Analysis
-
max time kernel
4294423s -
max time network
365s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
22-03-2022 08:31
Static task
static1
Behavioral task
behavioral1
Sample
f5G3iGDs25iJjZE.exe
Resource
win7-20220310-en
General
-
Target
f5G3iGDs25iJjZE.exe
-
Size
1.1MB
-
MD5
33899614b3fe24bc02dfb4c1f84dabdc
-
SHA1
8dbc988c06f51cce14e4cc95717241fb1521fac6
-
SHA256
b36891ab4a7fa6be1680a65614dd5551a3fa8a89052c381a954601eedd82e62c
-
SHA512
30058e2e8d6da6b5e0db01cdab70cfb9af8bfb93aed69a009cdba0f1be4c9b805472a531a5abd4dc56f46349ff43a6ce797e98123898719a38e5329920aac5ad
Malware Config
Extracted
xloader
2.5
wdc8
mygotomaid.com
joyoushealthandwellnessspa.com
wefundprojects.com
magicbasketbourse.net
vitos3.xyz
oligopoly.city
beauty-bihada.asia
visitnewrichmond.com
crgeniusworld.biz
bantasis.com
transsexual.pro
casagraph.com
eastjamrecords.com
howtotrainyourmustache.com
heiappropriate.xyz
bataperu.com
ces341.com
prajahitha.com
manuelagattegger.com
wolfpackmotorcycletours.com
yulietrojas.com
dariven.com
dd13thsept.net
kalpeshvasoya.com
theavarosecollection.com
bloody-randoms.com
yngo-arca.com
dealsoffer.xyz
marellaweddingplanner.com
seowongoopain.com
omightygod.com
dqblog.net
thethreadedbrow.com
medflex.center
filpify.com
chaletxp.com
santanderburge.com
171341.com
shannongroves.com
sisoow.quest
harleybowd.com
cardioflextech.com
exspv.com
permianbasinautismacademy.info
gardenchipvip.com
onsitemarketingsolutions.com
cvwerg.com
theketocopywriter.com
telarte-ceramicas.com
j2ig529zbahs.biz
oxygenii.com
extralegally.info
hbdlaq.com
themountainkings.com
fibliz.com
skyrangersfoundation.com
forbabylon.net
weilaiyitj.com
supplementstoreryp.com
thehappyartnook.com
houzzcoin.com
heyitsnew.com
jonnystokes.com
venuesgrantprogram.com
hamiltonrealestate.online
Signatures
-
Xloader Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1620-64-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
f5G3iGDs25iJjZE.exedescription pid process target process PID 740 set thread context of 1620 740 f5G3iGDs25iJjZE.exe f5G3iGDs25iJjZE.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1968 1620 WerFault.exe f5G3iGDs25iJjZE.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
f5G3iGDs25iJjZE.exef5G3iGDs25iJjZE.exedescription pid process target process PID 740 wrote to memory of 1620 740 f5G3iGDs25iJjZE.exe f5G3iGDs25iJjZE.exe PID 740 wrote to memory of 1620 740 f5G3iGDs25iJjZE.exe f5G3iGDs25iJjZE.exe PID 740 wrote to memory of 1620 740 f5G3iGDs25iJjZE.exe f5G3iGDs25iJjZE.exe PID 740 wrote to memory of 1620 740 f5G3iGDs25iJjZE.exe f5G3iGDs25iJjZE.exe PID 740 wrote to memory of 1620 740 f5G3iGDs25iJjZE.exe f5G3iGDs25iJjZE.exe PID 740 wrote to memory of 1620 740 f5G3iGDs25iJjZE.exe f5G3iGDs25iJjZE.exe PID 740 wrote to memory of 1620 740 f5G3iGDs25iJjZE.exe f5G3iGDs25iJjZE.exe PID 1620 wrote to memory of 1968 1620 f5G3iGDs25iJjZE.exe WerFault.exe PID 1620 wrote to memory of 1968 1620 f5G3iGDs25iJjZE.exe WerFault.exe PID 1620 wrote to memory of 1968 1620 f5G3iGDs25iJjZE.exe WerFault.exe PID 1620 wrote to memory of 1968 1620 f5G3iGDs25iJjZE.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5G3iGDs25iJjZE.exe"C:\Users\Admin\AppData\Local\Temp\f5G3iGDs25iJjZE.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\f5G3iGDs25iJjZE.exe"C:\Users\Admin\AppData\Local\Temp\f5G3iGDs25iJjZE.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1620 -s 363⤵
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/740-54-0x0000000074A50000-0x000000007513E000-memory.dmpFilesize
6.9MB
-
memory/740-55-0x0000000000880000-0x000000000099C000-memory.dmpFilesize
1.1MB
-
memory/740-56-0x0000000004BD0000-0x0000000004BD1000-memory.dmpFilesize
4KB
-
memory/740-57-0x0000000000840000-0x0000000000858000-memory.dmpFilesize
96KB
-
memory/740-58-0x00000000080C0000-0x00000000081B8000-memory.dmpFilesize
992KB
-
memory/740-59-0x0000000002080000-0x00000000020B0000-memory.dmpFilesize
192KB
-
memory/1620-60-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1620-62-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1620-64-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB