Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 14:25
Static task
static1
Behavioral task
behavioral1
Sample
1b58203ecd7ef5d31ea39a5218b40115.exe
Resource
win7-20231215-en
General
-
Target
1b58203ecd7ef5d31ea39a5218b40115.exe
-
Size
490KB
-
MD5
1b58203ecd7ef5d31ea39a5218b40115
-
SHA1
2770e86784c8e3bc62f59a02c92390bd74b6dc98
-
SHA256
f5e9658f44135be66cc2cb4862c67326c803871e49a73b0376b266cb95c41f52
-
SHA512
1f5e3a616713cf8daa6778ab6a895ed488ac294bf677b967ff68dec9a8fd0a14c679f4e0d79131640566f95f27cbf0bebf9f5291f70b7cd26e405a05b296fe9e
-
SSDEEP
12288:dtfEdMQEJJMkdBvd1Zy8OfGPAE9Zsi4hdStfDWc8Q2tZsi:dtsdoJuEBvd1g5fGPP9Zsf
Malware Config
Extracted
xloader
2.3
k8b5
sardamedicals.com
reelectkendavis4council.com
coreconsultation.com
fajarazhary.com
mybitearner.com
brightpet.info
voicewithchoice.com
bailbondscompany.xyz
7133333333.com
delights.info
gawlvegdr.icu
sdqhpm.com
we2savvyok.com
primallifeathlete.com
gdsinglecell.com
isokineticmachines.com
smartneckrelax.com
gardenvintage.com
hiphopvolume.com
medicapoint.com
crybebe.com
elevatedgameplay.com
armespublishing.com
pathsiteofficial.com
xn--e-2fa.com
besoxie.com
pro-montage.com
smartsmsfloan.net
gafinstallations.com
osk2279.com
sexcam-live-sex.net
supermomsd.com
villa-sardi.com
nkb-webmart.com
vaaccidentdoctorsnearme.net
sewcialdistancesewing.com
smodery.com
mimik33.com
employeepremiumassistance.com
chenqixuan.com
whyyousuckatgolfmovie.com
scholarshdesk.xyz
suenosenescena.com
ombaked.com
growingbargains.com
growbigelite.com
michalwroblewski.online
selfpublishingprojectmgmt.com
salir.info
lutherdanavan.com
caraccidentlawyernearme.net
portraitverse.com
secure-alerts901.info
reviewscanada.com
andreasaction.com
mblinks.net
regulationtoshop.com
borderless-farm.com
excitingdailyshop.com
pawandalmia.net
greatplainsjane.com
operacionapoyo.com
26gibraltardrive.com
getportlandjustice.com
chongzhi365.com
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/1616-14-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2440 set thread context of 1616 2440 1b58203ecd7ef5d31ea39a5218b40115.exe 31 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2440 1b58203ecd7ef5d31ea39a5218b40115.exe 2440 1b58203ecd7ef5d31ea39a5218b40115.exe 1616 1b58203ecd7ef5d31ea39a5218b40115.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2440 1b58203ecd7ef5d31ea39a5218b40115.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2440 wrote to memory of 2648 2440 1b58203ecd7ef5d31ea39a5218b40115.exe 30 PID 2440 wrote to memory of 2648 2440 1b58203ecd7ef5d31ea39a5218b40115.exe 30 PID 2440 wrote to memory of 2648 2440 1b58203ecd7ef5d31ea39a5218b40115.exe 30 PID 2440 wrote to memory of 2648 2440 1b58203ecd7ef5d31ea39a5218b40115.exe 30 PID 2440 wrote to memory of 1616 2440 1b58203ecd7ef5d31ea39a5218b40115.exe 31 PID 2440 wrote to memory of 1616 2440 1b58203ecd7ef5d31ea39a5218b40115.exe 31 PID 2440 wrote to memory of 1616 2440 1b58203ecd7ef5d31ea39a5218b40115.exe 31 PID 2440 wrote to memory of 1616 2440 1b58203ecd7ef5d31ea39a5218b40115.exe 31 PID 2440 wrote to memory of 1616 2440 1b58203ecd7ef5d31ea39a5218b40115.exe 31 PID 2440 wrote to memory of 1616 2440 1b58203ecd7ef5d31ea39a5218b40115.exe 31 PID 2440 wrote to memory of 1616 2440 1b58203ecd7ef5d31ea39a5218b40115.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b58203ecd7ef5d31ea39a5218b40115.exe"C:\Users\Admin\AppData\Local\Temp\1b58203ecd7ef5d31ea39a5218b40115.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\1b58203ecd7ef5d31ea39a5218b40115.exe"C:\Users\Admin\AppData\Local\Temp\1b58203ecd7ef5d31ea39a5218b40115.exe"2⤵PID:2648
-
-
C:\Users\Admin\AppData\Local\Temp\1b58203ecd7ef5d31ea39a5218b40115.exe"C:\Users\Admin\AppData\Local\Temp\1b58203ecd7ef5d31ea39a5218b40115.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1616
-