Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
18-03-2022 14:29
Static task
static1
Behavioral task
behavioral1
Sample
SC51094.exe
Resource
win7-20220310-en
General
-
Target
SC51094.exe
-
Size
15KB
-
MD5
11a1903c8e55120bd87ffbbdd69ce5d5
-
SHA1
fe317a22318883df21958d41b51542a8f073c064
-
SHA256
4383e4fce4c6ea01fa19943595eff236f3c9a4470de9c790561db8592e0a92c0
-
SHA512
2b479072ce490a086773a8aa8d6d6aa9c900e21e8c31245182bd699f5ed539c05ad6839f70e8235cd56a5686a8e1f16a3e007dc0b6db1103cd98b93e60437db6
Malware Config
Extracted
xloader
2.5
ahc8
192451.com
wwwripostes.net
sirikhalsalaw.com
bitterbaybay.com
stella-scrubs.com
almanecermezcal.com
goodgood.online
translate-now.online
sincerefilm.com
quadrantforensics.com
johnfrenchart.com
plick-click.com
alnileen.com
tghi.xyz
172711.com
maymakita.com
punnyaseva.com
ukash-online.com
sho-yururi-blog.com
hebergement-solidaire.com
civicinfluencers.net
gzhf8888.com
kuleallstar.com
palisadeslodgecondos.com
holyhirschsprungs.com
azalearoseuk.com
jaggllc.com
italianrofrow.xyz
ioewur.xyz
3a5hlv.icu
kitcycle.com
estate.xyz
ankaraescortvip.xyz
richclubsite2001.xyz
kastore.website
515pleasantvalleyway.com
sittlermd.com
mytemple.group
tiny-wagen.com
sharaleesvintageflames.com
mentalesteem.com
sport-newss.online
fbve.space
lovingtruebloodindallas.com
eaglehospitality.biz
roofrepairnow.info
mcrosfts-updata.digital
cimpactinc.com
greatnotleyeast.com
lovely-tics.com
douglas-enterprise.com
dayannalima.online
ksodl.com
rainbowlampro.com
theinteriorsfurniture.com
eidmueller.email
cg020.online
gta6fuzhu.com
cinemaocity.com
hopeitivity.com
savageequipment.biz
groceriesbazaar.com
hempgotas.com
casino-pharaon-play.xyz
ralfrassendnk-login.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4128-136-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/4128-138-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/4064-144-0x0000000000AF0000-0x0000000000B19000-memory.dmp xloader -
Downloads MZ/PE file
-
Suspicious use of SetThreadContext 3 IoCs
Processes:
SC51094.exeSC51094.exesystray.exedescription pid process target process PID 2800 set thread context of 4128 2800 SC51094.exe SC51094.exe PID 4128 set thread context of 2060 4128 SC51094.exe Explorer.EXE PID 4064 set thread context of 2060 4064 systray.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
SC51094.exesystray.exepid process 4128 SC51094.exe 4128 SC51094.exe 4128 SC51094.exe 4128 SC51094.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe 4064 systray.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2060 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
SC51094.exesystray.exepid process 4128 SC51094.exe 4128 SC51094.exe 4128 SC51094.exe 4064 systray.exe 4064 systray.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
SC51094.exeSC51094.exesystray.exedescription pid process Token: SeDebugPrivilege 2800 SC51094.exe Token: SeDebugPrivilege 4128 SC51094.exe Token: SeDebugPrivilege 4064 systray.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
SC51094.exeExplorer.EXEsystray.exedescription pid process target process PID 2800 wrote to memory of 4128 2800 SC51094.exe SC51094.exe PID 2800 wrote to memory of 4128 2800 SC51094.exe SC51094.exe PID 2800 wrote to memory of 4128 2800 SC51094.exe SC51094.exe PID 2800 wrote to memory of 4128 2800 SC51094.exe SC51094.exe PID 2800 wrote to memory of 4128 2800 SC51094.exe SC51094.exe PID 2800 wrote to memory of 4128 2800 SC51094.exe SC51094.exe PID 2060 wrote to memory of 4064 2060 Explorer.EXE systray.exe PID 2060 wrote to memory of 4064 2060 Explorer.EXE systray.exe PID 2060 wrote to memory of 4064 2060 Explorer.EXE systray.exe PID 4064 wrote to memory of 4312 4064 systray.exe cmd.exe PID 4064 wrote to memory of 4312 4064 systray.exe cmd.exe PID 4064 wrote to memory of 4312 4064 systray.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SC51094.exe"C:\Users\Admin\AppData\Local\Temp\SC51094.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\SC51094.exe"C:\Users\Admin\AppData\Local\Temp\SC51094.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4128
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\SC51094.exe"3⤵PID:4312
-
-