Analysis
-
max time kernel
53s -
max time network
70s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
29-06-2022 08:24
Static task
static1
General
-
Target
d7dae1d41bdbc82c9162dc6d129670c05d5e80dc83783a48df90616099ca507d.exe
-
Size
876KB
-
MD5
4b86af1f12bcc05b5586eec0f26e0ef9
-
SHA1
750cec00b9f8b8298436e41bf8083c7842b95b05
-
SHA256
d7dae1d41bdbc82c9162dc6d129670c05d5e80dc83783a48df90616099ca507d
-
SHA512
325426b9274b1e8e30740123f738f137d4055aae1d00cd1af3b1dd704882f0d058dc767af4cbdfb6b419b5137c4349d31cdfacb879d1c2c1d99e61dc29959418
Malware Config
Extracted
xloader
2.8
nn40
LYAg0yANOGEAGeaFOrA/
MQWuERZplP+VZy/uszI=
CF0oDN0JimIaGy/uszI=
ltJnyC+ReohYaiTvj1qbEA==
B9OkgdctVKBAFjSUaw==
sbDVwSZVVqVB11/deow8GA==
v1gHDe0pzno=
i+/0n2vHUfGPR98k77tukZ90MQ==
SUtCnbS96Qm21g==
8X9qzyt1dpAo31jXrXfKb49fBPY=
5KlPxqHzSstuFjSUaw==
0r/Kesv/zuanroxvNQW0Gm8=
FFgS7kfPYAqpdhhgRgnBJHY=
LgusAHrkrIoWr0FWIe2o/04UXPw=
vBq9Gvxa9wbKbS/uszI=
Z+q6HAZNNeqwwQ==
wbS4fMb06SjU5Kbseow8GA==
1mZEuZvJ/m0L9bof56PkkZ90MQ==
JCJIM74lHk/o+tiFOrA/
d14FrM8rGEgIzVkT67+3XaEh
OtJqJTaZyD/bgy/uszI=
MMzqpo3pVjbaigine/p4W6dqZPJKkg==
LRS4MpnBeVxC/bqjf0kMBGop69QC
7FTxgWaTLAKbm3B0QgW0Gm8=
hjbYktAyum2JNK6N
WRtxyNlENeqwwQ==
MTOKH+0pzno=
8LkJ8EsWWHIK
zs758oMTaffAxI0bn2uqFw==
ariAXDqMsKpwF5U=
UEZOAmXFnpRh+rqD
T5e5xzlTNeqwwQ==
tp424+UDomI=
Y7VXD+I8CKVuDZQ=
zg6qeGbHO1F+FjSUaw==
JPypEB2CuDAz+bXSrjo=
8ah8cf5odcPNS+Sa
k+CGNhyOMKVuDZQ=
oVviitkD8B7ZmijeyIDFOI9nZPJKkg==
TtztqHfKKqQWuVRvT9fSSpJJmAFYLjw=
p6pvJHfZmJgx6XwYuL56b798MA==
WWmegczy4x2O+cIC27RtkZ90MQ==
/QrLiDyde3RJWRwRmWYo
PtShJAZG1WU6LP3osjo=
ZTrOf2PMho1kdm/JtSU=
A1ssC+pS8dvNS+Sa
K4g38tVda8DNS+Sa
Dz7fj13DnKh1iV8++X2H8Fbeq1jBGh4D
0AjPwNQtnWUEpDBAJbq9GG8p69QC
ALhKrIu7/5BTRf1OQAW0Gm8=
a5Zp3GrGWhzmrBYRmWYo
dwzcQzpnYYAi8G7eypfSS6d3oWmQnQ==
VR3AHfcDyG79m6bm0YnEOEBS/fQ=
pyZFKiWXNaVuDZQ=
dzf0zzBlYaqLFjSUaw==
D6TIj16hJ8JhJMom8rlxkZ90MQ==
8qkyvpp56Qm21g==
4qNmKHymVg3Bx4M=
MOiH6DRYhutyFjSUaw==
JqTDnm+zOQLV+83Ucm9GDw==
YQilIAQqUM5vFjSUaw==
84U/nbvTQwzcyQ==
mC34kB9LdeJuFjSUaw==
DKLKrbwuuWyJNK6N
thisismyhomevalue.com
Signatures
-
Xloader Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/4780-189-0x000000000041F640-mapping.dmp xloader behavioral1/memory/4780-199-0x0000000000400000-0x000000000042C000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
d7dae1d41bdbc82c9162dc6d129670c05d5e80dc83783a48df90616099ca507d.exedescription pid process target process PID 2348 set thread context of 4780 2348 d7dae1d41bdbc82c9162dc6d129670c05d5e80dc83783a48df90616099ca507d.exe d7dae1d41bdbc82c9162dc6d129670c05d5e80dc83783a48df90616099ca507d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
d7dae1d41bdbc82c9162dc6d129670c05d5e80dc83783a48df90616099ca507d.exepid process 4780 d7dae1d41bdbc82c9162dc6d129670c05d5e80dc83783a48df90616099ca507d.exe 4780 d7dae1d41bdbc82c9162dc6d129670c05d5e80dc83783a48df90616099ca507d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
d7dae1d41bdbc82c9162dc6d129670c05d5e80dc83783a48df90616099ca507d.exedescription pid process target process PID 2348 wrote to memory of 4780 2348 d7dae1d41bdbc82c9162dc6d129670c05d5e80dc83783a48df90616099ca507d.exe d7dae1d41bdbc82c9162dc6d129670c05d5e80dc83783a48df90616099ca507d.exe PID 2348 wrote to memory of 4780 2348 d7dae1d41bdbc82c9162dc6d129670c05d5e80dc83783a48df90616099ca507d.exe d7dae1d41bdbc82c9162dc6d129670c05d5e80dc83783a48df90616099ca507d.exe PID 2348 wrote to memory of 4780 2348 d7dae1d41bdbc82c9162dc6d129670c05d5e80dc83783a48df90616099ca507d.exe d7dae1d41bdbc82c9162dc6d129670c05d5e80dc83783a48df90616099ca507d.exe PID 2348 wrote to memory of 4780 2348 d7dae1d41bdbc82c9162dc6d129670c05d5e80dc83783a48df90616099ca507d.exe d7dae1d41bdbc82c9162dc6d129670c05d5e80dc83783a48df90616099ca507d.exe PID 2348 wrote to memory of 4780 2348 d7dae1d41bdbc82c9162dc6d129670c05d5e80dc83783a48df90616099ca507d.exe d7dae1d41bdbc82c9162dc6d129670c05d5e80dc83783a48df90616099ca507d.exe PID 2348 wrote to memory of 4780 2348 d7dae1d41bdbc82c9162dc6d129670c05d5e80dc83783a48df90616099ca507d.exe d7dae1d41bdbc82c9162dc6d129670c05d5e80dc83783a48df90616099ca507d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7dae1d41bdbc82c9162dc6d129670c05d5e80dc83783a48df90616099ca507d.exe"C:\Users\Admin\AppData\Local\Temp\d7dae1d41bdbc82c9162dc6d129670c05d5e80dc83783a48df90616099ca507d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\d7dae1d41bdbc82c9162dc6d129670c05d5e80dc83783a48df90616099ca507d.exe"C:\Users\Admin\AppData\Local\Temp\d7dae1d41bdbc82c9162dc6d129670c05d5e80dc83783a48df90616099ca507d.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2348-114-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-115-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-116-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-117-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-118-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-119-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-120-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-121-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-122-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-123-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-124-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-126-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-125-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-127-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-128-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-129-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-130-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-131-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-132-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-133-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-134-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-135-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-136-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-137-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-138-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-139-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-140-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-141-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-142-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-143-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-144-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-145-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-146-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-147-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-148-0x00000000003F0000-0x00000000004D2000-memory.dmpFilesize
904KB
-
memory/2348-149-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-150-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-151-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-152-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-153-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-154-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-155-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-156-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-157-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-158-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-159-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-160-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-161-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-162-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-163-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-164-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-165-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-166-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-167-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-168-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-169-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-170-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-171-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-172-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-173-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-174-0x0000000005420000-0x000000000591E000-memory.dmpFilesize
5.0MB
-
memory/2348-175-0x0000000004F20000-0x0000000004FB2000-memory.dmpFilesize
584KB
-
memory/2348-176-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-177-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-178-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-179-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-180-0x0000000077960000-0x0000000077AEE000-memory.dmpFilesize
1.6MB
-
memory/2348-181-0x0000000004E20000-0x0000000004E36000-memory.dmpFilesize
88KB
-
memory/2348-183-0x0000000004EF0000-0x0000000004EFA000-memory.dmpFilesize
40KB
-
memory/2348-185-0x00000000074F0000-0x000000000755A000-memory.dmpFilesize
424KB
-
memory/2348-186-0x0000000007620000-0x00000000076BC000-memory.dmpFilesize
624KB
-
memory/2348-187-0x0000000007580000-0x00000000075B2000-memory.dmpFilesize
200KB
-
memory/4780-189-0x000000000041F640-mapping.dmp
-
memory/4780-199-0x0000000000400000-0x000000000042C000-memory.dmpFilesize
176KB
-
memory/4780-200-0x0000000001110000-0x0000000001430000-memory.dmpFilesize
3.1MB