Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2023 20:27
Static task
static1
Behavioral task
behavioral1
Sample
d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe
Resource
win7-20220901-en
General
-
Target
d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe
-
Size
847KB
-
MD5
0f15fde98b90284e0e85c2ffae134257
-
SHA1
1946df71ecb4ccac1dbf4ca156b48ec2557e67fe
-
SHA256
d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a
-
SHA512
a1522d7c4b0f3ff9e4392916fd46c2c372cb8fea54be9d82ca9cbabaa307fc432b905f8d3153885a4c9539dacab044c8554c392ab4f441bb58548720ce85e417
-
SSDEEP
12288:gY7fh9loCS6KxbxeDuVvFpIHOEuZXKiezfCEKsmKWQYMdP:gafhA96Kx46DpcOEuhKStsz
Malware Config
Extracted
xloader
2.3
ur06
philippebrooksdesign.com
cmoorestudio.com
profille-sarina23tammara.club
dqulxe.com
uiffinger.com
nolarapper.com
maconanimalexterminator.com
bisovka.com
loveisloveent.com
datication.com
spxo66.com
drhelpnow.com
ladybug-cle.com
macocome.com
thepoppysocks.com
eldritchparadox.com
mercadolibre.company
ismartfarm.com
kansascarlot.com
kevinld.com
p87mbu2ss.xyz
the-makery.info
untegoro.site
newyorkcityhemorrhoidcenter.com
crystalclearwholistics.com
iregentos.info
fullskis.com
promanconsortium.com
800029120.com
mummyisme.com
humpychocks.com
myfavestuff.store
naturalfemina.com
bimetalthermostatksd.com
draysehaniminciftligi.com
sf9820.com
4thop.com
24les.com
thepupcrew.com
strangephobias.com
hotmamabody.com
restaurantsilhouette.com
texasadultdayservices.com
binahaiat.com
nipseythegreat.com
pelisplusxd.net
mamborio.com
elitedigitalperformance.com
therileyretreat.com
aieqbgk.icu
corkboardit.net
katieberiont.com
telemedicinehamilton.com
imagistor.com
tekdesignltd.com
bmw-7979.com
animaliaartist.com
straightlineautoserviceerie.net
qoo10online.com
tesseracoffee.com
central-car-sales.com
thecleaningenthusiast.com
musicmercch.com
pearlpham.com
allismd.com
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4932-137-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exedescription pid process target process PID 5056 set thread context of 4932 5056 d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exed48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exepid process 5056 d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe 5056 d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe 5056 d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe 5056 d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe 4932 d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe 4932 d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exedescription pid process Token: SeDebugPrivilege 5056 d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exedescription pid process target process PID 5056 wrote to memory of 4684 5056 d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe PID 5056 wrote to memory of 4684 5056 d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe PID 5056 wrote to memory of 4684 5056 d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe PID 5056 wrote to memory of 1944 5056 d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe PID 5056 wrote to memory of 1944 5056 d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe PID 5056 wrote to memory of 1944 5056 d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe PID 5056 wrote to memory of 4932 5056 d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe PID 5056 wrote to memory of 4932 5056 d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe PID 5056 wrote to memory of 4932 5056 d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe PID 5056 wrote to memory of 4932 5056 d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe PID 5056 wrote to memory of 4932 5056 d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe PID 5056 wrote to memory of 4932 5056 d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe"C:\Users\Admin\AppData\Local\Temp\d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe"C:\Users\Admin\AppData\Local\Temp\d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe"C:\Users\Admin\AppData\Local\Temp\d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe"C:\Users\Admin\AppData\Local\Temp\d48c6eda4d7da385d81986abfc9e091f3498cad3d29adf040eda851f28a10e1a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1944-135-0x0000000000000000-mapping.dmp
-
memory/4684-134-0x0000000000000000-mapping.dmp
-
memory/4932-136-0x0000000000000000-mapping.dmp
-
memory/4932-137-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/4932-139-0x0000000001680000-0x00000000019CA000-memory.dmpFilesize
3.3MB
-
memory/5056-132-0x0000000074EC0000-0x0000000075471000-memory.dmpFilesize
5.7MB
-
memory/5056-133-0x0000000074EC0000-0x0000000075471000-memory.dmpFilesize
5.7MB
-
memory/5056-138-0x0000000074EC0000-0x0000000075471000-memory.dmpFilesize
5.7MB