Analysis
-
max time kernel
130s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2023 20:27
Static task
static1
Behavioral task
behavioral1
Sample
d73dfe16ee1bc567ce32a408839c9074509ad6cc1e21fd710f7a9f97a5d623e2.exe
Resource
win7-20221111-en
General
-
Target
d73dfe16ee1bc567ce32a408839c9074509ad6cc1e21fd710f7a9f97a5d623e2.exe
-
Size
984KB
-
MD5
1451fb0f3e10bfec2ff424da9147c75e
-
SHA1
1f8e0881fad737fc59d900c53d46ccc937ccdf3a
-
SHA256
d73dfe16ee1bc567ce32a408839c9074509ad6cc1e21fd710f7a9f97a5d623e2
-
SHA512
51786f8ef1b6877b872ae2c7e564b52ea731cefef3e037b1b56cc4a363dbf602bfa455d17c09b6c1d9e15e11e11a7e149e885b87ef9c203cbd4aac603e32bf8d
-
SSDEEP
12288:OWW3hkl/81RWR+5eJ0rGqvcRSvYRPyZVSBWeFkTxv39:ikl0DxeJyGh4YRPLFkJ9
Malware Config
Extracted
xloader
2.3
e68n
ds3i.com
integrityconnect.info
jhpaolilo.com
aprilgraberphotography.com
globe-gist.com
blackwellheatingandcooling.com
gossgoddard.com
memoriesmade-l.com
ozsmiwd.icu
pelzerforcongress.com
infinitybytg.com
gczp22.com
logonanet.com
998899sj.com
xn--vhqqb859burbuz7jebh.com
savorysinsation.com
cumykuf.icu
ourbella.com
isurfkarma.com
thepostmail.com
charlotteexplorer.com
shopbutterfleye.com
aceitesesencialesenparaiso.com
threebearstoronto.com
survivalmistakes.com
tshirtuae.com
taimaibio.com
johnhyr.com
anthony7ap.com
meitubi.com
greencoresolutionsinc.com
j3tsurf.com
webcurepromail.online
unexpectedbeer.com
altempower.com
runitupsocks.com
polishedwithashley.com
sapanyc.com
360vacance.com
whitneywilliamsestates.com
lianhekeji.net
infinitecontent.space
nplbtc.com
startupo.xyz
strokes.guru
xx2vvs3bs.site
alwaysthomas.com
sd581.com
siamhills.com
innne.com
thelocochef.com
inspirograph.com
drluisarevalo.com
1band1sound.com
chaing-list.xyz
laohuaji.club
ldschool.net
daveropp.com
youkut.com
ketamineinfusionutah.com
fr-contacts.com
theshopifree.com
vibrabogota.com
nolanaamber.com
primeviewm.com
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1700-139-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
d73dfe16ee1bc567ce32a408839c9074509ad6cc1e21fd710f7a9f97a5d623e2.exedescription pid process target process PID 4556 set thread context of 1700 4556 d73dfe16ee1bc567ce32a408839c9074509ad6cc1e21fd710f7a9f97a5d623e2.exe d73dfe16ee1bc567ce32a408839c9074509ad6cc1e21fd710f7a9f97a5d623e2.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
d73dfe16ee1bc567ce32a408839c9074509ad6cc1e21fd710f7a9f97a5d623e2.exepid process 1700 d73dfe16ee1bc567ce32a408839c9074509ad6cc1e21fd710f7a9f97a5d623e2.exe 1700 d73dfe16ee1bc567ce32a408839c9074509ad6cc1e21fd710f7a9f97a5d623e2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
d73dfe16ee1bc567ce32a408839c9074509ad6cc1e21fd710f7a9f97a5d623e2.exedescription pid process target process PID 4556 wrote to memory of 1700 4556 d73dfe16ee1bc567ce32a408839c9074509ad6cc1e21fd710f7a9f97a5d623e2.exe d73dfe16ee1bc567ce32a408839c9074509ad6cc1e21fd710f7a9f97a5d623e2.exe PID 4556 wrote to memory of 1700 4556 d73dfe16ee1bc567ce32a408839c9074509ad6cc1e21fd710f7a9f97a5d623e2.exe d73dfe16ee1bc567ce32a408839c9074509ad6cc1e21fd710f7a9f97a5d623e2.exe PID 4556 wrote to memory of 1700 4556 d73dfe16ee1bc567ce32a408839c9074509ad6cc1e21fd710f7a9f97a5d623e2.exe d73dfe16ee1bc567ce32a408839c9074509ad6cc1e21fd710f7a9f97a5d623e2.exe PID 4556 wrote to memory of 1700 4556 d73dfe16ee1bc567ce32a408839c9074509ad6cc1e21fd710f7a9f97a5d623e2.exe d73dfe16ee1bc567ce32a408839c9074509ad6cc1e21fd710f7a9f97a5d623e2.exe PID 4556 wrote to memory of 1700 4556 d73dfe16ee1bc567ce32a408839c9074509ad6cc1e21fd710f7a9f97a5d623e2.exe d73dfe16ee1bc567ce32a408839c9074509ad6cc1e21fd710f7a9f97a5d623e2.exe PID 4556 wrote to memory of 1700 4556 d73dfe16ee1bc567ce32a408839c9074509ad6cc1e21fd710f7a9f97a5d623e2.exe d73dfe16ee1bc567ce32a408839c9074509ad6cc1e21fd710f7a9f97a5d623e2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d73dfe16ee1bc567ce32a408839c9074509ad6cc1e21fd710f7a9f97a5d623e2.exe"C:\Users\Admin\AppData\Local\Temp\d73dfe16ee1bc567ce32a408839c9074509ad6cc1e21fd710f7a9f97a5d623e2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\d73dfe16ee1bc567ce32a408839c9074509ad6cc1e21fd710f7a9f97a5d623e2.exe"C:\Users\Admin\AppData\Local\Temp\d73dfe16ee1bc567ce32a408839c9074509ad6cc1e21fd710f7a9f97a5d623e2.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1700-138-0x0000000000000000-mapping.dmp
-
memory/1700-139-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1700-140-0x00000000017B0000-0x0000000001AFA000-memory.dmpFilesize
3.3MB
-
memory/4556-132-0x0000000000500000-0x00000000005FC000-memory.dmpFilesize
1008KB
-
memory/4556-133-0x0000000004F90000-0x000000000502C000-memory.dmpFilesize
624KB
-
memory/4556-134-0x0000000005690000-0x0000000005C34000-memory.dmpFilesize
5.6MB
-
memory/4556-135-0x00000000050E0000-0x0000000005172000-memory.dmpFilesize
584KB
-
memory/4556-136-0x0000000005030000-0x000000000503A000-memory.dmpFilesize
40KB
-
memory/4556-137-0x0000000005180000-0x00000000051D6000-memory.dmpFilesize
344KB