Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
04-08-2022 12:25
Static task
static1
Behavioral task
behavioral1
Sample
13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe
Resource
win10-20220722-en
General
-
Target
13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe
-
Size
556KB
-
MD5
a505757fb36d0c2945985135b1de90cb
-
SHA1
0f90b28aa225725493ef72a9915bf0c5082ff992
-
SHA256
13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601
-
SHA512
37d993fcb3774673a840d4e13e768c7160120c04746972f8efed6c4687e9872fcc175849193510190fbc5047ce89abcce5c3457955b85e7912c09c12b1f0f011
Malware Config
Extracted
xloader
2.5
r007
trashpandaservice.com
mobileads.network
ascolstore.com
gelsinextra.com
bonestell.net
heitoll.xyz
ceapgis.com
mon-lapin.biz
miq-eva.com
rematedesillas.com
playingonline.xyz
hausense.quest
tnyzw.com
appsdial.com
addcolor.city
hagenoblog.com
michaelwesleyj.com
she-zain.com
lorhsems.com
karmaserena.com
avatarrooms.com
friendsofrythmia.com
hdnhwy.com
firstnightfanfiction.net
vixflow.com
b8ceex.com
generatespeed.com
vaps02.com
climate-crisis.team
saturdaynightl.com
baro-drom.com
talleyresort.com
doctruyenovergeared.com
mogli-designz.info
politiciantunnel.com
housesyrron.com
troibrown.com
go-svetovanje.com
littlebittech.com
totallyglamplans.com
primeusatv.com
leifengping.com
halalfreshdelivery.com
gumbosgeorgetown.com
alittleraeoflight.com
xn--tckybzdtby655a5tj.xyz
wgassllc.xyz
craftandcloud.com
attorneyyochum.com
cryptocourse.one
bloomintegratedwellness.com
partypirateboatrentals.com
chainmio-top.xyz
mrjsloan.com
merryutilityservices.net
zglingbishi.com
wytchbytch.com
michigansharkettes.com
gerizon.net
texcelmed.com
cafe21-3.com
freemovies123.online
ungalfresh.com
sendungs.com
iot-vn.com
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral3/memory/5080-138-0x0000000000400000-0x000000000042A000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exedescription pid process target process PID 2216 set thread context of 5080 2216 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exepid process 2216 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe 2216 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe 5080 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe 5080 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exedescription pid process Token: SeDebugPrivilege 2216 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exedescription pid process target process PID 2216 wrote to memory of 800 2216 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe PID 2216 wrote to memory of 800 2216 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe PID 2216 wrote to memory of 800 2216 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe PID 2216 wrote to memory of 5080 2216 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe PID 2216 wrote to memory of 5080 2216 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe PID 2216 wrote to memory of 5080 2216 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe PID 2216 wrote to memory of 5080 2216 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe PID 2216 wrote to memory of 5080 2216 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe PID 2216 wrote to memory of 5080 2216 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe 13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe"C:\Users\Admin\AppData\Local\Temp\13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe"C:\Users\Admin\AppData\Local\Temp\13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe"C:\Users\Admin\AppData\Local\Temp\13bd267ca3d7af495f8cd8f72daf3ea997312671eafe9992a88768e4f3ecc601.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/800-136-0x0000000000000000-mapping.dmp
-
memory/2216-130-0x0000000000EB0000-0x0000000000F40000-memory.dmpFilesize
576KB
-
memory/2216-131-0x0000000005FF0000-0x0000000006594000-memory.dmpFilesize
5.6MB
-
memory/2216-132-0x0000000005910000-0x00000000059A2000-memory.dmpFilesize
584KB
-
memory/2216-133-0x0000000005A40000-0x0000000005ADC000-memory.dmpFilesize
624KB
-
memory/2216-134-0x00000000058E0000-0x00000000058EA000-memory.dmpFilesize
40KB
-
memory/2216-135-0x0000000008090000-0x00000000080F6000-memory.dmpFilesize
408KB
-
memory/5080-137-0x0000000000000000-mapping.dmp
-
memory/5080-138-0x0000000000400000-0x000000000042A000-memory.dmpFilesize
168KB
-
memory/5080-139-0x0000000001760000-0x0000000001AAA000-memory.dmpFilesize
3.3MB