Analysis
-
max time kernel
170s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2023, 01:43
Static task
static1
Behavioral task
behavioral1
Sample
be35f0ce65b229e225d6c65b48704a2a.exe
Resource
win7-20231215-en
General
-
Target
be35f0ce65b229e225d6c65b48704a2a.exe
-
Size
586KB
-
MD5
be35f0ce65b229e225d6c65b48704a2a
-
SHA1
0f47018085e461e2b138e501393c94a173d90269
-
SHA256
8bc53adb417402cf954d8018bc35c0f4f853d5a2e3471c4de98ca8e1fa8fa1e9
-
SHA512
9fa74f93f266e72647e74860f4792fa7ed3a3181798c9add49d23ba380f6bca0590c67c5df5f4bad53ef6cfd49dbcd3b8c2266d580729dfce73cd497ef867772
-
SSDEEP
12288:pOsBgo0q4wMuPqyK4GjKKkk9CU+kQSmboCtcShnSZ0:pOsBgo0q4wMwK4GZYU+np5hnSZ
Malware Config
Extracted
xloader
2.3
b82a
annguyet.net
parkwood.tech
readysetmortgage.net
betraywithdraw.com
incmagazine.xyz
dentistinpimplesaudagar.com
lianhx.com
prodrelease0827b.com
safehavenwellbeing.com
gehdeinweg.club
sondaggio123.space
prospecx.report
remediate.info
savylash.com
puppornstar.com
coaching-romand.com
boozeshops.com
team316media.com
ldgawydtl.icu
trezteez.com
hhtgd.com
jugoon.xyz
bsafetexting.com
imaycom.com
fakihgroups.com
pfarfour.com
organowantcreator.com
profesyoneltemizlikantalya.com
kustomdiapercakes.com
repealpna.com
seraby.com
eventsshowleads.com
naturallybossed.com
twxgbmbdkxczd.net
gahterwisdom.com
bautec-euregio.com
sarelawadisangh.com
gimedor.com
revolutionofwork.com
zpwizso.com
livinglavidalocaltexas.com
yenidea.com
smugfantasyfootball.com
myprofitvideo.com
inseparablehearts.com
dalebutano.com
bluecatsubs.com
nationwaves.com
theplantwitch.com
ffntc.com
188yyw.com
thejulington.com
timelessthots.com
homesstory.com
breauxsauto.com
quittytime.com
bainrix.com
eurofiregroup.com
paralelogram.com
nodefind.net
mastercommunications.xyz
lovelyeses.com
social-clarity.com
westvisionconsult.com
arogyanlife.com
Signatures
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral2/memory/3028-7-0x0000000005110000-0x0000000005122000-memory.dmp CustAttr -
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/2384-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3028 set thread context of 2384 3028 be35f0ce65b229e225d6c65b48704a2a.exe 105 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2384 be35f0ce65b229e225d6c65b48704a2a.exe 2384 be35f0ce65b229e225d6c65b48704a2a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2384 3028 be35f0ce65b229e225d6c65b48704a2a.exe 105 PID 3028 wrote to memory of 2384 3028 be35f0ce65b229e225d6c65b48704a2a.exe 105 PID 3028 wrote to memory of 2384 3028 be35f0ce65b229e225d6c65b48704a2a.exe 105 PID 3028 wrote to memory of 2384 3028 be35f0ce65b229e225d6c65b48704a2a.exe 105 PID 3028 wrote to memory of 2384 3028 be35f0ce65b229e225d6c65b48704a2a.exe 105 PID 3028 wrote to memory of 2384 3028 be35f0ce65b229e225d6c65b48704a2a.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\be35f0ce65b229e225d6c65b48704a2a.exe"C:\Users\Admin\AppData\Local\Temp\be35f0ce65b229e225d6c65b48704a2a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\be35f0ce65b229e225d6c65b48704a2a.exe"C:\Users\Admin\AppData\Local\Temp\be35f0ce65b229e225d6c65b48704a2a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2384
-