Analysis
-
max time kernel
50s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
04-08-2022 12:25
Static task
static1
Behavioral task
behavioral1
Sample
13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe
Resource
win10-20220722-en
General
-
Target
13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe
-
Size
556KB
-
MD5
a505757fb36d0c2945985135b1de90cb
-
SHA1
0f90b28aa225725493ef72a9915bf0c5082ff992
-
SHA256
13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601
-
SHA512
37d993fcb3774673a840d4e13e768c7160120c04746972f8efed6c4687e9872fcc175849193510190fbc5047ce89abcce5c3457955b85e7912c09c12b1f0f011
Malware Config
Extracted
xloader
2.5
r007
trashpandaservice.com
mobileads.network
ascolstore.com
gelsinextra.com
bonestell.net
heitoll.xyz
ceapgis.com
mon-lapin.biz
miq-eva.com
rematedesillas.com
playingonline.xyz
hausense.quest
tnyzw.com
appsdial.com
addcolor.city
hagenoblog.com
michaelwesleyj.com
she-zain.com
lorhsems.com
karmaserena.com
avatarrooms.com
friendsofrythmia.com
hdnhwy.com
firstnightfanfiction.net
vixflow.com
b8ceex.com
generatespeed.com
vaps02.com
climate-crisis.team
saturdaynightl.com
baro-drom.com
talleyresort.com
doctruyenovergeared.com
mogli-designz.info
politiciantunnel.com
housesyrron.com
troibrown.com
go-svetovanje.com
littlebittech.com
totallyglamplans.com
primeusatv.com
leifengping.com
halalfreshdelivery.com
gumbosgeorgetown.com
alittleraeoflight.com
xn--tckybzdtby655a5tj.xyz
wgassllc.xyz
craftandcloud.com
attorneyyochum.com
cryptocourse.one
bloomintegratedwellness.com
partypirateboatrentals.com
chainmio-top.xyz
mrjsloan.com
merryutilityservices.net
zglingbishi.com
wytchbytch.com
michigansharkettes.com
gerizon.net
texcelmed.com
cafe21-3.com
freemovies123.online
ungalfresh.com
sendungs.com
iot-vn.com
Signatures
-
Xloader payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1372-63-0x0000000000400000-0x000000000042A000-memory.dmp xloader behavioral1/memory/1372-64-0x000000000041D9B0-mapping.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exedescription pid process target process PID 976 set thread context of 1372 976 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exepid process 1372 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exedescription pid process target process PID 976 wrote to memory of 1372 976 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe PID 976 wrote to memory of 1372 976 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe PID 976 wrote to memory of 1372 976 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe PID 976 wrote to memory of 1372 976 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe PID 976 wrote to memory of 1372 976 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe PID 976 wrote to memory of 1372 976 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe PID 976 wrote to memory of 1372 976 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe"C:\Users\Admin\AppData\Local\Temp\13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe"C:\Users\Admin\AppData\Local\Temp\13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/976-54-0x0000000000EF0000-0x0000000000F80000-memory.dmpFilesize
576KB
-
memory/976-55-0x0000000076631000-0x0000000076633000-memory.dmpFilesize
8KB
-
memory/976-56-0x0000000000E70000-0x0000000000EE8000-memory.dmpFilesize
480KB
-
memory/976-57-0x0000000000250000-0x000000000025A000-memory.dmpFilesize
40KB
-
memory/976-58-0x0000000005330000-0x00000000053B2000-memory.dmpFilesize
520KB
-
memory/976-59-0x0000000000670000-0x00000000006A0000-memory.dmpFilesize
192KB
-
memory/1372-60-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1372-61-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1372-63-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/1372-64-0x000000000041D9B0-mapping.dmp
-
memory/1372-65-0x0000000000950000-0x0000000000C53000-memory.dmpFilesize
3.0MB