Analysis
-
max time kernel
147s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
16-07-2024 23:44
Static task
static1
Behavioral task
behavioral1
Sample
IMG_501327.exe
Resource
win7-20240708-en
General
-
Target
IMG_501327.exe
-
Size
462KB
-
MD5
1f11cb76d8f9643820a756448b4b3a0e
-
SHA1
c00db72ff5681b1f26db430a71b35dcfe3978d1c
-
SHA256
aaf1000d1f4822bb6e7424123c807a333a8696783ab029b49df8250b115c27ae
-
SHA512
2e1c2c46233b1a995e234ff7dd5a876a2230e06dc5ee6da3fdd3a890ce2f43bb57e0faee14c3094c80d99f435d42b7e13c845d885f82c2b2d31961cc1db2b3cc
-
SSDEEP
12288:pFda+FdagEMYLZsUN8dgHgY8RfuydvDZ0da7Af:bEMfrdc8Zhdd
Malware Config
Extracted
xloader
2.3
mt6e
morozolga.com
selimtokdemir.com
deluxeweldingsupply.com
allannateddyrose.com
iconsneakersfr.com
vicenteconchilla.com
themediatenow.com
finishmybasemint.com
blaseskincare.com
betwho.site
madewithrealmeat.com
scratchpatchinc.com
daysad.com
kraftwater.com
prolifictrades.com
usdtmgm.com
mooneworms.com
grandspecialiste.com
mirzaassociates.com
bilaltahirofficial.com
covid19overwatch.com
thelastco.com
hansenholdings.net
byjerrywilliams.com
arabgril.com
bowedpink.com
five-minute-diary.com
shop-moonandlola.com
shareboard.net
shopstuckonyou.com
streamthechurch.com
m1stkissmanga.com
cornialera.com
mobilesolutionservice.com
praying.today
thetastybears.com
thegreenlittlebuddha.com
thegiftsofanxiety.com
unmined.win
ikescakes.com
loveandhairstudio.com
okaidoku-shop.net
mcconstruction.company
anerdychristmas.com
avmelihcelik.com
therockremodelinghome.com
moment.email
fusimachallenge.com
comriv.com
lonestarcamaro.com
thetrainertailor.com
solaytech.com
didiami.com
prcfilms.com
emergesorted.com
360marketing.guru
contex3.info
gpjlqwnd.icu
mercedesbenz-jakarta.com
360holdingsbh.com
journey-broadway.com
buyers-connection.com
sufferer-unimpressible.com
hollyspringsedfoundation.com
unicom-group.com
Signatures
-
Beds Protector Packer 1 IoCs
Detects Beds Protector packer used to load .NET malware.
Processes:
resource yara_rule behavioral1/memory/1676-3-0x0000000000400000-0x000000000045E000-memory.dmp beds_protector -
Xloader payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2732-21-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2732-26-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2632-30-0x00000000000D0000-0x00000000000F9000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2468 cmd.exe -
Drops startup file 2 IoCs
Processes:
Powershell.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe Powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe Powershell.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
IMG_501327.exeIMG_501327.exemsiexec.exedescription pid Process procid_target PID 1676 set thread context of 2732 1676 IMG_501327.exe 32 PID 2732 set thread context of 1196 2732 IMG_501327.exe 21 PID 2632 set thread context of 1196 2632 msiexec.exe 21 -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
Powershell.exeIMG_501327.exemsiexec.exepid Process 2680 Powershell.exe 2732 IMG_501327.exe 2732 IMG_501327.exe 2632 msiexec.exe 2632 msiexec.exe 2632 msiexec.exe 2632 msiexec.exe 2632 msiexec.exe 2632 msiexec.exe 2632 msiexec.exe 2632 msiexec.exe 2632 msiexec.exe 2632 msiexec.exe 2632 msiexec.exe 2632 msiexec.exe 2632 msiexec.exe 2632 msiexec.exe 2632 msiexec.exe 2632 msiexec.exe 2632 msiexec.exe 2632 msiexec.exe 2632 msiexec.exe 2632 msiexec.exe 2632 msiexec.exe 2632 msiexec.exe 2632 msiexec.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
IMG_501327.exemsiexec.exepid Process 2732 IMG_501327.exe 2732 IMG_501327.exe 2732 IMG_501327.exe 2632 msiexec.exe 2632 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Powershell.exeIMG_501327.exemsiexec.exedescription pid Process Token: SeDebugPrivilege 2680 Powershell.exe Token: SeDebugPrivilege 2732 IMG_501327.exe Token: SeDebugPrivilege 2632 msiexec.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
IMG_501327.exeExplorer.EXEmsiexec.exedescription pid Process procid_target PID 1676 wrote to memory of 2680 1676 IMG_501327.exe 30 PID 1676 wrote to memory of 2680 1676 IMG_501327.exe 30 PID 1676 wrote to memory of 2680 1676 IMG_501327.exe 30 PID 1676 wrote to memory of 2680 1676 IMG_501327.exe 30 PID 1676 wrote to memory of 2732 1676 IMG_501327.exe 32 PID 1676 wrote to memory of 2732 1676 IMG_501327.exe 32 PID 1676 wrote to memory of 2732 1676 IMG_501327.exe 32 PID 1676 wrote to memory of 2732 1676 IMG_501327.exe 32 PID 1676 wrote to memory of 2732 1676 IMG_501327.exe 32 PID 1676 wrote to memory of 2732 1676 IMG_501327.exe 32 PID 1676 wrote to memory of 2732 1676 IMG_501327.exe 32 PID 1676 wrote to memory of 2732 1676 IMG_501327.exe 32 PID 1676 wrote to memory of 2732 1676 IMG_501327.exe 32 PID 1676 wrote to memory of 2732 1676 IMG_501327.exe 32 PID 1196 wrote to memory of 2632 1196 Explorer.EXE 33 PID 1196 wrote to memory of 2632 1196 Explorer.EXE 33 PID 1196 wrote to memory of 2632 1196 Explorer.EXE 33 PID 1196 wrote to memory of 2632 1196 Explorer.EXE 33 PID 1196 wrote to memory of 2632 1196 Explorer.EXE 33 PID 1196 wrote to memory of 2632 1196 Explorer.EXE 33 PID 1196 wrote to memory of 2632 1196 Explorer.EXE 33 PID 2632 wrote to memory of 2468 2632 msiexec.exe 34 PID 2632 wrote to memory of 2468 2632 msiexec.exe 34 PID 2632 wrote to memory of 2468 2632 msiexec.exe 34 PID 2632 wrote to memory of 2468 2632 msiexec.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\IMG_501327.exe"C:\Users\Admin\AppData\Local\Temp\IMG_501327.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe"Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Admin\AppData\Local\Temp\IMG_501327.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe'3⤵
- Drops startup file
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\IMG_501327.exe"C:\Users\Admin\AppData\Local\Temp\IMG_501327.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\IMG_501327.exe"3⤵
- Deletes itself
PID:2468
-
-