Analysis
-
max time kernel
4294211s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220311-en -
submitted
14-04-2022 12:42
Static task
static1
Behavioral task
behavioral1
Sample
1e5f87fba7b8c1e64c49d6ebd738bae96460864d8f1ba6fe5d30a345b641bdf9.exe
Resource
win7-20220311-en
General
-
Target
1e5f87fba7b8c1e64c49d6ebd738bae96460864d8f1ba6fe5d30a345b641bdf9.exe
-
Size
742KB
-
MD5
02f58acd16b13f5b147a5daab976103e
-
SHA1
8f353483ac4437fd5bcb090acc82326d533a8250
-
SHA256
1e5f87fba7b8c1e64c49d6ebd738bae96460864d8f1ba6fe5d30a345b641bdf9
-
SHA512
4dc3fa6075d142700fa5d624c54fe158a2470f06361cc4fbcefc3b8888b9b33aab4ea3e0dda36e5a4b3b534789e8eebec9ec0d12aeb104bc6e1b5e2bf810762c
Malware Config
Extracted
xloader
2.1
igqu
coveloungewineandwhiskey.com
chemtradent.com
educare.cloud
shopnicknaks.com
realitytvstockwatch.com
handsfreedocs.com
trafegopago.com
ariasu-nakanokaikei.com
allmm.info
elleatx.com
erpsystem.site
whatisastaxanthin.com
hemparcade.com
ownumo.com
pasumaisangam.com
theoutdoorbed.com
plantpowered.energy
elevenelevenapparelcompany.com
vrspace.ltd
justsoldbykristen.com
pintudada.com
147design.com
cashintl.com
atal.ltd
forbigdogs.com
onlineshoppingisbest.com
pharmacysouq.com
placeduconfort.com
lotoencasa.com
mobileoilxchange.com
rockinglifefromhome.com
covid19salivatestdirect.com
hyx20140813.com
indorebodybilaspur.com
heartandcrowncloset.com
fireandcrystal.com
rbnrf.com
obsessingwealth.com
yslh88.com
guidesgold.net
thoughtslate.com
primeworldgroup.com
yogapants.xyz
lostandfoundpetsalabaster.com
dua.fund
namofast.com
royaloakpublishing.com
gayfuse.com
tumulusanalytics.com
kayapallisgaard.com
ppc-listing.info
allan-wren.com
uneducationofamerica.com
majhulworld.com
the-gongs.com
hybrideve.com
lwpevolve.com
fahufu.com
k-fpa.com
roboleadsystem.com
capitalcitybombers.com
searchnehomes.com
maninhatphoto.com
happinestbuilders.com
sweetbasilmarketing.com
Signatures
-
Xloader Payload 3 IoCs
resource yara_rule behavioral1/memory/1912-61-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/1912-62-0x000000000041CA30-mapping.dmp xloader behavioral1/memory/1976-71-0x0000000000090000-0x00000000000B8000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1968 set thread context of 1912 1968 1e5f87fba7b8c1e64c49d6ebd738bae96460864d8f1ba6fe5d30a345b641bdf9.exe 29 PID 1912 set thread context of 1272 1912 MSBuild.exe 19 PID 1976 set thread context of 1272 1976 cmstp.exe 19 -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1912 MSBuild.exe 1912 MSBuild.exe 1976 cmstp.exe 1976 cmstp.exe 1976 cmstp.exe 1976 cmstp.exe 1976 cmstp.exe 1976 cmstp.exe 1976 cmstp.exe 1976 cmstp.exe 1976 cmstp.exe 1976 cmstp.exe 1976 cmstp.exe 1976 cmstp.exe 1976 cmstp.exe 1976 cmstp.exe 1976 cmstp.exe 1976 cmstp.exe 1976 cmstp.exe 1976 cmstp.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1912 MSBuild.exe 1912 MSBuild.exe 1912 MSBuild.exe 1976 cmstp.exe 1976 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1912 MSBuild.exe Token: SeDebugPrivilege 1976 cmstp.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1272 Explorer.EXE 1272 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 1272 Explorer.EXE 1272 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1912 1968 1e5f87fba7b8c1e64c49d6ebd738bae96460864d8f1ba6fe5d30a345b641bdf9.exe 29 PID 1968 wrote to memory of 1912 1968 1e5f87fba7b8c1e64c49d6ebd738bae96460864d8f1ba6fe5d30a345b641bdf9.exe 29 PID 1968 wrote to memory of 1912 1968 1e5f87fba7b8c1e64c49d6ebd738bae96460864d8f1ba6fe5d30a345b641bdf9.exe 29 PID 1968 wrote to memory of 1912 1968 1e5f87fba7b8c1e64c49d6ebd738bae96460864d8f1ba6fe5d30a345b641bdf9.exe 29 PID 1968 wrote to memory of 1912 1968 1e5f87fba7b8c1e64c49d6ebd738bae96460864d8f1ba6fe5d30a345b641bdf9.exe 29 PID 1968 wrote to memory of 1912 1968 1e5f87fba7b8c1e64c49d6ebd738bae96460864d8f1ba6fe5d30a345b641bdf9.exe 29 PID 1968 wrote to memory of 1912 1968 1e5f87fba7b8c1e64c49d6ebd738bae96460864d8f1ba6fe5d30a345b641bdf9.exe 29 PID 1272 wrote to memory of 1976 1272 Explorer.EXE 30 PID 1272 wrote to memory of 1976 1272 Explorer.EXE 30 PID 1272 wrote to memory of 1976 1272 Explorer.EXE 30 PID 1272 wrote to memory of 1976 1272 Explorer.EXE 30 PID 1272 wrote to memory of 1976 1272 Explorer.EXE 30 PID 1272 wrote to memory of 1976 1272 Explorer.EXE 30 PID 1272 wrote to memory of 1976 1272 Explorer.EXE 30 PID 1976 wrote to memory of 1344 1976 cmstp.exe 31 PID 1976 wrote to memory of 1344 1976 cmstp.exe 31 PID 1976 wrote to memory of 1344 1976 cmstp.exe 31 PID 1976 wrote to memory of 1344 1976 cmstp.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\1e5f87fba7b8c1e64c49d6ebd738bae96460864d8f1ba6fe5d30a345b641bdf9.exe"C:\Users\Admin\AppData\Local\Temp\1e5f87fba7b8c1e64c49d6ebd738bae96460864d8f1ba6fe5d30a345b641bdf9.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1912
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:1344
-
-