Analysis
-
max time kernel
118s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 19:46
Static task
static1
Behavioral task
behavioral1
Sample
c78e3c0aaddffb294d0897b695d2983fef45b201a40be68b8932acb32d5f32d6.exe
Resource
win7-20220812-en
General
-
Target
c78e3c0aaddffb294d0897b695d2983fef45b201a40be68b8932acb32d5f32d6.exe
-
Size
427KB
-
MD5
881cb9ada2d3716cd4330896b3e4987c
-
SHA1
b678a01eef1a01228e2f7a6ca6896d23a7c7e21e
-
SHA256
c78e3c0aaddffb294d0897b695d2983fef45b201a40be68b8932acb32d5f32d6
-
SHA512
99d32f86d2b242dc8045bba1161e070d1312d04b4d631b703b3bd0d7a2d1a4854cd464456a3746952420d75a146720cec97827ec8471ac2ad3b6fbb9e047ece4
-
SSDEEP
12288:73WVhLHvDXG4KFi1bdhWJ562uF14cedCLUdLLLj:7GVxrX0gpdUXu8vQeX
Malware Config
Extracted
xloader
2.3
ur06
philippebrooksdesign.com
cmoorestudio.com
profille-sarina23tammara.club
dqulxe.com
uiffinger.com
nolarapper.com
maconanimalexterminator.com
bisovka.com
loveisloveent.com
datication.com
spxo66.com
drhelpnow.com
ladybug-cle.com
macocome.com
thepoppysocks.com
eldritchparadox.com
mercadolibre.company
ismartfarm.com
kansascarlot.com
kevinld.com
p87mbu2ss.xyz
the-makery.info
untegoro.site
newyorkcityhemorrhoidcenter.com
crystalclearwholistics.com
iregentos.info
fullskis.com
promanconsortium.com
800029120.com
mummyisme.com
humpychocks.com
myfavestuff.store
naturalfemina.com
bimetalthermostatksd.com
draysehaniminciftligi.com
sf9820.com
4thop.com
24les.com
thepupcrew.com
strangephobias.com
hotmamabody.com
restaurantsilhouette.com
texasadultdayservices.com
binahaiat.com
nipseythegreat.com
pelisplusxd.net
mamborio.com
elitedigitalperformance.com
therileyretreat.com
aieqbgk.icu
corkboardit.net
katieberiont.com
telemedicinehamilton.com
imagistor.com
tekdesignltd.com
bmw-7979.com
animaliaartist.com
straightlineautoserviceerie.net
qoo10online.com
tesseracoffee.com
central-car-sales.com
thecleaningenthusiast.com
musicmercch.com
pearlpham.com
allismd.com
Signatures
-
Xloader payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1272-60-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/1272-61-0x000000000041D000-mapping.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
c78e3c0aaddffb294d0897b695d2983fef45b201a40be68b8932acb32d5f32d6.exedescription pid process target process PID 856 set thread context of 1272 856 c78e3c0aaddffb294d0897b695d2983fef45b201a40be68b8932acb32d5f32d6.exe c78e3c0aaddffb294d0897b695d2983fef45b201a40be68b8932acb32d5f32d6.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
c78e3c0aaddffb294d0897b695d2983fef45b201a40be68b8932acb32d5f32d6.exepid process 1272 c78e3c0aaddffb294d0897b695d2983fef45b201a40be68b8932acb32d5f32d6.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
c78e3c0aaddffb294d0897b695d2983fef45b201a40be68b8932acb32d5f32d6.exedescription pid process target process PID 856 wrote to memory of 1272 856 c78e3c0aaddffb294d0897b695d2983fef45b201a40be68b8932acb32d5f32d6.exe c78e3c0aaddffb294d0897b695d2983fef45b201a40be68b8932acb32d5f32d6.exe PID 856 wrote to memory of 1272 856 c78e3c0aaddffb294d0897b695d2983fef45b201a40be68b8932acb32d5f32d6.exe c78e3c0aaddffb294d0897b695d2983fef45b201a40be68b8932acb32d5f32d6.exe PID 856 wrote to memory of 1272 856 c78e3c0aaddffb294d0897b695d2983fef45b201a40be68b8932acb32d5f32d6.exe c78e3c0aaddffb294d0897b695d2983fef45b201a40be68b8932acb32d5f32d6.exe PID 856 wrote to memory of 1272 856 c78e3c0aaddffb294d0897b695d2983fef45b201a40be68b8932acb32d5f32d6.exe c78e3c0aaddffb294d0897b695d2983fef45b201a40be68b8932acb32d5f32d6.exe PID 856 wrote to memory of 1272 856 c78e3c0aaddffb294d0897b695d2983fef45b201a40be68b8932acb32d5f32d6.exe c78e3c0aaddffb294d0897b695d2983fef45b201a40be68b8932acb32d5f32d6.exe PID 856 wrote to memory of 1272 856 c78e3c0aaddffb294d0897b695d2983fef45b201a40be68b8932acb32d5f32d6.exe c78e3c0aaddffb294d0897b695d2983fef45b201a40be68b8932acb32d5f32d6.exe PID 856 wrote to memory of 1272 856 c78e3c0aaddffb294d0897b695d2983fef45b201a40be68b8932acb32d5f32d6.exe c78e3c0aaddffb294d0897b695d2983fef45b201a40be68b8932acb32d5f32d6.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c78e3c0aaddffb294d0897b695d2983fef45b201a40be68b8932acb32d5f32d6.exe"C:\Users\Admin\AppData\Local\Temp\c78e3c0aaddffb294d0897b695d2983fef45b201a40be68b8932acb32d5f32d6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\c78e3c0aaddffb294d0897b695d2983fef45b201a40be68b8932acb32d5f32d6.exe"C:\Users\Admin\AppData\Local\Temp\c78e3c0aaddffb294d0897b695d2983fef45b201a40be68b8932acb32d5f32d6.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/856-54-0x0000000075931000-0x0000000075933000-memory.dmpFilesize
8KB
-
memory/856-55-0x0000000074770000-0x0000000074D1B000-memory.dmpFilesize
5.7MB
-
memory/856-56-0x0000000074770000-0x0000000074D1B000-memory.dmpFilesize
5.7MB
-
memory/856-62-0x0000000074770000-0x0000000074D1B000-memory.dmpFilesize
5.7MB
-
memory/1272-57-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1272-58-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1272-60-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/1272-61-0x000000000041D000-mapping.dmp
-
memory/1272-63-0x0000000000A20000-0x0000000000D23000-memory.dmpFilesize
3.0MB