Analysis
-
max time kernel
4294209s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
23-02-2022 15:12
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20220223-en
General
-
Target
tmp.exe
-
Size
706KB
-
MD5
953708e0cefbd35c124e526d9f7bd4d2
-
SHA1
5c3437b790aaca62b048c38f53584aedb6aaa118
-
SHA256
5598831a8a17b53751f4c34112c7c4b42d4906a6e73d60018ae8d499ce605580
-
SHA512
1b21b714b95ae43200b652178a99b815ac6f95a3e411497cf21592e3ecb788fe8e813a5d55299c044a3ec6ad362e584cce132801efcc2c64cc85324636969960
Malware Config
Extracted
xloader
2.5
vfm2
alfaiptvturkiye.com
snagged.xyz
sarrosh.com
jpitkin.com
shiningproent.com
welcommon.com
oglesheatandair.com
qtomdnwj.xyz
threemee-pictures.com
refractory.online
ethercut.com
uniformityenegotiate.com
hawktech.club
adventplus.online
tuntun-newmarket.com
tiendasnea.online
thegranitegalleria.com
trawk.club
gold2guide.art
skphoolmakhana.com
wataameclub.net
8x70i.xyz
nifaji.com
dixiebusybee.com
joshuathomaskelly.com
heibrain.xyz
lybelledynamics.xyz
tghi.xyz
happyvills.com
mammutisrael.com
livesworldwide.com
meganandbobbyprine.com
architectblaster.com
mobilecoin.art
campbellcomponents.com
vertex.icu
priorityinsuranceadvisors.com
businessfirstline.com
ugiltd.net
wisegatewebsite.com
terra-library.com
krppturfed.quest
smartstortech.net
rfwaa.com
aranehsdesigns.com
vuitton-louis.biz
kuwaitdigitalmarketing.com
theartofimprovement.com
veganwala.com
shopalilux.com
just4beauty.store
aftemb.com
linhstea.com
drdo-nstl.com
welfare-inc.com
brilliantshelf.com
influxair.com
peninsulaheatpump.com
uana.bet
xpressporn.com
mchc.xyz
auritype.com
kurals.cloud
foodtaing.com
fuckingmom.xyz
Signatures
-
Xloader Payload 3 IoCs
resource yara_rule behavioral1/memory/524-59-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/524-61-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/572-68-0x00000000000D0000-0x00000000000F9000-memory.dmp xloader -
Blocklisted process makes network request 1 IoCs
flow pid Process 42 572 msiexec.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1908 set thread context of 524 1908 tmp.exe 27 PID 524 set thread context of 1244 524 aspnet_compiler.exe 15 PID 572 set thread context of 1244 572 msiexec.exe 15 -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 524 aspnet_compiler.exe 524 aspnet_compiler.exe 572 msiexec.exe 572 msiexec.exe 572 msiexec.exe 572 msiexec.exe 572 msiexec.exe 572 msiexec.exe 572 msiexec.exe 572 msiexec.exe 572 msiexec.exe 572 msiexec.exe 572 msiexec.exe 572 msiexec.exe 572 msiexec.exe 572 msiexec.exe 572 msiexec.exe 572 msiexec.exe 572 msiexec.exe 572 msiexec.exe 572 msiexec.exe 572 msiexec.exe 572 msiexec.exe 572 msiexec.exe 572 msiexec.exe 572 msiexec.exe 572 msiexec.exe 572 msiexec.exe 572 msiexec.exe 572 msiexec.exe 572 msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1244 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 524 aspnet_compiler.exe 524 aspnet_compiler.exe 524 aspnet_compiler.exe 572 msiexec.exe 572 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1908 tmp.exe Token: SeDebugPrivilege 524 aspnet_compiler.exe Token: SeDebugPrivilege 572 msiexec.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1908 wrote to memory of 524 1908 tmp.exe 27 PID 1908 wrote to memory of 524 1908 tmp.exe 27 PID 1908 wrote to memory of 524 1908 tmp.exe 27 PID 1908 wrote to memory of 524 1908 tmp.exe 27 PID 1908 wrote to memory of 524 1908 tmp.exe 27 PID 1908 wrote to memory of 524 1908 tmp.exe 27 PID 1908 wrote to memory of 524 1908 tmp.exe 27 PID 1244 wrote to memory of 572 1244 Explorer.EXE 28 PID 1244 wrote to memory of 572 1244 Explorer.EXE 28 PID 1244 wrote to memory of 572 1244 Explorer.EXE 28 PID 1244 wrote to memory of 572 1244 Explorer.EXE 28 PID 1244 wrote to memory of 572 1244 Explorer.EXE 28 PID 1244 wrote to memory of 572 1244 Explorer.EXE 28 PID 1244 wrote to memory of 572 1244 Explorer.EXE 28 PID 572 wrote to memory of 904 572 msiexec.exe 29 PID 572 wrote to memory of 904 572 msiexec.exe 29 PID 572 wrote to memory of 904 572 msiexec.exe 29 PID 572 wrote to memory of 904 572 msiexec.exe 29
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:524
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵PID:904
-
-