Analysis
-
max time kernel
91s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 14:27
Static task
static1
General
-
Target
a01581f76331c0d9ac33410544e67422ad99c553d6c15a5d3d526c304c908554.exe
-
Size
728KB
-
MD5
7bf97c78987dee44d858343ed72da24b
-
SHA1
e2a445bc4e5923b355aa977cfc73a94e08706c36
-
SHA256
a01581f76331c0d9ac33410544e67422ad99c553d6c15a5d3d526c304c908554
-
SHA512
d86e85ea50a4e8fc766c48b509d7bcabf43167ce58f731b6273c5b8c385f15b03e4c914bde8c569f508ecd6e9a7ccf5ee21d8558ef60097d7d8581c0318ee27f
Malware Config
Extracted
xloader
2.5
r007
trashpandaservice.com
mobileads.network
ascolstore.com
gelsinextra.com
bonestell.net
heitoll.xyz
ceapgis.com
mon-lapin.biz
miq-eva.com
rematedesillas.com
playingonline.xyz
hausense.quest
tnyzw.com
appsdial.com
addcolor.city
hagenoblog.com
michaelwesleyj.com
she-zain.com
lorhsems.com
karmaserena.com
avatarrooms.com
friendsofrythmia.com
hdnhwy.com
firstnightfanfiction.net
vixflow.com
b8ceex.com
generatespeed.com
vaps02.com
climate-crisis.team
saturdaynightl.com
baro-drom.com
talleyresort.com
doctruyenovergeared.com
mogli-designz.info
politiciantunnel.com
housesyrron.com
troibrown.com
go-svetovanje.com
littlebittech.com
totallyglamplans.com
primeusatv.com
leifengping.com
halalfreshdelivery.com
gumbosgeorgetown.com
alittleraeoflight.com
xn--tckybzdtby655a5tj.xyz
wgassllc.xyz
craftandcloud.com
attorneyyochum.com
cryptocourse.one
bloomintegratedwellness.com
partypirateboatrentals.com
chainmio-top.xyz
mrjsloan.com
merryutilityservices.net
zglingbishi.com
wytchbytch.com
michigansharkettes.com
gerizon.net
texcelmed.com
cafe21-3.com
freemovies123.online
ungalfresh.com
sendungs.com
iot-vn.com
Signatures
-
Xloader Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/4276-137-0x0000000000400000-0x000000000042A000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
a01581f76331c0d9ac33410544e67422ad99c553d6c15a5d3d526c304c908554.exedescription pid process target process PID 2052 set thread context of 4276 2052 a01581f76331c0d9ac33410544e67422ad99c553d6c15a5d3d526c304c908554.exe a01581f76331c0d9ac33410544e67422ad99c553d6c15a5d3d526c304c908554.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
a01581f76331c0d9ac33410544e67422ad99c553d6c15a5d3d526c304c908554.exepid process 4276 a01581f76331c0d9ac33410544e67422ad99c553d6c15a5d3d526c304c908554.exe 4276 a01581f76331c0d9ac33410544e67422ad99c553d6c15a5d3d526c304c908554.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
a01581f76331c0d9ac33410544e67422ad99c553d6c15a5d3d526c304c908554.exedescription pid process target process PID 2052 wrote to memory of 4276 2052 a01581f76331c0d9ac33410544e67422ad99c553d6c15a5d3d526c304c908554.exe a01581f76331c0d9ac33410544e67422ad99c553d6c15a5d3d526c304c908554.exe PID 2052 wrote to memory of 4276 2052 a01581f76331c0d9ac33410544e67422ad99c553d6c15a5d3d526c304c908554.exe a01581f76331c0d9ac33410544e67422ad99c553d6c15a5d3d526c304c908554.exe PID 2052 wrote to memory of 4276 2052 a01581f76331c0d9ac33410544e67422ad99c553d6c15a5d3d526c304c908554.exe a01581f76331c0d9ac33410544e67422ad99c553d6c15a5d3d526c304c908554.exe PID 2052 wrote to memory of 4276 2052 a01581f76331c0d9ac33410544e67422ad99c553d6c15a5d3d526c304c908554.exe a01581f76331c0d9ac33410544e67422ad99c553d6c15a5d3d526c304c908554.exe PID 2052 wrote to memory of 4276 2052 a01581f76331c0d9ac33410544e67422ad99c553d6c15a5d3d526c304c908554.exe a01581f76331c0d9ac33410544e67422ad99c553d6c15a5d3d526c304c908554.exe PID 2052 wrote to memory of 4276 2052 a01581f76331c0d9ac33410544e67422ad99c553d6c15a5d3d526c304c908554.exe a01581f76331c0d9ac33410544e67422ad99c553d6c15a5d3d526c304c908554.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a01581f76331c0d9ac33410544e67422ad99c553d6c15a5d3d526c304c908554.exe"C:\Users\Admin\AppData\Local\Temp\a01581f76331c0d9ac33410544e67422ad99c553d6c15a5d3d526c304c908554.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a01581f76331c0d9ac33410544e67422ad99c553d6c15a5d3d526c304c908554.exe"C:\Users\Admin\AppData\Local\Temp\a01581f76331c0d9ac33410544e67422ad99c553d6c15a5d3d526c304c908554.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2052-130-0x0000000000800000-0x00000000008BC000-memory.dmpFilesize
752KB
-
memory/2052-131-0x0000000005780000-0x0000000005D24000-memory.dmpFilesize
5.6MB
-
memory/2052-132-0x0000000005270000-0x0000000005302000-memory.dmpFilesize
584KB
-
memory/2052-133-0x0000000005420000-0x00000000054BC000-memory.dmpFilesize
624KB
-
memory/2052-134-0x0000000005400000-0x000000000540A000-memory.dmpFilesize
40KB
-
memory/2052-135-0x0000000009110000-0x0000000009176000-memory.dmpFilesize
408KB
-
memory/4276-136-0x0000000000000000-mapping.dmp
-
memory/4276-137-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/4276-138-0x00000000016E0000-0x0000000001A2A000-memory.dmpFilesize
3.3MB