadc65df16aed9f5bbaa5f42598d3fd9b29811429fcddd679a40b092fca0
-
SHA512
3d3ac1d0d90125fba07ca8a6fe0bb75a95b47b1caf177854b9e476aede2cefe396c68bb68c7dde0e32b22a740708aa3f23dd3726f3789504b83fd0b195c0479e
Malware Config
Extracted
xloader
2.3
kio8
greeaircondition.com
thewilmingtonguide.com
cbluedotlivewdmall.com
globalcrime24.com
heightsplace.com
ghar.pro
asosbira.com
melolandia.com
velactun.com
erniesimms.com
nutbullet.com
drizzerstr.com
hnqym888.com
ghorowaseba.com
1317efoxchasedrive.info
stjudetroop623.com
facestaj.com
airpromaskaccessories.com
wolfetailors.com
56ohdc2016.com
estedindustries.com
magmaplant.net
tf-iot.com
jtkqmz.com
helmihendrahasilbumi.com
audiencetrust.sucks
thespiritualabolitionist.com
lauratoots.com
fantasticsgelato.com
allinoncrypto.site
youremsys.com
awesome-veganism.com
tsunrp.net
systizen.com
73gardinerdrive.com
legamedary.com
newyorkcityhemorrhoidclinic.com
ffhcompany.com
angermgmtathome.com
plantationrevival.com
utopicvibes.net
envirocare-ss.com
domentemenegi20.com
gropedais.club
thaibizgermany.com
noimagreece.com
yogabizhelp.com
sanrenzong.com
bingent.info
chinhphucphaidep.online
dubojx.com
jennaloren.com
thedesigneryshop.com
opera-historica.com
pizzaterry.com
the-aviate.com
perteprampram01.net
pastormariorondon.com
dream-case.com
ocleanwholesaler.com
masdimensiones.com
fireworkstycoons.com
porntvh.com
fixedpriceelectrician.com
smallcoloradoweddings.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1248-57-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/568-61-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1064 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Materials.exeMaterials.exesystray.exedescription pid process target process PID 1564 set thread context of 1248 1564 Materials.exe Materials.exe PID 1248 set thread context of 1200 1248 Materials.exe Explorer.EXE PID 568 set thread context of 1200 568 systray.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
Materials.exesystray.exepid process 1248 Materials.exe 1248 Materials.exe 568 systray.exe 568 systray.exe 568 systray.exe 568 systray.exe 568 systray.exe 568 systray.exe 568 systray.exe 568 systray.exe 568 systray.exe 568 systray.exe 568 systray.exe 568 systray.exe 568 systray.exe 568 systray.exe 568 systray.exe 568 systray.exe 568 systray.exe 568 systray.exe 568 systray.exe 568 systray.exe 568 systray.exe 568 systray.exe 568 systray.exe 568 systray.exe 568 systray.exe 568 systray.exe 568 systray.exe 568 systray.exe 568 systray.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 1200 Explorer.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
Materials.exeMaterials.exesystray.exepid process 1564 Materials.exe 1248 Materials.exe 1248 Materials.exe 1248 Materials.exe 568 systray.exe 568 systray.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Materials.exesystray.exedescription pid process Token: SeDebugPrivilege 1248 Materials.exe Token: SeDebugPrivilege 568 systray.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1200 Explorer.EXE 1200 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1200 Explorer.EXE 1200 Explorer.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
Processes:
Materials.exeExplorer.EXEsystray.exedescription pid process target process PID 1564 wrote to memory of 1612 1564 Materials.exe cmd.exe PID 1564 wrote to memory of 1612 1564 Materials.exe cmd.exe PID 1564 wrote to memory of 1612 1564 Materials.exe cmd.exe PID 1564 wrote to memory of 1612 1564 Materials.exe cmd.exe PID 1564 wrote to memory of 1724 1564 Materials.exe cmd.exe PID 1564 wrote to memory of 1724 1564 Materials.exe cmd.exe PID 1564 wrote to memory of 1724 1564 Materials.exe cmd.exe PID 1564 wrote to memory of 1724 1564 Materials.exe cmd.exe PID 1564 wrote to memory of 1248 1564 Materials.exe Materials.exe PID 1564 wrote to memory of 1248 1564 Materials.exe Materials.exe PID 1564 wrote to memory of 1248 1564 Materials.exe Materials.exe PID 1564 wrote to memory of 1248 1564 Materials.exe Materials.exe PID 1564 wrote to memory of 1248 1564 Materials.exe Materials.exe PID 1200 wrote to memory of 568 1200 Explorer.EXE systray.exe PID 1200 wrote to memory of 568 1200 Explorer.EXE systray.exe PID 1200 wrote to memory of 568 1200 Explorer.EXE systray.exe PID 1200 wrote to memory of 568 1200 Explorer.EXE systray.exe PID 568 wrote to memory of 1064 568 systray.exe cmd.exe PID 568 wrote to memory of 1064 568 systray.exe cmd.exe PID 568 wrote to memory of 1064 568 systray.exe cmd.exe PID 568 wrote to memory of 1064 568 systray.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Materials.exe"C:\Users\Admin\AppData\Local\Temp\Materials.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵
-
C:\Users\Admin\AppData\Local\Temp\Materials.exe"C:\Users\Admin\AppData\Local\Temp\Materials.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Materials.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/568-60-0x0000000000A70000-0x0000000000A75000-memory.dmpFilesize
20KB
-
memory/568-61-0x0000000000080000-0x00000000000A9000-memory.dmpFilesize
164KB
-
memory/568-62-0x0000000002010000-0x0000000002313000-memory.dmpFilesize
3.0MB
-
memory/568-63-0x0000000000560000-0x00000000005EF000-memory.dmpFilesize
572KB
-
memory/1200-56-0x0000000004D10000-0x0000000004E45000-memory.dmpFilesize
1.2MB
-
memory/1200-64-0x0000000004F30000-0x0000000005062000-memory.dmpFilesize
1.2MB
-
memory/1248-55-0x0000000000930000-0x0000000000C33000-memory.dmpFilesize
3.0MB
-
memory/1248-57-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1248-58-0x000000000041D000-0x000000000041E000-memory.dmpFilesize
4KB
-
memory/1248-59-0x0000000000110000-0x0000000000120000-memory.dmpFilesize
64KB
-
memory/1564-54-0x00000000003AD000-0x00000000003B0000-memory.dmpFilesize
12KB