Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
08-05-2024 05:20
Static task
static1
Behavioral task
behavioral1
Sample
scn14092020.scr
Resource
win7-20231129-en
General
-
Target
scn14092020.scr
-
Size
380KB
-
MD5
f028d6c9991258c5c75e9f234d4dee79
-
SHA1
2f6b7f76bb4a3342f3450e1cc9ef539c2028c59e
-
SHA256
576f0ed5ae69ececc1bb11492479101c0281af46cb86a73eae9195376ab02717
-
SHA512
d3fd7200dad40ce073d477205abf7736e9aa9aab492fec1f42c318f65c2a9e132ab45d6b9c52fa3d7c535db63c392d370e2ee2b4787845c4f5f5408ba352f8be
-
SSDEEP
6144:Jr5KTzUvCH42ZGb9XF1csV2DoT/oENADXgjDxGXMSwGxDUxQTf2ujAhzs7g8LX9:Z5KEvCH4kGvqfPrDg3kXMitohz38LX9
Malware Config
Extracted
xloader
2.1
d9s8
adriaguest.com
connerparty.com
jblmhomestore.net
23works.com
environmentsafetymemphis.com
hqxmf.com
hivepublications.com
keebcat.com
smalltownlawns.com
brasserie-lafayette.com
kq-iot.com
theghostfestival.com
dmhowardstudio.com
nittayabeauty.com
thebardi.com
transcash-pocket-money.com
stick.tips
revolucaomindfulness.com
clicrhonealpes.com
ekcraftmasters.com
ashleygrady.com
animalsnecessity.com
nori-experience.online
transulnion.com
nola3d.com
chehol.directory
khoedep.pro
krewebijoux.com
uuid.blue
panoramazoom.com
isabellelinhnguyen.com
aktivasi-asuransi-bukalapak.com
afsnubt.icu
yes-properties.com
digitalprocessserver.com
victimx.com
getfitnesssupplement.com
bashabodol.com
3dprint-service.com
boricuabrands.com
lepetitdiscounteur.com
gameserverpanels.com
sinar234d.info
mengkeamc.com
seolminseok.com
edofcourse.com
conducs.com
neo4tec.com
portfoliorental.com
robotsazgreenca.com
thepicobutton.com
ikemeticbeauty.com
kenpetrunickcabinets.com
meershoek.com
salemcountyproud.com
kelham-beardies-spitz.com
hriveraphotography.com
georgiasrm.com
restaurantsfx.com
jadebuildingmaintenance.com
czgzts.com
statistcs.com
itjtechnology.com
buyinvisimat.com
martjeje2.info
Signatures
-
Xloader payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2268-10-0x0000000000400000-0x0000000000431000-memory.dmp xloader behavioral1/memory/2268-6-0x0000000000400000-0x0000000000431000-memory.dmp xloader -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
Processes:
scn14092020.scrpid Process 2140 scn14092020.scr 2140 scn14092020.scr 2140 scn14092020.scr 2140 scn14092020.scr -
Suspicious use of SetThreadContext 1 IoCs
Processes:
scn14092020.scrdescription pid Process procid_target PID 2140 set thread context of 2268 2140 scn14092020.scr 28 -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target Process procid_target 2312 2268 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
scn14092020.scrpid Process 2140 scn14092020.scr -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
scn14092020.scrdescription pid Process Token: SeDebugPrivilege 2140 scn14092020.scr -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
scn14092020.scrscn14092020.scrdescription pid Process procid_target PID 2140 wrote to memory of 2268 2140 scn14092020.scr 28 PID 2140 wrote to memory of 2268 2140 scn14092020.scr 28 PID 2140 wrote to memory of 2268 2140 scn14092020.scr 28 PID 2140 wrote to memory of 2268 2140 scn14092020.scr 28 PID 2140 wrote to memory of 2268 2140 scn14092020.scr 28 PID 2140 wrote to memory of 2268 2140 scn14092020.scr 28 PID 2140 wrote to memory of 2268 2140 scn14092020.scr 28 PID 2140 wrote to memory of 2268 2140 scn14092020.scr 28 PID 2268 wrote to memory of 2312 2268 scn14092020.scr 29 PID 2268 wrote to memory of 2312 2268 scn14092020.scr 29 PID 2268 wrote to memory of 2312 2268 scn14092020.scr 29 PID 2268 wrote to memory of 2312 2268 scn14092020.scr 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\scn14092020.scr"C:\Users\Admin\AppData\Local\Temp\scn14092020.scr" /S1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\scn14092020.scr"C:\Users\Admin\AppData\Local\Temp\scn14092020.scr"2⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 363⤵
- Program crash
PID:2312
-
-