Analysis
-
max time kernel
130s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2022 14:07
Static task
static1
Behavioral task
behavioral1
Sample
10503ccee19c440f294f4e4833b8df43f2f8f4620f4af3f01dd0a74b11fed33c.exe
Resource
win7-20220812-en
General
-
Target
10503ccee19c440f294f4e4833b8df43f2f8f4620f4af3f01dd0a74b11fed33c.exe
-
Size
1.1MB
-
MD5
ab21def9360038cafa353972417b0527
-
SHA1
877b7890ee8aed3e4ba3aefb0723a1ecb41ff27e
-
SHA256
10503ccee19c440f294f4e4833b8df43f2f8f4620f4af3f01dd0a74b11fed33c
-
SHA512
7dbf424263a6d4f93ffc504322ef7e4e650a019ab71181444241b1aff6e73021b02e2956ddd4b27e75aa970f83de689685ac9c6ca96f9f3a7a92388430f0fa29
-
SSDEEP
12288:Usc1hw4e/ehrrzpaEKs0k5yQa2wsUyrjRhxHCQyuVR1hw4e/Ugi:J4LJUEKBDZyRmKG4T
Malware Config
Extracted
formbook
6hsc
6cvqXARAGlgdnnbXYQ==
Mi4yZ8FULou6w26U2FDnEbA=
Xmx0bJmRZGL+O0RFfLFNN9AMdwn+
B0WNhyl4T2gWBIqE1VDnEbA=
DI2G9/sG/v6YIh42aQ==
0NTaAl90ZWYiGV/bT4U=
DWCuXrL23Cc3xdIG/0dT
fTbzys/dddqOVQ==
8ClrDFi3i+asgxBOnguhlQ==
YjOkWLSpXeqrXw==
gAIov8vbtv8vr8/tFSXvDULL7thokKA=
xMW2qsXay7xNkonR/zxPo939
xc38fRlgO2opnnbXYQ==
+o31vQlURJKmLUWfHlMq0Gjs
z6GwWxCSKJLJ
2pnQ5evpehAxUt4hd6pq9X71
2CmXDSU2DTmDR+Q=
WV9ScxFQID1V2glQnguhlQ==
L8UDlK65h9wJ7Zeb3VDnEbA=
Agb4LF2bRcDX
SqH75PsH3yxQYR9z3lDnEbA=
h8YG/pfpllgN+r7yaw==
cCpqkbfNqAI/WfJXnguhlQ==
s+knLMwJ3fmRZA0te6Fq9X71
EhYdPd0p8iFxPuI=
Wi4xZri3naA0D1/bT4U=
nWvXcvs9HV2udQo0
l/fjU21+WpE7EF/bT4U=
GZ+SIsMP7w6iAf8+L1pZ
D0mUUXV1P4eNVf9XnguhlQ==
oTlyZvhJFgfB4HVztxCp9Kk=
5PX7IsMQ9DmDR+Q=
dDuAscnFXeqrXw==
kmSrIrD5vxpKxeI2fgO8nw==
1GeVOGNjUmY5yswG/0dT
EYeAIppGt1Gtc/w=
LsHxiswT3tNdNN33H1hhwazaMPvCdA==
8aWkrlDKZrPQ
D4yEIMEI3Nl1QskAbaVndnt00+exZKCtyA==
c8P4ktkmB0ZjAzFCc6Bq9X71
RZnXfaxn0lGtc/w=
ZCMfpTiBVVbfW1ReZMWGoVjo
dMEMsfdKzzmDR+Q=
KTNhf5Ojhd76DKChnguhlQ==
JjlvzPs2/zmDR+Q=
xTIvy3C0XeqrXw==
RcI2ZrS+mIIO2Xub2VDnEbA=
NZOF7/3/499y1QchTG01NlzX8NhokKA=
HJ6Q/QcE2b1DUqrYPXtb
mGvXcvtFNm2Be98zao8=
zRlTSJogCy0=
X2NdecEGn5RLWg==
S4vjrkiPfql//AhBfgO8nw==
oaau7EVWQpAFV1dCc6Bq9X71
rfAaG8H+2xxRQL4BdbB6sJb/Fw==
mKvX7jB8WGcqsaefzfT9UdUMdwn+
WyObTpesZFkXGF/bT4U=
tT9IwOv0tghBx94Xg7d3sJb/Fw==
ApLQj6+9Y+q1+fA=
4bu35JDPqdinbaAG/0dT
xo36lTCBQCSn6gIjV55q9X71
hhFB3UqZbWQoX6TbREhRtajbMPvCdA==
9r7+aqu4oqJPzND+g5gzP27h8thokKA=
xZJ+dpq2XeqrXw==
vuongnudan.site
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/3220-139-0x0000000000400000-0x000000000042D000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
10503ccee19c440f294f4e4833b8df43f2f8f4620f4af3f01dd0a74b11fed33c.exedescription pid process target process PID 1760 set thread context of 3220 1760 10503ccee19c440f294f4e4833b8df43f2f8f4620f4af3f01dd0a74b11fed33c.exe 10503ccee19c440f294f4e4833b8df43f2f8f4620f4af3f01dd0a74b11fed33c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
10503ccee19c440f294f4e4833b8df43f2f8f4620f4af3f01dd0a74b11fed33c.exepid process 3220 10503ccee19c440f294f4e4833b8df43f2f8f4620f4af3f01dd0a74b11fed33c.exe 3220 10503ccee19c440f294f4e4833b8df43f2f8f4620f4af3f01dd0a74b11fed33c.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
10503ccee19c440f294f4e4833b8df43f2f8f4620f4af3f01dd0a74b11fed33c.exedescription pid process target process PID 1760 wrote to memory of 3220 1760 10503ccee19c440f294f4e4833b8df43f2f8f4620f4af3f01dd0a74b11fed33c.exe 10503ccee19c440f294f4e4833b8df43f2f8f4620f4af3f01dd0a74b11fed33c.exe PID 1760 wrote to memory of 3220 1760 10503ccee19c440f294f4e4833b8df43f2f8f4620f4af3f01dd0a74b11fed33c.exe 10503ccee19c440f294f4e4833b8df43f2f8f4620f4af3f01dd0a74b11fed33c.exe PID 1760 wrote to memory of 3220 1760 10503ccee19c440f294f4e4833b8df43f2f8f4620f4af3f01dd0a74b11fed33c.exe 10503ccee19c440f294f4e4833b8df43f2f8f4620f4af3f01dd0a74b11fed33c.exe PID 1760 wrote to memory of 3220 1760 10503ccee19c440f294f4e4833b8df43f2f8f4620f4af3f01dd0a74b11fed33c.exe 10503ccee19c440f294f4e4833b8df43f2f8f4620f4af3f01dd0a74b11fed33c.exe PID 1760 wrote to memory of 3220 1760 10503ccee19c440f294f4e4833b8df43f2f8f4620f4af3f01dd0a74b11fed33c.exe 10503ccee19c440f294f4e4833b8df43f2f8f4620f4af3f01dd0a74b11fed33c.exe PID 1760 wrote to memory of 3220 1760 10503ccee19c440f294f4e4833b8df43f2f8f4620f4af3f01dd0a74b11fed33c.exe 10503ccee19c440f294f4e4833b8df43f2f8f4620f4af3f01dd0a74b11fed33c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\10503ccee19c440f294f4e4833b8df43f2f8f4620f4af3f01dd0a74b11fed33c.exe"C:\Users\Admin\AppData\Local\Temp\10503ccee19c440f294f4e4833b8df43f2f8f4620f4af3f01dd0a74b11fed33c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\10503ccee19c440f294f4e4833b8df43f2f8f4620f4af3f01dd0a74b11fed33c.exe"C:\Users\Admin\AppData\Local\Temp\10503ccee19c440f294f4e4833b8df43f2f8f4620f4af3f01dd0a74b11fed33c.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1760-132-0x0000000000590000-0x00000000006AA000-memory.dmpFilesize
1.1MB
-
memory/1760-133-0x00000000053B0000-0x0000000005954000-memory.dmpFilesize
5.6MB
-
memory/1760-134-0x0000000004F00000-0x0000000004F92000-memory.dmpFilesize
584KB
-
memory/1760-135-0x00000000050D0000-0x00000000050DA000-memory.dmpFilesize
40KB
-
memory/1760-136-0x00000000095B0000-0x000000000964C000-memory.dmpFilesize
624KB
-
memory/1760-137-0x0000000009510000-0x0000000009576000-memory.dmpFilesize
408KB
-
memory/3220-138-0x0000000000000000-mapping.dmp
-
memory/3220-139-0x0000000000400000-0x000000000042D000-memory.dmpFilesize
180KB
-
memory/3220-140-0x0000000001640000-0x000000000198A000-memory.dmpFilesize
3.3MB