Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 16:00
Static task
static1
Behavioral task
behavioral1
Sample
2b487f8cff52e5de3c37f4d48975ed45.exe
Resource
win7-20231215-en
General
-
Target
2b487f8cff52e5de3c37f4d48975ed45.exe
-
Size
1.4MB
-
MD5
2b487f8cff52e5de3c37f4d48975ed45
-
SHA1
367d9ccbd374e0267eb50e3323fffce0ed2b2f41
-
SHA256
9808a74ae58e0a4ce64f01226ea471338f9df7e2155581ef0822070d952997b5
-
SHA512
af6fbfd84e96c7d75cf00b97d28f8b08b93bcf51faaaf5fb9a07a065e3d114ed1f4677f25af324804c536d795559dede1d698ae4056487314682bfcfa5eb2da9
-
SSDEEP
24576:9irOsBgo0q4wMWBmCmTOUd+L6kpXW9wdc0Kly0VaLQ8Iq40Kv1VZX:UaoHMqmCm6Ud+zpXmwDSy048JZ
Malware Config
Extracted
xloader
2.3
p086
jinshichain.com
worldpettraveler.com
hightecforpc.com
kj97fm.com
streetnewstv.com
webrew.club
wheretogodubai.com
apostapolitica.net
thecafy.com
vinelosangeles.com
gashinc.com
gutitout.net
bvd-invest.com
realtoroutdesk.com
lawnbowlstournaments.net
nobodyisillegal.com
abogadoorihuela.net
sanistela.com
jksecurityworld.com
peppermintproject.com
blaxies3.com
oil51.com
joessche.com
7763.xyz
great-news-today.com
gen-oct.com
viyados.com
believe4america.com
misskarenenglishreacher.com
playgrnd.club
disseminate.info
degroeneremedie.com
clasedeangel.com
humanpossibilitiesfreed.com
lilythreads.com
6416drexel.com
jerseyshoreweedtees.com
eztrickstart.com
marionlittle.com
ecklesphoto.com
halifaxmews.com
carguymarkvan.com
cvpsychicmedium.com
greenlitebm.com
mainestreetwebdesign.com
wajvrko.icu
qbonitafesta.com
udsumberbarokah.com
maryschatzmd.com
leoscorpio.com
stashbashpartybus.com
bootlegnews.com
a1perfomance.com
publicofsociety.com
easybuy.cool
yhbt103.com
hereandnowme.com
proskinaesthetics.com
atminishop.com
dashcrew.net
4xpipsnager.com
ngmysz.com
moorestownquakerparents.com
maternity.cloud
riscology.com
Signatures
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral2/memory/1108-8-0x0000000005380000-0x0000000005392000-memory.dmp CustAttr -
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/4724-13-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1108 set thread context of 4724 1108 2b487f8cff52e5de3c37f4d48975ed45.exe 101 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1108 2b487f8cff52e5de3c37f4d48975ed45.exe 1108 2b487f8cff52e5de3c37f4d48975ed45.exe 4724 2b487f8cff52e5de3c37f4d48975ed45.exe 4724 2b487f8cff52e5de3c37f4d48975ed45.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1108 2b487f8cff52e5de3c37f4d48975ed45.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1108 wrote to memory of 2568 1108 2b487f8cff52e5de3c37f4d48975ed45.exe 102 PID 1108 wrote to memory of 2568 1108 2b487f8cff52e5de3c37f4d48975ed45.exe 102 PID 1108 wrote to memory of 2568 1108 2b487f8cff52e5de3c37f4d48975ed45.exe 102 PID 1108 wrote to memory of 4724 1108 2b487f8cff52e5de3c37f4d48975ed45.exe 101 PID 1108 wrote to memory of 4724 1108 2b487f8cff52e5de3c37f4d48975ed45.exe 101 PID 1108 wrote to memory of 4724 1108 2b487f8cff52e5de3c37f4d48975ed45.exe 101 PID 1108 wrote to memory of 4724 1108 2b487f8cff52e5de3c37f4d48975ed45.exe 101 PID 1108 wrote to memory of 4724 1108 2b487f8cff52e5de3c37f4d48975ed45.exe 101 PID 1108 wrote to memory of 4724 1108 2b487f8cff52e5de3c37f4d48975ed45.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b487f8cff52e5de3c37f4d48975ed45.exe"C:\Users\Admin\AppData\Local\Temp\2b487f8cff52e5de3c37f4d48975ed45.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\2b487f8cff52e5de3c37f4d48975ed45.exe"C:\Users\Admin\AppData\Local\Temp\2b487f8cff52e5de3c37f4d48975ed45.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4724
-
-
C:\Users\Admin\AppData\Local\Temp\2b487f8cff52e5de3c37f4d48975ed45.exe"C:\Users\Admin\AppData\Local\Temp\2b487f8cff52e5de3c37f4d48975ed45.exe"2⤵PID:2568
-