Analysis
-
max time kernel
55s -
max time network
50s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
28-02-2022 09:36
Static task
static1
General
-
Target
60b97b4d45e3850d57a661bf37987909c1f99096384123594cc1b79d5449348f.exe
-
Size
1.0MB
-
MD5
5d6dba1a42b0579aea51e3875bd171c4
-
SHA1
bacbe628d565ede6c15550469e912a1c6bba16ee
-
SHA256
60b97b4d45e3850d57a661bf37987909c1f99096384123594cc1b79d5449348f
-
SHA512
20ba7979b210768c4cb83f1849e240b28389a946d2ac12986bffb1a8309ddbcb33ac0235b30a821fdccbe0c11aa19de61037f92dcb8b1d0e1d5a0243ed540b0f
Malware Config
Extracted
xloader
2.5
mc3w
pegasusworlddigital.com
lumbungpanganreborn.com
familyresourcesystems.com
smallbusniessbenefits.com
strategia-firm.xyz
rokkos.club
geo1.tirol
dreamnft.xyz
yourprofits6.com
plshi.top
atmosferas.net
appcast-76.com
lilufigu.digital
jobby.guide
bregnic.art
stooshbotanicals.com
tiktok-lifts.com
dozercafe.com
parmarthmissionhospital.com
yufude.com
allcardz.com
wx0526.xyz
doubletop-condos.com
13f465.com
teorialegten.quest
exclusivoclub.com
raedunn.store
bw-teleapps.xyz
flordedesierto.com
justpeachyprints.com
allbuts.com
tenlog029.xyz
gingure.com
lightblantoyof2.xyz
julieconaway.com
countryharvestcrafts.com
capital-system.pro
thesilkpillowcase.online
mymanicdaydream.com
1000hap.com
jyym88.com
texasforblanchard.com
homeschoolsavior.com
danenlen.com
matthathaway.photography
myfamilyinfo.xyz
suvsdealsonlinesearchcusweb.com
findzx.net
self-mastery.academy
homini.xyz
sastryg.com
beautifulingodseyes.com
cafecocophilly.com
bglmart.com
xueyoulan.com
lypbenlf.xyz
enbireysel.com
dmedicalequipment.store
loveforindiawalton.com
prepizy.com
arizonanftea.com
pakaoagroindustry.com
30northenvironmental.com
drandulet.online
jpegartists.com
Signatures
-
Xloader Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2056-125-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
60b97b4d45e3850d57a661bf37987909c1f99096384123594cc1b79d5449348f.exedescription pid process target process PID 3016 set thread context of 2056 3016 60b97b4d45e3850d57a661bf37987909c1f99096384123594cc1b79d5449348f.exe 60b97b4d45e3850d57a661bf37987909c1f99096384123594cc1b79d5449348f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
60b97b4d45e3850d57a661bf37987909c1f99096384123594cc1b79d5449348f.exepid process 2056 60b97b4d45e3850d57a661bf37987909c1f99096384123594cc1b79d5449348f.exe 2056 60b97b4d45e3850d57a661bf37987909c1f99096384123594cc1b79d5449348f.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
60b97b4d45e3850d57a661bf37987909c1f99096384123594cc1b79d5449348f.exedescription pid process target process PID 3016 wrote to memory of 2056 3016 60b97b4d45e3850d57a661bf37987909c1f99096384123594cc1b79d5449348f.exe 60b97b4d45e3850d57a661bf37987909c1f99096384123594cc1b79d5449348f.exe PID 3016 wrote to memory of 2056 3016 60b97b4d45e3850d57a661bf37987909c1f99096384123594cc1b79d5449348f.exe 60b97b4d45e3850d57a661bf37987909c1f99096384123594cc1b79d5449348f.exe PID 3016 wrote to memory of 2056 3016 60b97b4d45e3850d57a661bf37987909c1f99096384123594cc1b79d5449348f.exe 60b97b4d45e3850d57a661bf37987909c1f99096384123594cc1b79d5449348f.exe PID 3016 wrote to memory of 2056 3016 60b97b4d45e3850d57a661bf37987909c1f99096384123594cc1b79d5449348f.exe 60b97b4d45e3850d57a661bf37987909c1f99096384123594cc1b79d5449348f.exe PID 3016 wrote to memory of 2056 3016 60b97b4d45e3850d57a661bf37987909c1f99096384123594cc1b79d5449348f.exe 60b97b4d45e3850d57a661bf37987909c1f99096384123594cc1b79d5449348f.exe PID 3016 wrote to memory of 2056 3016 60b97b4d45e3850d57a661bf37987909c1f99096384123594cc1b79d5449348f.exe 60b97b4d45e3850d57a661bf37987909c1f99096384123594cc1b79d5449348f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\60b97b4d45e3850d57a661bf37987909c1f99096384123594cc1b79d5449348f.exe"C:\Users\Admin\AppData\Local\Temp\60b97b4d45e3850d57a661bf37987909c1f99096384123594cc1b79d5449348f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\60b97b4d45e3850d57a661bf37987909c1f99096384123594cc1b79d5449348f.exe"C:\Users\Admin\AppData\Local\Temp\60b97b4d45e3850d57a661bf37987909c1f99096384123594cc1b79d5449348f.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2056