Analysis
-
max time kernel
1559s -
max time network
1562s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
28-02-2022 11:21
Static task
static1
Behavioral task
behavioral1
Sample
5d6dba1a42b0579aea51e3875bd171c4.exe
Resource
win7-en-20211208
General
-
Target
5d6dba1a42b0579aea51e3875bd171c4.exe
-
Size
1.0MB
-
MD5
5d6dba1a42b0579aea51e3875bd171c4
-
SHA1
bacbe628d565ede6c15550469e912a1c6bba16ee
-
SHA256
60b97b4d45e3850d57a661bf37987909c1f99096384123594cc1b79d5449348f
-
SHA512
20ba7979b210768c4cb83f1849e240b28389a946d2ac12986bffb1a8309ddbcb33ac0235b30a821fdccbe0c11aa19de61037f92dcb8b1d0e1d5a0243ed540b0f
Malware Config
Extracted
xloader
2.5
mc3w
pegasusworlddigital.com
lumbungpanganreborn.com
familyresourcesystems.com
smallbusniessbenefits.com
strategia-firm.xyz
rokkos.club
geo1.tirol
dreamnft.xyz
yourprofits6.com
plshi.top
atmosferas.net
appcast-76.com
lilufigu.digital
jobby.guide
bregnic.art
stooshbotanicals.com
tiktok-lifts.com
dozercafe.com
parmarthmissionhospital.com
yufude.com
allcardz.com
wx0526.xyz
doubletop-condos.com
13f465.com
teorialegten.quest
exclusivoclub.com
raedunn.store
bw-teleapps.xyz
flordedesierto.com
justpeachyprints.com
allbuts.com
tenlog029.xyz
gingure.com
lightblantoyof2.xyz
julieconaway.com
countryharvestcrafts.com
capital-system.pro
thesilkpillowcase.online
mymanicdaydream.com
1000hap.com
jyym88.com
texasforblanchard.com
homeschoolsavior.com
danenlen.com
matthathaway.photography
myfamilyinfo.xyz
suvsdealsonlinesearchcusweb.com
findzx.net
self-mastery.academy
homini.xyz
sastryg.com
beautifulingodseyes.com
cafecocophilly.com
bglmart.com
xueyoulan.com
lypbenlf.xyz
enbireysel.com
dmedicalequipment.store
loveforindiawalton.com
prepizy.com
arizonanftea.com
pakaoagroindustry.com
30northenvironmental.com
drandulet.online
jpegartists.com
Signatures
-
Xloader Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1204-63-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
5d6dba1a42b0579aea51e3875bd171c4.exedescription pid process target process PID 1668 set thread context of 1204 1668 5d6dba1a42b0579aea51e3875bd171c4.exe 5d6dba1a42b0579aea51e3875bd171c4.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
5d6dba1a42b0579aea51e3875bd171c4.exepid process 1204 5d6dba1a42b0579aea51e3875bd171c4.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
5d6dba1a42b0579aea51e3875bd171c4.exedescription pid process target process PID 1668 wrote to memory of 1204 1668 5d6dba1a42b0579aea51e3875bd171c4.exe 5d6dba1a42b0579aea51e3875bd171c4.exe PID 1668 wrote to memory of 1204 1668 5d6dba1a42b0579aea51e3875bd171c4.exe 5d6dba1a42b0579aea51e3875bd171c4.exe PID 1668 wrote to memory of 1204 1668 5d6dba1a42b0579aea51e3875bd171c4.exe 5d6dba1a42b0579aea51e3875bd171c4.exe PID 1668 wrote to memory of 1204 1668 5d6dba1a42b0579aea51e3875bd171c4.exe 5d6dba1a42b0579aea51e3875bd171c4.exe PID 1668 wrote to memory of 1204 1668 5d6dba1a42b0579aea51e3875bd171c4.exe 5d6dba1a42b0579aea51e3875bd171c4.exe PID 1668 wrote to memory of 1204 1668 5d6dba1a42b0579aea51e3875bd171c4.exe 5d6dba1a42b0579aea51e3875bd171c4.exe PID 1668 wrote to memory of 1204 1668 5d6dba1a42b0579aea51e3875bd171c4.exe 5d6dba1a42b0579aea51e3875bd171c4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d6dba1a42b0579aea51e3875bd171c4.exe"C:\Users\Admin\AppData\Local\Temp\5d6dba1a42b0579aea51e3875bd171c4.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\5d6dba1a42b0579aea51e3875bd171c4.exe"C:\Users\Admin\AppData\Local\Temp\5d6dba1a42b0579aea51e3875bd171c4.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1204