Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 06:17
Static task
static1
Behavioral task
behavioral1
Sample
0afe819fb6bd54d591e7b5b368920793.exe
Resource
win7-20231215-en
General
-
Target
0afe819fb6bd54d591e7b5b368920793.exe
-
Size
1.2MB
-
MD5
0afe819fb6bd54d591e7b5b368920793
-
SHA1
e353c08baaaedd5155a9f972cdd9c0deca5eae4f
-
SHA256
68a5258c5c468efc0102b57b21cf9b641032d37746f510b2876d93a3271b10f2
-
SHA512
611484b3c0a3131788931304cfddcff402e06a9d73dbe021b2f0cc00794ced7d5631cfe22d6597813942a24c8ad83d811c17cedbe6cf722e4a17b5864e05da00
-
SSDEEP
24576:MYRTCmt2OsBgo0q4wMlay98EmOfWzY8d:MQ/oHMlaRJ8Sbd
Malware Config
Extracted
xloader
2.3
wufn
rsautoluxe.com
theroseofsharonsalon.com
singnema.com
nathanielwhite108.com
theforumonline.com
iqpt.info
joneshondaservice.com
fafene.com
solanohomebuyerclass.com
zwq.xyz
searchlakeconroehomes.com
briative.com
frystmor.city
systemofyouth.com
sctsmney.com
tv-safetrading.com
thesweetboy.com
occulusblu.com
pawsthemomentpetphotography.com
travelstipsguide.com
verifypurchase.online
333s998.com
amsmapped.com
mimortgageexpert.com
joshuatreeresearch.com
brasilupshop.com
support24h.site
recipesdunnright.com
feathertiara.net
intoxickiss.com
greenmommarket.com
prinothhusky.com
800pls.info
martabaroagency.com
neosinder.com
davidwarburg.com
chinanl168.com
organicdiscover.com
kingdomvets.com
thetravellingwitch.com
kyg-cpa.com
bigarius.com
collegevillepaareahomes.com
ashestore.site
rizqebooks.com
techwhose.com
peak-valleyadvertising.com
craftbychristians.com
laterlifelendingsupermarket.com
setadragon.com
pon.xyz
reshemporium.com
missk-hair.com
hk6628.com
rootmoover.com
thetew.com
mybodysaver.com
cuadorcoast.com
goteclift.com
solisdq.info
hsicclassactionsettlement.com
cummingsforum.com
talleresmulticar.com
qq4004.com
gaigoilaocai.com
Signatures
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral2/memory/3016-8-0x0000000002E80000-0x0000000002E92000-memory.dmp CustAttr -
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/4292-13-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3016 set thread context of 4292 3016 0afe819fb6bd54d591e7b5b368920793.exe 102 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4292 0afe819fb6bd54d591e7b5b368920793.exe 4292 0afe819fb6bd54d591e7b5b368920793.exe 4292 0afe819fb6bd54d591e7b5b368920793.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3016 wrote to memory of 4292 3016 0afe819fb6bd54d591e7b5b368920793.exe 102 PID 3016 wrote to memory of 4292 3016 0afe819fb6bd54d591e7b5b368920793.exe 102 PID 3016 wrote to memory of 4292 3016 0afe819fb6bd54d591e7b5b368920793.exe 102 PID 3016 wrote to memory of 4292 3016 0afe819fb6bd54d591e7b5b368920793.exe 102 PID 3016 wrote to memory of 4292 3016 0afe819fb6bd54d591e7b5b368920793.exe 102 PID 3016 wrote to memory of 4292 3016 0afe819fb6bd54d591e7b5b368920793.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\0afe819fb6bd54d591e7b5b368920793.exe"C:\Users\Admin\AppData\Local\Temp\0afe819fb6bd54d591e7b5b368920793.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\0afe819fb6bd54d591e7b5b368920793.exe"C:\Users\Admin\AppData\Local\Temp\0afe819fb6bd54d591e7b5b368920793.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4292
-