Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
06-03-2024 06:01
Static task
static1
Behavioral task
behavioral1
Sample
b6af62dfb431da0decdd5b947e3d15a8.exe
Resource
win7-20240221-en
General
-
Target
b6af62dfb431da0decdd5b947e3d15a8.exe
-
Size
1.2MB
-
MD5
b6af62dfb431da0decdd5b947e3d15a8
-
SHA1
1479f335152bfb7dc22a24638098f17988fa4c8e
-
SHA256
c070fb4fd74f3cb1b4b739c8b80ea499734a7e9859ff3a0f5cd5a51ac4e0ca7e
-
SHA512
e383f052ff9de8fb09bdfc88de15ce8f64fe709933aabd4db010b9a3152c3d37359e1414272f9265ae14a8f9128a93d8dbda6ef6b6f49b4be07915da206f7f91
-
SSDEEP
24576:4VOsBgo0q4wMCBmCmTOUd+L6kyXWMUcm93NchfLD3qg5erpasQZ:40oHMWmCm6Ud+zyXsxqhfHFwRE
Malware Config
Extracted
xloader
2.3
wufn
rsautoluxe.com
theroseofsharonsalon.com
singnema.com
nathanielwhite108.com
theforumonline.com
iqpt.info
joneshondaservice.com
fafene.com
solanohomebuyerclass.com
zwq.xyz
searchlakeconroehomes.com
briative.com
frystmor.city
systemofyouth.com
sctsmney.com
tv-safetrading.com
thesweetboy.com
occulusblu.com
pawsthemomentpetphotography.com
travelstipsguide.com
verifypurchase.online
333s998.com
amsmapped.com
mimortgageexpert.com
joshuatreeresearch.com
brasilupshop.com
support24h.site
recipesdunnright.com
feathertiara.net
intoxickiss.com
greenmommarket.com
prinothhusky.com
800pls.info
martabaroagency.com
neosinder.com
davidwarburg.com
chinanl168.com
organicdiscover.com
kingdomvets.com
thetravellingwitch.com
kyg-cpa.com
bigarius.com
collegevillepaareahomes.com
ashestore.site
rizqebooks.com
techwhose.com
peak-valleyadvertising.com
craftbychristians.com
laterlifelendingsupermarket.com
setadragon.com
pon.xyz
reshemporium.com
missk-hair.com
hk6628.com
rootmoover.com
thetew.com
mybodysaver.com
cuadorcoast.com
goteclift.com
solisdq.info
hsicclassactionsettlement.com
cummingsforum.com
talleresmulticar.com
qq4004.com
gaigoilaocai.com
Signatures
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral1/memory/2860-3-0x0000000000480000-0x0000000000492000-memory.dmp CustAttr -
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2376-14-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2860 set thread context of 2376 2860 b6af62dfb431da0decdd5b947e3d15a8.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2860 b6af62dfb431da0decdd5b947e3d15a8.exe 2376 b6af62dfb431da0decdd5b947e3d15a8.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2860 b6af62dfb431da0decdd5b947e3d15a8.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2380 2860 b6af62dfb431da0decdd5b947e3d15a8.exe 30 PID 2860 wrote to memory of 2380 2860 b6af62dfb431da0decdd5b947e3d15a8.exe 30 PID 2860 wrote to memory of 2380 2860 b6af62dfb431da0decdd5b947e3d15a8.exe 30 PID 2860 wrote to memory of 2380 2860 b6af62dfb431da0decdd5b947e3d15a8.exe 30 PID 2860 wrote to memory of 2376 2860 b6af62dfb431da0decdd5b947e3d15a8.exe 31 PID 2860 wrote to memory of 2376 2860 b6af62dfb431da0decdd5b947e3d15a8.exe 31 PID 2860 wrote to memory of 2376 2860 b6af62dfb431da0decdd5b947e3d15a8.exe 31 PID 2860 wrote to memory of 2376 2860 b6af62dfb431da0decdd5b947e3d15a8.exe 31 PID 2860 wrote to memory of 2376 2860 b6af62dfb431da0decdd5b947e3d15a8.exe 31 PID 2860 wrote to memory of 2376 2860 b6af62dfb431da0decdd5b947e3d15a8.exe 31 PID 2860 wrote to memory of 2376 2860 b6af62dfb431da0decdd5b947e3d15a8.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6af62dfb431da0decdd5b947e3d15a8.exe"C:\Users\Admin\AppData\Local\Temp\b6af62dfb431da0decdd5b947e3d15a8.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\b6af62dfb431da0decdd5b947e3d15a8.exe"C:\Users\Admin\AppData\Local\Temp\b6af62dfb431da0decdd5b947e3d15a8.exe"2⤵PID:2380
-
-
C:\Users\Admin\AppData\Local\Temp\b6af62dfb431da0decdd5b947e3d15a8.exe"C:\Users\Admin\AppData\Local\Temp\b6af62dfb431da0decdd5b947e3d15a8.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2376
-