Analysis
-
max time kernel
76s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
21-06-2022 19:06
Static task
static1
Behavioral task
behavioral1
Sample
a09f93f7606aa64851c9a8f82317b72f.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
a09f93f7606aa64851c9a8f82317b72f.exe
Resource
win10v2004-20220414-en
General
-
Target
a09f93f7606aa64851c9a8f82317b72f.exe
-
Size
517KB
-
MD5
a09f93f7606aa64851c9a8f82317b72f
-
SHA1
c33ea2eb219a088610847905251e5e2c3d2c87a2
-
SHA256
c9777cb78779de98104f1a01584f9df07e39b7ace7d5e6686d225e7261bd9447
-
SHA512
c5923ec47cc02a048fbbe8876c6f982d56dd6ea8936848db5a51ec6ad8ce16df9271a00c187a9ea653beaa490ba769c1339a5c3384180ba4d3961c471b7dfd59
Malware Config
Extracted
xloader
2.8
nn40
LYAg0yANOGEAGeaFOrA/
MQWuERZplP+VZy/uszI=
CF0oDN0JimIaGy/uszI=
ltJnyC+ReohYaiTvj1qbEA==
B9OkgdctVKBAFjSUaw==
sbDVwSZVVqVB11/deow8GA==
v1gHDe0pzno=
i+/0n2vHUfGPR98k77tukZ90MQ==
SUtCnbS96Qm21g==
8X9qzyt1dpAo31jXrXfKb49fBPY=
5KlPxqHzSstuFjSUaw==
0r/Kesv/zuanroxvNQW0Gm8=
FFgS7kfPYAqpdhhgRgnBJHY=
LgusAHrkrIoWr0FWIe2o/04UXPw=
vBq9Gvxa9wbKbS/uszI=
Z+q6HAZNNeqwwQ==
wbS4fMb06SjU5Kbseow8GA==
1mZEuZvJ/m0L9bof56PkkZ90MQ==
JCJIM74lHk/o+tiFOrA/
d14FrM8rGEgIzVkT67+3XaEh
OtJqJTaZyD/bgy/uszI=
MMzqpo3pVjbaigine/p4W6dqZPJKkg==
LRS4MpnBeVxC/bqjf0kMBGop69QC
7FTxgWaTLAKbm3B0QgW0Gm8=
hjbYktAyum2JNK6N
WRtxyNlENeqwwQ==
MTOKH+0pzno=
8LkJ8EsWWHIK
zs758oMTaffAxI0bn2uqFw==
ariAXDqMsKpwF5U=
UEZOAmXFnpRh+rqD
T5e5xzlTNeqwwQ==
tp424+UDomI=
Y7VXD+I8CKVuDZQ=
zg6qeGbHO1F+FjSUaw==
JPypEB2CuDAz+bXSrjo=
8ah8cf5odcPNS+Sa
k+CGNhyOMKVuDZQ=
oVviitkD8B7ZmijeyIDFOI9nZPJKkg==
TtztqHfKKqQWuVRvT9fSSpJJmAFYLjw=
p6pvJHfZmJgx6XwYuL56b798MA==
WWmegczy4x2O+cIC27RtkZ90MQ==
/QrLiDyde3RJWRwRmWYo
PtShJAZG1WU6LP3osjo=
ZTrOf2PMho1kdm/JtSU=
A1ssC+pS8dvNS+Sa
K4g38tVda8DNS+Sa
Dz7fj13DnKh1iV8++X2H8Fbeq1jBGh4D
0AjPwNQtnWUEpDBAJbq9GG8p69QC
ALhKrIu7/5BTRf1OQAW0Gm8=
a5Zp3GrGWhzmrBYRmWYo
dwzcQzpnYYAi8G7eypfSS6d3oWmQnQ==
VR3AHfcDyG79m6bm0YnEOEBS/fQ=
pyZFKiWXNaVuDZQ=
dzf0zzBlYaqLFjSUaw==
D6TIj16hJ8JhJMom8rlxkZ90MQ==
8qkyvpp56Qm21g==
4qNmKHymVg3Bx4M=
MOiH6DRYhutyFjSUaw==
JqTDnm+zOQLV+83Ucm9GDw==
YQilIAQqUM5vFjSUaw==
84U/nbvTQwzcyQ==
mC34kB9LdeJuFjSUaw==
DKLKrbwuuWyJNK6N
thisismyhomevalue.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2020-62-0x0000000000400000-0x000000000042C000-memory.dmp xloader behavioral1/memory/2020-63-0x000000000041F640-mapping.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
a09f93f7606aa64851c9a8f82317b72f.exedescription pid process target process PID 972 set thread context of 2020 972 a09f93f7606aa64851c9a8f82317b72f.exe a09f93f7606aa64851c9a8f82317b72f.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
a09f93f7606aa64851c9a8f82317b72f.exepid process 2020 a09f93f7606aa64851c9a8f82317b72f.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
a09f93f7606aa64851c9a8f82317b72f.exedescription pid process target process PID 972 wrote to memory of 2020 972 a09f93f7606aa64851c9a8f82317b72f.exe a09f93f7606aa64851c9a8f82317b72f.exe PID 972 wrote to memory of 2020 972 a09f93f7606aa64851c9a8f82317b72f.exe a09f93f7606aa64851c9a8f82317b72f.exe PID 972 wrote to memory of 2020 972 a09f93f7606aa64851c9a8f82317b72f.exe a09f93f7606aa64851c9a8f82317b72f.exe PID 972 wrote to memory of 2020 972 a09f93f7606aa64851c9a8f82317b72f.exe a09f93f7606aa64851c9a8f82317b72f.exe PID 972 wrote to memory of 2020 972 a09f93f7606aa64851c9a8f82317b72f.exe a09f93f7606aa64851c9a8f82317b72f.exe PID 972 wrote to memory of 2020 972 a09f93f7606aa64851c9a8f82317b72f.exe a09f93f7606aa64851c9a8f82317b72f.exe PID 972 wrote to memory of 2020 972 a09f93f7606aa64851c9a8f82317b72f.exe a09f93f7606aa64851c9a8f82317b72f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a09f93f7606aa64851c9a8f82317b72f.exe"C:\Users\Admin\AppData\Local\Temp\a09f93f7606aa64851c9a8f82317b72f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a09f93f7606aa64851c9a8f82317b72f.exe"C:\Users\Admin\AppData\Local\Temp\a09f93f7606aa64851c9a8f82317b72f.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/972-54-0x0000000000DB0000-0x0000000000E38000-memory.dmpFilesize
544KB
-
memory/972-55-0x00000000761F1000-0x00000000761F3000-memory.dmpFilesize
8KB
-
memory/972-56-0x0000000000250000-0x000000000025E000-memory.dmpFilesize
56KB
-
memory/972-57-0x0000000007320000-0x000000000738A000-memory.dmpFilesize
424KB
-
memory/972-58-0x00000000005A0000-0x00000000005D2000-memory.dmpFilesize
200KB
-
memory/2020-59-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/2020-60-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/2020-62-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/2020-63-0x000000000041F640-mapping.dmp
-
memory/2020-64-0x0000000000770000-0x0000000000A73000-memory.dmpFilesize
3.0MB