Analysis
-
max time kernel
79s -
max time network
60s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
16-05-2022 16:59
Static task
static1
General
-
Target
a67522d0e3d5e271eabf5f5ba02e0c0b770c2c7167bf4a4fcbe886581ac4692a.exe
-
Size
589KB
-
MD5
5f80910a6d8580b533aee41ef221dd46
-
SHA1
6bc30286fa2efbe4745e65c81de94e85a5d2dd80
-
SHA256
a67522d0e3d5e271eabf5f5ba02e0c0b770c2c7167bf4a4fcbe886581ac4692a
-
SHA512
d0a5bc4aa9235603b3ef17fef1dbdd7914ad57e84819c140ff1461329604eb67812a4df788198cb64c3b0ee7da4e4eedd32d2d3eadf6c9de7a986254b6058a83
Malware Config
Extracted
xloader
2.5
r007
trashpandaservice.com
mobileads.network
ascolstore.com
gelsinextra.com
bonestell.net
heitoll.xyz
ceapgis.com
mon-lapin.biz
miq-eva.com
rematedesillas.com
playingonline.xyz
hausense.quest
tnyzw.com
appsdial.com
addcolor.city
hagenoblog.com
michaelwesleyj.com
she-zain.com
lorhsems.com
karmaserena.com
avatarrooms.com
friendsofrythmia.com
hdnhwy.com
firstnightfanfiction.net
vixflow.com
b8ceex.com
generatespeed.com
vaps02.com
climate-crisis.team
saturdaynightl.com
baro-drom.com
talleyresort.com
doctruyenovergeared.com
mogli-designz.info
politiciantunnel.com
housesyrron.com
troibrown.com
go-svetovanje.com
littlebittech.com
totallyglamplans.com
primeusatv.com
leifengping.com
halalfreshdelivery.com
gumbosgeorgetown.com
alittleraeoflight.com
xn--tckybzdtby655a5tj.xyz
wgassllc.xyz
craftandcloud.com
attorneyyochum.com
cryptocourse.one
bloomintegratedwellness.com
partypirateboatrentals.com
chainmio-top.xyz
mrjsloan.com
merryutilityservices.net
zglingbishi.com
wytchbytch.com
michigansharkettes.com
gerizon.net
texcelmed.com
cafe21-3.com
freemovies123.online
ungalfresh.com
sendungs.com
iot-vn.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3424-186-0x0000000000400000-0x000000000042A000-memory.dmp xloader behavioral1/memory/3424-187-0x000000000041D9B0-mapping.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
a67522d0e3d5e271eabf5f5ba02e0c0b770c2c7167bf4a4fcbe886581ac4692a.exedescription pid process target process PID 3768 set thread context of 3424 3768 a67522d0e3d5e271eabf5f5ba02e0c0b770c2c7167bf4a4fcbe886581ac4692a.exe a67522d0e3d5e271eabf5f5ba02e0c0b770c2c7167bf4a4fcbe886581ac4692a.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a67522d0e3d5e271eabf5f5ba02e0c0b770c2c7167bf4a4fcbe886581ac4692a.exepid process 3424 a67522d0e3d5e271eabf5f5ba02e0c0b770c2c7167bf4a4fcbe886581ac4692a.exe 3424 a67522d0e3d5e271eabf5f5ba02e0c0b770c2c7167bf4a4fcbe886581ac4692a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
a67522d0e3d5e271eabf5f5ba02e0c0b770c2c7167bf4a4fcbe886581ac4692a.exedescription pid process target process PID 3768 wrote to memory of 3424 3768 a67522d0e3d5e271eabf5f5ba02e0c0b770c2c7167bf4a4fcbe886581ac4692a.exe a67522d0e3d5e271eabf5f5ba02e0c0b770c2c7167bf4a4fcbe886581ac4692a.exe PID 3768 wrote to memory of 3424 3768 a67522d0e3d5e271eabf5f5ba02e0c0b770c2c7167bf4a4fcbe886581ac4692a.exe a67522d0e3d5e271eabf5f5ba02e0c0b770c2c7167bf4a4fcbe886581ac4692a.exe PID 3768 wrote to memory of 3424 3768 a67522d0e3d5e271eabf5f5ba02e0c0b770c2c7167bf4a4fcbe886581ac4692a.exe a67522d0e3d5e271eabf5f5ba02e0c0b770c2c7167bf4a4fcbe886581ac4692a.exe PID 3768 wrote to memory of 3424 3768 a67522d0e3d5e271eabf5f5ba02e0c0b770c2c7167bf4a4fcbe886581ac4692a.exe a67522d0e3d5e271eabf5f5ba02e0c0b770c2c7167bf4a4fcbe886581ac4692a.exe PID 3768 wrote to memory of 3424 3768 a67522d0e3d5e271eabf5f5ba02e0c0b770c2c7167bf4a4fcbe886581ac4692a.exe a67522d0e3d5e271eabf5f5ba02e0c0b770c2c7167bf4a4fcbe886581ac4692a.exe PID 3768 wrote to memory of 3424 3768 a67522d0e3d5e271eabf5f5ba02e0c0b770c2c7167bf4a4fcbe886581ac4692a.exe a67522d0e3d5e271eabf5f5ba02e0c0b770c2c7167bf4a4fcbe886581ac4692a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a67522d0e3d5e271eabf5f5ba02e0c0b770c2c7167bf4a4fcbe886581ac4692a.exe"C:\Users\Admin\AppData\Local\Temp\a67522d0e3d5e271eabf5f5ba02e0c0b770c2c7167bf4a4fcbe886581ac4692a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a67522d0e3d5e271eabf5f5ba02e0c0b770c2c7167bf4a4fcbe886581ac4692a.exe"C:\Users\Admin\AppData\Local\Temp\a67522d0e3d5e271eabf5f5ba02e0c0b770c2c7167bf4a4fcbe886581ac4692a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3424-186-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/3424-187-0x000000000041D9B0-mapping.dmp
-
memory/3424-188-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3424-189-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3424-190-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3424-193-0x0000000001600000-0x0000000001920000-memory.dmpFilesize
3.1MB
-
memory/3768-148-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-123-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-120-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-121-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-122-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-153-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-124-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-125-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-126-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-154-0x0000000007F20000-0x000000000841E000-memory.dmpFilesize
5.0MB
-
memory/3768-129-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-128-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-130-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-131-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-132-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-133-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-134-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-135-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-136-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-137-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-138-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-139-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-140-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-141-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-142-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-143-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-144-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-145-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-146-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-147-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-118-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-149-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-150-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-151-0x0000000000CD0000-0x0000000000D6A000-memory.dmpFilesize
616KB
-
memory/3768-182-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-119-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-127-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-155-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-156-0x0000000007AC0000-0x0000000007B52000-memory.dmpFilesize
584KB
-
memory/3768-157-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-158-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-159-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-160-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-161-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-162-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-163-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-164-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-165-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-166-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-167-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-168-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-169-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-170-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-171-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-172-0x0000000007A70000-0x0000000007A7A000-memory.dmpFilesize
40KB
-
memory/3768-173-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-174-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-175-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-176-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-177-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-178-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-179-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-180-0x0000000009D80000-0x0000000009D8A000-memory.dmpFilesize
40KB
-
memory/3768-117-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-181-0x000000000AFC0000-0x000000000B05C000-memory.dmpFilesize
624KB
-
memory/3768-152-0x0000000076F60000-0x00000000770EE000-memory.dmpFilesize
1.6MB
-
memory/3768-183-0x000000000B160000-0x000000000B1EC000-memory.dmpFilesize
560KB
-
memory/3768-184-0x000000000B260000-0x000000000B2C6000-memory.dmpFilesize
408KB
-
memory/3768-185-0x0000000004FC0000-0x0000000004FF0000-memory.dmpFilesize
192KB