Analysis
-
max time kernel
90s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
25-05-2023 01:49
Static task
static1
Behavioral task
behavioral1
Sample
a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe
Resource
win7-20230220-en
General
-
Target
a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe
-
Size
356KB
-
MD5
cb94f8bf4453d77ed35b4cccad18260c
-
SHA1
aeacb009addb2152c05a34537f565e66b32b25d2
-
SHA256
a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466
-
SHA512
7fb17a554481d5ff6c28edd4ee43b9306a8e59ac9f992a2b6d243b2d88eb9daa997bbf5be962f331c6ec282b15e4e67107c233691a6b05d317957072754f4135
-
SSDEEP
6144:lZwkVnw0KesTf8DZgu2OuQ15Mgkv0StJXgBivzsXjpY/i0un1IC1ewYrbOhpRRRY:lZ7Laf8DqOrRk8+JXUMzeYRun19ewskC
Malware Config
Extracted
xloader
2.5
c6si
tristateinc.construction
americanscaregroundstexas.com
kanimisoshiru.com
wihling.com
fishcheekstosa.com
parentsfuid.com
greenstandmarket.com
fc8fla8kzq.com
gametwist-83.club
jobsncvs.com
directrealtysells.com
avida2015.com
conceptasite.net
arkaneattire.com
indev-mobility.info
2160centurypark412.com
valefloor.com
septembership.com
stackflix.com
jimc0sales.net
socialviralup.com
lastra41.com
juliaepaulovaocasar.com
jurisagora.com
drawandgrow.online
rebekahlouise.com
herport-fr.com
iphone13.webcam
appz-one.net
inpost-pl.net
promocion360fitness.com
global-forbes.biz
diamondtrade.net
albertcantos.com
gtgits.com
travel-ai.online
busipe6.com
mualikesubvn.com
niftyhandy.com
docprops.com
lido88.bet
baywoodphotography.com
cargosouq.info
newsnowlive.online
floridafishingoverboard.com
missnikissalsa.net
walletvalidate.space
kissimmeeinternationalcup.com
charterhome.school
gurujupiter.com
entertainmentwitchy.com
jokeaou.com
sugarmountainfirearms.com
iss-sa.com
smittyssierra.com
freedomoff.com
giftoin.com
realitystararmwrestling.com
salsalunch-equallyage.com
ladouba.com
thepropertygoat.com
bestofmerrick.guide
4the.top
regioinversiones.com
129qihu.com
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/1580-140-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exedescription pid process target process PID 544 set thread context of 1580 544 a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exea39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exepid process 544 a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe 544 a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe 1580 a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe 1580 a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exedescription pid process Token: SeDebugPrivilege 544 a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exedescription pid process target process PID 544 wrote to memory of 1652 544 a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe PID 544 wrote to memory of 1652 544 a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe PID 544 wrote to memory of 1652 544 a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe PID 544 wrote to memory of 1580 544 a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe PID 544 wrote to memory of 1580 544 a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe PID 544 wrote to memory of 1580 544 a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe PID 544 wrote to memory of 1580 544 a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe PID 544 wrote to memory of 1580 544 a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe PID 544 wrote to memory of 1580 544 a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe"C:\Users\Admin\AppData\Local\Temp\a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe"C:\Users\Admin\AppData\Local\Temp\a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe"C:\Users\Admin\AppData\Local\Temp\a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/544-133-0x0000000000F80000-0x0000000000FE0000-memory.dmpFilesize
384KB
-
memory/544-134-0x0000000005E70000-0x0000000006414000-memory.dmpFilesize
5.6MB
-
memory/544-135-0x00000000059A0000-0x0000000005A32000-memory.dmpFilesize
584KB
-
memory/544-136-0x0000000005C20000-0x0000000005C30000-memory.dmpFilesize
64KB
-
memory/544-137-0x0000000005B30000-0x0000000005B3A000-memory.dmpFilesize
40KB
-
memory/544-138-0x0000000005C20000-0x0000000005C30000-memory.dmpFilesize
64KB
-
memory/544-139-0x0000000008E50000-0x0000000008EEC000-memory.dmpFilesize
624KB
-
memory/1580-140-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1580-142-0x0000000001580000-0x00000000018CA000-memory.dmpFilesize
3.3MB