Analysis
-
max time kernel
4294181s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20220223-en -
submitted
08-03-2022 13:09
Static task
static1
Behavioral task
behavioral1
Sample
dAkPKAwtoDLxTrD.exe
Resource
win7-20220223-en
General
-
Target
dAkPKAwtoDLxTrD.exe
-
Size
836KB
-
MD5
70546f38493221036fa4704f272ca6da
-
SHA1
33994e6316abe2f24c448d916fb53c5468d0f76e
-
SHA256
d0fd68de07eaddfd233b49bad8c222121ee284d8f783900d22e074accbcf7c2e
-
SHA512
a1cd4799dcd8e7b9cc56df71388faf0749e69a832e0b2ceb16f1956659ac1d24d8f1906e34b9ee2f94f686a43e80556014bb9f01a5ba5160224a40e30e30efbe
Malware Config
Extracted
xloader
2.5
b8eu
coeusconsultancy.com
allutravel.com
frustratedsportsfan.com
notch.host
cvkur.com
dunamisathletics.com
citycourtlafayetteclass.com
tastingpay.com
beriteautoglass.com
mexicanaenergy.com
karaokepkllkb.xyz
equiposymaquinasparamineria.com
fsmgayrimenkulbursa.com
femmequidanseaveclalune.com
frfrjrbfkfncifnsnqwnxbcb.com
jmwxhsbktiyq7.xyz
nevirame.com
wppaulwriter.com
anandiaper.xyz
krasamart.com
osakebatake.com
procofun.com
makingcash4u.online
tbrme.plus
nfqch.com
regitconvention.com
lawyer-kuchukov.online
encontrartrabajosbuscarmex.com
robyngauer.com
awarity.agency
holyhirschsprungs.com
katiesmobilestyling.com
rj3143.com
theheroinejourney.net
jktechsupport.com
smartlifestickpack.net
getelements.today
awaknofficial.com
officereinstatementsg.com
cgloansllc.com
infra-hiit.com
additionstore.com
zerotocloudengineers.com
rezendetube.com
tarotgatahechizos.com
tanakaya-jp.com
krakow-nagromadzenie.space
frontpage.asia
exclusivedigitalprinting.com
bacnebuster.com
zbhuizhu.com
amenosu.com
sgparking.com
ynov-lille.com
kazamiharutoki.com
nottryingdoing.com
healthyeatingbooknow.com
thevisionagency.net
bjhaqx.com
qhzhuhang.com
ferryal.xyz
diglib.info
soulshine.today
mamazdenka.com
millennialsofacertainage.com
Signatures
-
Xloader Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1048-64-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
dAkPKAwtoDLxTrD.exedescription pid process target process PID 756 set thread context of 1048 756 dAkPKAwtoDLxTrD.exe dAkPKAwtoDLxTrD.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 564 1048 WerFault.exe dAkPKAwtoDLxTrD.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
dAkPKAwtoDLxTrD.exedAkPKAwtoDLxTrD.exedescription pid process target process PID 756 wrote to memory of 1048 756 dAkPKAwtoDLxTrD.exe dAkPKAwtoDLxTrD.exe PID 756 wrote to memory of 1048 756 dAkPKAwtoDLxTrD.exe dAkPKAwtoDLxTrD.exe PID 756 wrote to memory of 1048 756 dAkPKAwtoDLxTrD.exe dAkPKAwtoDLxTrD.exe PID 756 wrote to memory of 1048 756 dAkPKAwtoDLxTrD.exe dAkPKAwtoDLxTrD.exe PID 756 wrote to memory of 1048 756 dAkPKAwtoDLxTrD.exe dAkPKAwtoDLxTrD.exe PID 756 wrote to memory of 1048 756 dAkPKAwtoDLxTrD.exe dAkPKAwtoDLxTrD.exe PID 756 wrote to memory of 1048 756 dAkPKAwtoDLxTrD.exe dAkPKAwtoDLxTrD.exe PID 1048 wrote to memory of 564 1048 dAkPKAwtoDLxTrD.exe WerFault.exe PID 1048 wrote to memory of 564 1048 dAkPKAwtoDLxTrD.exe WerFault.exe PID 1048 wrote to memory of 564 1048 dAkPKAwtoDLxTrD.exe WerFault.exe PID 1048 wrote to memory of 564 1048 dAkPKAwtoDLxTrD.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dAkPKAwtoDLxTrD.exe"C:\Users\Admin\AppData\Local\Temp\dAkPKAwtoDLxTrD.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\dAkPKAwtoDLxTrD.exe"C:\Users\Admin\AppData\Local\Temp\dAkPKAwtoDLxTrD.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1048 -s 363⤵
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/756-54-0x0000000001230000-0x0000000001308000-memory.dmpFilesize
864KB
-
memory/756-56-0x0000000007190000-0x0000000007191000-memory.dmpFilesize
4KB
-
memory/756-55-0x0000000073F20000-0x000000007460E000-memory.dmpFilesize
6.9MB
-
memory/756-57-0x00000000003D0000-0x00000000003E2000-memory.dmpFilesize
72KB
-
memory/756-58-0x0000000008370000-0x000000000841E000-memory.dmpFilesize
696KB
-
memory/756-59-0x00000000006C0000-0x00000000006F0000-memory.dmpFilesize
192KB
-
memory/1048-60-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1048-62-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1048-64-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB