Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-03-2024 18:56
Static task
static1
Behavioral task
behavioral1
Sample
d98f49c17101f5715e07e876585f6e6c.exe
Resource
win7-20240221-en
General
-
Target
d98f49c17101f5715e07e876585f6e6c.exe
-
Size
1.0MB
-
MD5
d98f49c17101f5715e07e876585f6e6c
-
SHA1
af67b2295f7cf496dd93be883bbd39b3e33a8360
-
SHA256
898e39ebe6bdfed0d216a54673ae93fe5349b1addd89e2891b969ff3745536f3
-
SHA512
84f45c4289fe27516ba6fbe00f66880625ff87ecdf641e57952181ea455beddaed98acae5710f0f9f47bd717fe66ae15d8b14ca230c029c90abc4a0d2d17850f
-
SSDEEP
12288:ZGAxqujfAPRyY983gp3KJsUAywxcB9BLbF6UKqhRXLWZrf97tXk0V+A:VqujfAPR3sA6J0yCC9hbXKabWZrTk
Malware Config
Extracted
xloader
2.3
bp39
glembos.com
adjud.net
beautifyoils.com
chilewiki.com
duxingzi.com
happygromedia.com
restpostenboerse.com
vowsweddingofficiants.com
ladingjiwa.xyz
keepmakingefforts-001.com
yeniao.net
eyildirmaz.com
sayanghae.com
promoteboost.com
lzft.net
proudindiacompany.com
birchwoodmeridianlink.com
mesinionisasi.com
wwwrigalinks.com
wewearthepants.com
showtimerisingstarz.com
conheonet.club
bigdogshirlfox.com
xn--ehqw60f1ex.club
redmondgrowth-usa.com
myfcmtestsite.com
dreamersclubstudios.com
bulukx.com
netdetameruweb.xyz
djibnb.com
malikakids.com
11298.xyz
shuanglinsm.com
blackliontv.com
louiskochins.com
successfullsolutionworks.com
myrcmall.com
letsplayandgo.com
history-at-home.com
twentyfour4academy.com
immersebyacfw.com
grazestyle.com
asuatlalumni.com
akmh.pro
oldsportapparel.com
alphaprimfi.com
qgrandcafe.com
draggonlng.com
publish.mobi
myuhcvisioni.com
susanpatersonwriter.com
1033308.com
vaca.travel
djmarieco.com
realiszt.com
am-evestment-training.com
plaguelanguage.com
kcpinvest.com
wedilivervc.com
stopneuralink.com
alyvmarli.com
disseminacao.com
testaker.com
officee65.com
piadineriae45.com
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2720-14-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
d98f49c17101f5715e07e876585f6e6c.exedescription pid process target process PID 2836 set thread context of 2720 2836 d98f49c17101f5715e07e876585f6e6c.exe d98f49c17101f5715e07e876585f6e6c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
d98f49c17101f5715e07e876585f6e6c.exed98f49c17101f5715e07e876585f6e6c.exepid process 2836 d98f49c17101f5715e07e876585f6e6c.exe 2720 d98f49c17101f5715e07e876585f6e6c.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
d98f49c17101f5715e07e876585f6e6c.exedescription pid process Token: SeDebugPrivilege 2836 d98f49c17101f5715e07e876585f6e6c.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
d98f49c17101f5715e07e876585f6e6c.exedescription pid process target process PID 2836 wrote to memory of 2848 2836 d98f49c17101f5715e07e876585f6e6c.exe d98f49c17101f5715e07e876585f6e6c.exe PID 2836 wrote to memory of 2848 2836 d98f49c17101f5715e07e876585f6e6c.exe d98f49c17101f5715e07e876585f6e6c.exe PID 2836 wrote to memory of 2848 2836 d98f49c17101f5715e07e876585f6e6c.exe d98f49c17101f5715e07e876585f6e6c.exe PID 2836 wrote to memory of 2848 2836 d98f49c17101f5715e07e876585f6e6c.exe d98f49c17101f5715e07e876585f6e6c.exe PID 2836 wrote to memory of 2848 2836 d98f49c17101f5715e07e876585f6e6c.exe d98f49c17101f5715e07e876585f6e6c.exe PID 2836 wrote to memory of 2848 2836 d98f49c17101f5715e07e876585f6e6c.exe d98f49c17101f5715e07e876585f6e6c.exe PID 2836 wrote to memory of 2848 2836 d98f49c17101f5715e07e876585f6e6c.exe d98f49c17101f5715e07e876585f6e6c.exe PID 2836 wrote to memory of 2720 2836 d98f49c17101f5715e07e876585f6e6c.exe d98f49c17101f5715e07e876585f6e6c.exe PID 2836 wrote to memory of 2720 2836 d98f49c17101f5715e07e876585f6e6c.exe d98f49c17101f5715e07e876585f6e6c.exe PID 2836 wrote to memory of 2720 2836 d98f49c17101f5715e07e876585f6e6c.exe d98f49c17101f5715e07e876585f6e6c.exe PID 2836 wrote to memory of 2720 2836 d98f49c17101f5715e07e876585f6e6c.exe d98f49c17101f5715e07e876585f6e6c.exe PID 2836 wrote to memory of 2720 2836 d98f49c17101f5715e07e876585f6e6c.exe d98f49c17101f5715e07e876585f6e6c.exe PID 2836 wrote to memory of 2720 2836 d98f49c17101f5715e07e876585f6e6c.exe d98f49c17101f5715e07e876585f6e6c.exe PID 2836 wrote to memory of 2720 2836 d98f49c17101f5715e07e876585f6e6c.exe d98f49c17101f5715e07e876585f6e6c.exe PID 2836 wrote to memory of 2720 2836 d98f49c17101f5715e07e876585f6e6c.exe d98f49c17101f5715e07e876585f6e6c.exe PID 2836 wrote to memory of 2720 2836 d98f49c17101f5715e07e876585f6e6c.exe d98f49c17101f5715e07e876585f6e6c.exe PID 2836 wrote to memory of 2720 2836 d98f49c17101f5715e07e876585f6e6c.exe d98f49c17101f5715e07e876585f6e6c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d98f49c17101f5715e07e876585f6e6c.exe"C:\Users\Admin\AppData\Local\Temp\d98f49c17101f5715e07e876585f6e6c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\d98f49c17101f5715e07e876585f6e6c.exe"C:\Users\Admin\AppData\Local\Temp\d98f49c17101f5715e07e876585f6e6c.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\d98f49c17101f5715e07e876585f6e6c.exe"C:\Users\Admin\AppData\Local\Temp\d98f49c17101f5715e07e876585f6e6c.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2720-8-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2720-16-0x0000000000C40000-0x0000000000F43000-memory.dmpFilesize
3.0MB
-
memory/2720-14-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2720-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2720-10-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/2836-3-0x0000000000540000-0x000000000055E000-memory.dmpFilesize
120KB
-
memory/2836-6-0x00000000057C0000-0x000000000585E000-memory.dmpFilesize
632KB
-
memory/2836-7-0x0000000000750000-0x000000000077E000-memory.dmpFilesize
184KB
-
memory/2836-5-0x0000000000710000-0x0000000000750000-memory.dmpFilesize
256KB
-
memory/2836-4-0x0000000074290000-0x000000007497E000-memory.dmpFilesize
6.9MB
-
memory/2836-1-0x0000000074290000-0x000000007497E000-memory.dmpFilesize
6.9MB
-
memory/2836-2-0x0000000000710000-0x0000000000750000-memory.dmpFilesize
256KB
-
memory/2836-15-0x0000000074290000-0x000000007497E000-memory.dmpFilesize
6.9MB
-
memory/2836-0-0x00000000002F0000-0x0000000000400000-memory.dmpFilesize
1.1MB