Analysis
-
max time kernel
4294181s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
08-03-2022 10:36
Static task
static1
Behavioral task
behavioral1
Sample
PO.exe
Resource
win7-20220223-en
General
-
Target
PO.exe
-
Size
906KB
-
MD5
d87832e3f675ffd9d871f455ffa55ff1
-
SHA1
8d2a9daa0caf5fad0159ed2233d56bf94b8e7337
-
SHA256
31f44a55873cb84506a1213469e0c884eb7f8b4dea91197bedf8a892c1404654
-
SHA512
779258a90d6552c09b132b01b80418054c9a972d797d91c8e202644594a487da60653777137f6acf1ad8ad4d7e8b873bb88505338a126923f9876c9c7499adf9
Malware Config
Extracted
xloader
2.5
yrcy
sturlabas.com
tantrungcompany.com
wildgraceyogahealing.com
wsparalegal.com
8xhgq.xyz
mysaylav.com
amelntl.net
cooleshow.online
adventuresbydisneyathome.com
sprinklekart.com
prostitutkitambovasuck.info
pakdao.com
finsith.com
nightpartner82.xyz
sex9a4ufbj.com
ketohousee.com
mairie-les-cammazes.com
elebots.xyz
highqualityremodeling.net
teamsterslocal553.com
rws3.xyz
ngucocloisua.online
waiting-game.com
chauffeureddriven.com
makemusictemecula.com
17taol.com
big-swindle.com
surveycourses.com
my-safqati.com
gn-powerplants.com
colorgameph.com
jaysingpurchessacademy.com
onlinedon.net
sebashtiana.com
vitamincfood.com
thesportcollective.com
tradableassettokens.com
worldhealthnutrition.com
let-value.com
tanyademby.com
tollesonhouses.com
puzzleadventure.city
mindsetolimpionico.com
krakenind.com
investorsbak.com
tenloe049.xyz
gooddeals4u.online
adelphosformacao.com
cyndeiversondesigns.com
hrofmdieh.com
volucercab.com
bitcoindatai.com
gokelmining.com
magicbasketbourse.net
myblessedgeneration.com
super-trade.online
onevishnu.online
ctr-expert.com
globalitinfra.com
lickmychili.com
0xbot.net
91aaa.net
b3yg6g.com
ruleship.com
lifescreativeflow.com
Signatures
-
Xloader Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1956-64-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
PO.exedescription pid process target process PID 1636 set thread context of 1956 1636 PO.exe RegSvcs.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2016 1956 WerFault.exe RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
PO.exepid process 1636 PO.exe 1636 PO.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
PO.exedescription pid process Token: SeDebugPrivilege 1636 PO.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
PO.exeRegSvcs.exedescription pid process target process PID 1636 wrote to memory of 1956 1636 PO.exe RegSvcs.exe PID 1636 wrote to memory of 1956 1636 PO.exe RegSvcs.exe PID 1636 wrote to memory of 1956 1636 PO.exe RegSvcs.exe PID 1636 wrote to memory of 1956 1636 PO.exe RegSvcs.exe PID 1636 wrote to memory of 1956 1636 PO.exe RegSvcs.exe PID 1636 wrote to memory of 1956 1636 PO.exe RegSvcs.exe PID 1636 wrote to memory of 1956 1636 PO.exe RegSvcs.exe PID 1636 wrote to memory of 1956 1636 PO.exe RegSvcs.exe PID 1636 wrote to memory of 1956 1636 PO.exe RegSvcs.exe PID 1636 wrote to memory of 1956 1636 PO.exe RegSvcs.exe PID 1956 wrote to memory of 2016 1956 RegSvcs.exe WerFault.exe PID 1956 wrote to memory of 2016 1956 RegSvcs.exe WerFault.exe PID 1956 wrote to memory of 2016 1956 RegSvcs.exe WerFault.exe PID 1956 wrote to memory of 2016 1956 RegSvcs.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO.exe"C:\Users\Admin\AppData\Local\Temp\PO.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1956 -s 363⤵
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1636-54-0x0000000001130000-0x0000000001218000-memory.dmpFilesize
928KB
-
memory/1636-55-0x0000000074BE0000-0x00000000752CE000-memory.dmpFilesize
6.9MB
-
memory/1636-56-0x00000000010E0000-0x00000000010E1000-memory.dmpFilesize
4KB
-
memory/1636-57-0x0000000000320000-0x0000000000332000-memory.dmpFilesize
72KB
-
memory/1636-58-0x0000000007E60000-0x0000000007F0E000-memory.dmpFilesize
696KB
-
memory/1636-59-0x0000000000B80000-0x0000000000BB0000-memory.dmpFilesize
192KB
-
memory/1956-60-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1956-62-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1956-64-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB