Analysis
-
max time kernel
97s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 10:09
Static task
static1
Behavioral task
behavioral1
Sample
163273142f825c00083210241a47baa5.exe
Resource
win7-20231215-en
General
-
Target
163273142f825c00083210241a47baa5.exe
-
Size
702KB
-
MD5
163273142f825c00083210241a47baa5
-
SHA1
aac6c50cb05df0da5ff9f9bcbbd57afddadd8e48
-
SHA256
eaf0f5b706bfe873d85287706d0a41d55e493d90e19400194c3a3a8060bb8c3c
-
SHA512
e8bc3ebcc8cc64c64f242e5ed56f21b581c2c4932dc7472b8e0fadd985c7f66f78a4d3b2956dc54dd741b7b1717552d6e1f1a429fbb0089a428029f3603eb650
-
SSDEEP
12288:plFPU9bPU9+n8U/UUX9OsBgo0q4wMjTgVJ4Iq/5bHzTkL5HxlkszrPc0x0haLP+:plaX9OsBgo0q4wMj0VJ4Iq/9TGHfdL
Malware Config
Extracted
xloader
2.3
y66u
oscaralejandrotravel.com
icimsoy.net
mosaicpreschool.com
moonchildbohoshop.com
zews.xyz
irvinelawpractice.com
capralog.com
55aa-5.com
1stcorichmondhowitzers.com
powerhouseenterprises.com
magetu.info
206a1db.com
unilever2020.com
bbterramar.com
einfohires.com
gogrowlocal.com
annerobertsla.com
sabaiexpo.com
neatpublications.com
frmsoccercampaustralia.com
deluxedomain.com
bhrecycling.com
asterisk-dominicana.com
veridicalid.com
freetv365.com
fortuneceylon.com
btlbusinesscoaching.com
excel-dse.com
swizzlestack.com
meysadesiign.com
noarting.com
bigrichboards.com
ssecurestore.com
ehugme.com
itswhiitelighting.com
sinijitu.com
jamaicadebatescommission.net
magic-psi.com
abitabengalkittens.com
finallyhomenewagain.com
glastonburybootcompany.com
pakistanpropertyyshow.com
francewarbirds.com
tdrolison.com
njshoreanalytics.com
scamperpub.com
primalbutchery.com
orthorghet.com
rudysgreene.com
fieldstoneateasthampton.com
winscat.com
2znl.com
nekomego.com
thefinalcut.life
kuove.com
hc100ig.com
coldstarstudios.com
earlolson.art
movementalways.com
kuringde.com
nextlevelboutique.com
myamazinghomes.net
dyeovc.com
fmemeetup.com
travelssa.com
Signatures
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral2/memory/3980-7-0x0000000004ED0000-0x0000000004EE2000-memory.dmp CustAttr -
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/4868-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3980 set thread context of 4868 3980 163273142f825c00083210241a47baa5.exe 97 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3980 163273142f825c00083210241a47baa5.exe 3980 163273142f825c00083210241a47baa5.exe 4868 163273142f825c00083210241a47baa5.exe 4868 163273142f825c00083210241a47baa5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3980 163273142f825c00083210241a47baa5.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3980 wrote to memory of 1204 3980 163273142f825c00083210241a47baa5.exe 96 PID 3980 wrote to memory of 1204 3980 163273142f825c00083210241a47baa5.exe 96 PID 3980 wrote to memory of 1204 3980 163273142f825c00083210241a47baa5.exe 96 PID 3980 wrote to memory of 4868 3980 163273142f825c00083210241a47baa5.exe 97 PID 3980 wrote to memory of 4868 3980 163273142f825c00083210241a47baa5.exe 97 PID 3980 wrote to memory of 4868 3980 163273142f825c00083210241a47baa5.exe 97 PID 3980 wrote to memory of 4868 3980 163273142f825c00083210241a47baa5.exe 97 PID 3980 wrote to memory of 4868 3980 163273142f825c00083210241a47baa5.exe 97 PID 3980 wrote to memory of 4868 3980 163273142f825c00083210241a47baa5.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\163273142f825c00083210241a47baa5.exe"C:\Users\Admin\AppData\Local\Temp\163273142f825c00083210241a47baa5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\163273142f825c00083210241a47baa5.exe"C:\Users\Admin\AppData\Local\Temp\163273142f825c00083210241a47baa5.exe"2⤵PID:1204
-
-
C:\Users\Admin\AppData\Local\Temp\163273142f825c00083210241a47baa5.exe"C:\Users\Admin\AppData\Local\Temp\163273142f825c00083210241a47baa5.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4868
-