Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220331-en -
submitted
04-04-2022 13:47
Static task
static1
Behavioral task
behavioral1
Sample
BLLLLAADDEE.exe
Resource
win7-20220331-en
General
-
Target
BLLLLAADDEE.exe
-
Size
35KB
-
MD5
0a8d67dc73dadb3aafaa35ba4c522a99
-
SHA1
80ef67fc098bd298cf4d286adaf1e59dbace8211
-
SHA256
ccc3111d1efd08344fdaa03990ed7029b09e1a5f014424760b6ae2eae5539829
-
SHA512
f768f28c5981a53f36b670dc356bed13c9311c81064f1b36b062731ca4f76a336a81b7f3d447b549198ab8b50bf401a7cc0876575261e3e66cee26f9c88d1b15
Malware Config
Extracted
xloader
2.5
ssac
beautybybrin.com
oregemo.com
prospectoriq.com
blazermid.com
cloudnineloans.com
myyntisofta.com
filoupoils.com
web-solutiontnpasumo3.xyz
becbares.com
lines-hikkoshi.com
ohayouwww.com
writingdadsobituarywithdad.com
bridalbaes.com
jamshir.com
rangertots.com
dankbrobeans.com
titan111.com
uplearns.info
maxicashprokil.xyz
evc24.com
mingshan888.com
thehomefurnishings.com
jjyive.space
vtkk.info
state-attorney.online
zoho.systems
nd300.com
ivermectinforanimals.ca
gruppobenedetto.com
planet99angka.xyz
astrotiq.com
fangshensj.com
ocean.limited
zalaridumpf.quest
cursolibreonline.com
lifein.art
identspactures.com
nfltvgo.com
chronicfit.store
mariajosereina.com
hebbz764776341.com
anpxlmmspix.mobi
mydevhub.tech
nobelrealm.com
dentalteamny.com
patinerd.com
socratisbey.xyz
hnylcwfs.com
yujieqin.com
midorato.com
sunglowdragon.com
americaplr.com
cxqdscape.com
situsgacor.xyz
sattlerei-dortmund.com
life120lospaccio.com
riddleme.one
perpustakaan-geominerba.online
renatafaceandbodyskincare.com
allkoreas.com
myvisitiq.com
candlesallday.com
poleador.com
4hsp116.com
homesbyvw.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3132-127-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/5004-135-0x00000000008A0000-0x00000000008C9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
BLLLLAADDEE.exeaspnet_compiler.exesystray.exedescription pid process target process PID 2080 set thread context of 3132 2080 BLLLLAADDEE.exe aspnet_compiler.exe PID 3132 set thread context of 2660 3132 aspnet_compiler.exe Explorer.EXE PID 5004 set thread context of 2660 5004 systray.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 60 IoCs
Processes:
aspnet_compiler.exesystray.exepid process 3132 aspnet_compiler.exe 3132 aspnet_compiler.exe 3132 aspnet_compiler.exe 3132 aspnet_compiler.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe 5004 systray.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2660 Explorer.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
aspnet_compiler.exesystray.exepid process 3132 aspnet_compiler.exe 3132 aspnet_compiler.exe 3132 aspnet_compiler.exe 5004 systray.exe 5004 systray.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
BLLLLAADDEE.exeaspnet_compiler.exesystray.exedescription pid process Token: SeDebugPrivilege 2080 BLLLLAADDEE.exe Token: SeDebugPrivilege 3132 aspnet_compiler.exe Token: SeDebugPrivilege 5004 systray.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
BLLLLAADDEE.exeExplorer.EXEsystray.exedescription pid process target process PID 2080 wrote to memory of 3132 2080 BLLLLAADDEE.exe aspnet_compiler.exe PID 2080 wrote to memory of 3132 2080 BLLLLAADDEE.exe aspnet_compiler.exe PID 2080 wrote to memory of 3132 2080 BLLLLAADDEE.exe aspnet_compiler.exe PID 2080 wrote to memory of 3132 2080 BLLLLAADDEE.exe aspnet_compiler.exe PID 2080 wrote to memory of 3132 2080 BLLLLAADDEE.exe aspnet_compiler.exe PID 2080 wrote to memory of 3132 2080 BLLLLAADDEE.exe aspnet_compiler.exe PID 2660 wrote to memory of 5004 2660 Explorer.EXE systray.exe PID 2660 wrote to memory of 5004 2660 Explorer.EXE systray.exe PID 2660 wrote to memory of 5004 2660 Explorer.EXE systray.exe PID 5004 wrote to memory of 3724 5004 systray.exe cmd.exe PID 5004 wrote to memory of 3724 5004 systray.exe cmd.exe PID 5004 wrote to memory of 3724 5004 systray.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\BLLLLAADDEE.exe"C:\Users\Admin\AppData\Local\Temp\BLLLLAADDEE.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2080-125-0x0000000006050000-0x00000000060EC000-memory.dmpFilesize
624KB
-
memory/2080-124-0x00000000009A0000-0x00000000009AC000-memory.dmpFilesize
48KB
-
memory/2660-131-0x0000000002E80000-0x0000000002F55000-memory.dmpFilesize
852KB
-
memory/2660-138-0x0000000008160000-0x000000000825C000-memory.dmpFilesize
1008KB
-
memory/3132-127-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3132-130-0x0000000000E40000-0x0000000000E51000-memory.dmpFilesize
68KB
-
memory/3132-129-0x0000000000EA0000-0x00000000011EA000-memory.dmpFilesize
3.3MB
-
memory/3132-126-0x0000000000000000-mapping.dmp
-
memory/3724-133-0x0000000000000000-mapping.dmp
-
memory/5004-132-0x0000000000000000-mapping.dmp
-
memory/5004-134-0x0000000000520000-0x0000000000526000-memory.dmpFilesize
24KB
-
memory/5004-135-0x00000000008A0000-0x00000000008C9000-memory.dmpFilesize
164KB
-
memory/5004-136-0x0000000002910000-0x0000000002C5A000-memory.dmpFilesize
3.3MB
-
memory/5004-137-0x00000000025B0000-0x0000000002640000-memory.dmpFilesize
576KB