Analysis
-
max time kernel
150s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 12:38
Static task
static1
Behavioral task
behavioral1
Sample
1f05d929e0288a3d3ce3c53c111cfca9.exe
Resource
win7-20231215-en
General
-
Target
1f05d929e0288a3d3ce3c53c111cfca9.exe
-
Size
827KB
-
MD5
1f05d929e0288a3d3ce3c53c111cfca9
-
SHA1
679b18c7e7acfbb482bd1f40093db93c94697ae0
-
SHA256
8441a8b048a19c276e9c25457b681b8167a82f4fdee86dc4722891d0dbb5043a
-
SHA512
8a6233065618a775805aa44feda8ff98907b64d8b618fe470de15e8b911485d2cefc6cd06f8e333240b25943fb456adfa6c74b49de012c1c53d0fd67bf22d9bb
-
SSDEEP
24576:YCXflUMjoJLCQM+yYav2OxWcMVz7mo5oFCEkv:vv+CXqaO79Fosv
Malware Config
Extracted
xloader
2.3
iuem
agileatefoundation.com
preheimphotography.com
blueivymart.com
magetu.info
sunayah.com
gulumsecafe.com
belveder.net
pumpkinmangaming.com
playd6plus.com
thuanland.com
blacklivesmatterforreal.com
enviromentalco.com
ferronnstyle.com
mrbeagleshop.com
whmlqx.com
unifiedfederal.com
purest-you.com
ashleymartinonline.com
bayareaportraitphotographer.com
ysnrjelx.icu
cosyarchitectural.com
alientoatelier.com
getinrolled.com
oncallteaching.com
zubaiqlinasports.com
weibees.com
deborah-williams-sculpture.com
chucksice.com
sentralele.online
neediclick.com
pcsnake.com
bigcountrytees.com
janiekillips.com
leffetvrac.com
hbxamc.com
onlineconverseshop.com
artepalabra.com
xn--sanatpazar-6ub.com
hotelplumbinginstallers.com
somethingnewstudio.com
capgunband.com
boxingbootcampcart.com
yilmazone.com
healthadvocatesinhomecare.com
sooqhoot.com
cd-gxdz.com
nrbfx.com
live-abundant-life.com
paytofindmebro.com
biolingziindonesia.site
proturflawn.net
swidow.today
doublecombat.com
skpgzone22.com
securegotapco.com
gadgetlibrarybd.com
ferropartners.com
cnsaio.com
fruitloopsmarketing.com
aadyashop.online
rdsportsbrand.com
scxinzhen.com
paloaltogarage.com
thatshowdiy.net
coffeyklatch.com
Signatures
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral2/memory/1868-8-0x00000000028A0000-0x00000000028B2000-memory.dmp CustAttr -
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/220-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1868 set thread context of 220 1868 1f05d929e0288a3d3ce3c53c111cfca9.exe 106 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1868 1f05d929e0288a3d3ce3c53c111cfca9.exe 1868 1f05d929e0288a3d3ce3c53c111cfca9.exe 220 1f05d929e0288a3d3ce3c53c111cfca9.exe 220 1f05d929e0288a3d3ce3c53c111cfca9.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1868 1f05d929e0288a3d3ce3c53c111cfca9.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1868 wrote to memory of 220 1868 1f05d929e0288a3d3ce3c53c111cfca9.exe 106 PID 1868 wrote to memory of 220 1868 1f05d929e0288a3d3ce3c53c111cfca9.exe 106 PID 1868 wrote to memory of 220 1868 1f05d929e0288a3d3ce3c53c111cfca9.exe 106 PID 1868 wrote to memory of 220 1868 1f05d929e0288a3d3ce3c53c111cfca9.exe 106 PID 1868 wrote to memory of 220 1868 1f05d929e0288a3d3ce3c53c111cfca9.exe 106 PID 1868 wrote to memory of 220 1868 1f05d929e0288a3d3ce3c53c111cfca9.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f05d929e0288a3d3ce3c53c111cfca9.exe"C:\Users\Admin\AppData\Local\Temp\1f05d929e0288a3d3ce3c53c111cfca9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\1f05d929e0288a3d3ce3c53c111cfca9.exe"C:\Users\Admin\AppData\Local\Temp\1f05d929e0288a3d3ce3c53c111cfca9.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:220
-