Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 13:50
Static task
static1
Behavioral task
behavioral1
Sample
e1d1316d5bc047ec817b950286734ed0.exe
Resource
win7-20240220-en
General
-
Target
e1d1316d5bc047ec817b950286734ed0.exe
-
Size
1.3MB
-
MD5
e1d1316d5bc047ec817b950286734ed0
-
SHA1
ae3cb4a0103f8daa9ec8f6dc00b6bfeb3f1c52ca
-
SHA256
6fd8c63bf53f7364e54505eb98e1b6fc005fbb691a65680e400e7b9104ad1795
-
SHA512
88a8f1555bc906728a9ab429899e2ae7d5eefa57128072607423cca26e36044160f6383f3568a581a786780a6a0fdd54cf13b9222c550dc6e66b8994fcc2b168
-
SSDEEP
24576:gzeFrYS/d3kYdkhlOAnxHRrjz+LVL+eQBDmwRGPoN7vdiTbnFM:5H2lOAnxHRrjz+ZL+eum/PoiM
Malware Config
Extracted
xloader
2.3
ajs8
lotfysupport.net
tradingsentral.com
mobiles240.com
redecompre.com
mulliganjames.com
excursionlanzarote.com
n1getaccess.com
wirelessconsole.com
thevez.net
joygshpng.com
arandawines.com
eliassantis.net
racevc.com
mybluemonitor.com
jual-penggugurkandungan.com
connectgf.com
nmpsolutions.com
anipawesome.com
vissito.com
terracottagkp.com
oemintra.com
greensecuredeeparchive.com
zhaoba17.com
indiadesignstory.com
handybusy.com
fkldklfdklfddef.com
winnadvisorsolutions.com
signin-solution.com
comericac.com
tugqzcc.icu
discountpty.com
dhclanrs.com
tetasdeoro.com
qroyalrealestate.com
beweirdbrand.com
veganonthegreens.info
paulsplumbingllc.com
ontimedigitalagency.com
meohaysucsong.club
commandherofyou.com
travelawardsguide.com
shopvybz.com
healthylivingawaits.com
theassistedadrscheme.com
iphonescreenprotect.com
zhuqiuhui.space
514rosemont.com
labour-exchange.com
sarahhubrealestate.com
kcleases.com
kupitoptom.com
drayasvista.com
esmo-2017.com
jubmoprivacy.com
heymayafilms.com
beregnung-mv.com
relishliferesearchcenter.com
cchidwick.xyz
thederbyshiresoapcompany.com
poconohomeinspectors.com
gregorymazzalaw.com
ofaplatinumbonus.com
laurenbarclay.com
sickandwireless.com
trucktodock.com
Signatures
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral2/memory/4084-8-0x0000000002B60000-0x0000000002B72000-memory.dmp CustAttr -
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/2868-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4084 set thread context of 2868 4084 e1d1316d5bc047ec817b950286734ed0.exe 102 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4084 e1d1316d5bc047ec817b950286734ed0.exe 4084 e1d1316d5bc047ec817b950286734ed0.exe 2868 e1d1316d5bc047ec817b950286734ed0.exe 2868 e1d1316d5bc047ec817b950286734ed0.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4084 e1d1316d5bc047ec817b950286734ed0.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4084 wrote to memory of 2616 4084 e1d1316d5bc047ec817b950286734ed0.exe 101 PID 4084 wrote to memory of 2616 4084 e1d1316d5bc047ec817b950286734ed0.exe 101 PID 4084 wrote to memory of 2616 4084 e1d1316d5bc047ec817b950286734ed0.exe 101 PID 4084 wrote to memory of 2868 4084 e1d1316d5bc047ec817b950286734ed0.exe 102 PID 4084 wrote to memory of 2868 4084 e1d1316d5bc047ec817b950286734ed0.exe 102 PID 4084 wrote to memory of 2868 4084 e1d1316d5bc047ec817b950286734ed0.exe 102 PID 4084 wrote to memory of 2868 4084 e1d1316d5bc047ec817b950286734ed0.exe 102 PID 4084 wrote to memory of 2868 4084 e1d1316d5bc047ec817b950286734ed0.exe 102 PID 4084 wrote to memory of 2868 4084 e1d1316d5bc047ec817b950286734ed0.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1d1316d5bc047ec817b950286734ed0.exe"C:\Users\Admin\AppData\Local\Temp\e1d1316d5bc047ec817b950286734ed0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\e1d1316d5bc047ec817b950286734ed0.exe"C:\Users\Admin\AppData\Local\Temp\e1d1316d5bc047ec817b950286734ed0.exe"2⤵PID:2616
-
-
C:\Users\Admin\AppData\Local\Temp\e1d1316d5bc047ec817b950286734ed0.exe"C:\Users\Admin\AppData\Local\Temp\e1d1316d5bc047ec817b950286734ed0.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2868
-