Analysis
-
max time kernel
121s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 14:30
Static task
static1
Behavioral task
behavioral1
Sample
c4033910eaa4944d2c84b15fb964cda9.exe
Resource
win7-20231215-en
General
-
Target
c4033910eaa4944d2c84b15fb964cda9.exe
-
Size
474KB
-
MD5
c4033910eaa4944d2c84b15fb964cda9
-
SHA1
638909d6c893b58b57e3ce61eaa650628dd42b08
-
SHA256
d8bbf0c15a39bb1dd36c71177d2e8c5a05b0531bd91c03800b8503dc23f662c7
-
SHA512
2dd0d33d5385af8f247a308b7adf71144881a34bed6177748b1b101c61fe39ccc63425f8a2efb4beeef28baf55f9e2752240ab24265728de082f5c16a9b7e8a0
-
SSDEEP
12288:naYamkM7gHD3KTfv7w0YGwiYPlyGmEdtI:aYl/7Ea/D
Malware Config
Extracted
xloader
2.3
cpa3
hkp.xyz
marcinkwiatkowski.com
celebrityobserver.com
thelotsgroup.com
actusforums.com
cityparcelservice.com
apprig.com
naughtianalove.com
lesitedelanimation.com
taxes1234.com
citieyuan.com
kokonarafile.com
morenatives.com
iredreview.com
oddlywelladjusted.com
wpj.xyz
gofairlane.com
galtoubul.com
custompickem.com
partsandersenstormdoor.com
e-smartlearning.com
belgiummodeling.com
sistemahorpend.com
rivereastsundayfunday.com
sleepessentialoil.com
novacred.online
romunro.club
stocksflip.com
chongqingduteng.com
vivid2020.com
akinaidou.com
digitalerp.net
createwiz.com
brunswickpecanfestival.com
adamperfectroom.com
katsoutdoorsports.com
happy-spineco.com
yqynov.com
thecowleyconsultancy.com
diamondskincareshop.com
hysproperu.com
chartyvillag.com
whatkindofsushi.com
actihire.com
mimik33.com
eussc.net
topratedsellers.net
hongfad.com
inhealthvip.com
takechargeyourcareer.com
blackcatstudio.cool
gokitt-e.com
zalepekaska.xyz
moneytip.xyz
salesoversea.com
bruxfinance.com
iiiicu.com
aceitesmuyesenciales.com
qjz.xyz
kombrewme.com
v2ray.zone
luxurylectro.com
jysslj.com
panoramaits.com
cashflowtoday.net
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2452-17-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2840 set thread context of 2452 2840 c4033910eaa4944d2c84b15fb964cda9.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2984 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2452 c4033910eaa4944d2c84b15fb964cda9.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2840 wrote to memory of 2984 2840 c4033910eaa4944d2c84b15fb964cda9.exe 29 PID 2840 wrote to memory of 2984 2840 c4033910eaa4944d2c84b15fb964cda9.exe 29 PID 2840 wrote to memory of 2984 2840 c4033910eaa4944d2c84b15fb964cda9.exe 29 PID 2840 wrote to memory of 2984 2840 c4033910eaa4944d2c84b15fb964cda9.exe 29 PID 2840 wrote to memory of 2452 2840 c4033910eaa4944d2c84b15fb964cda9.exe 31 PID 2840 wrote to memory of 2452 2840 c4033910eaa4944d2c84b15fb964cda9.exe 31 PID 2840 wrote to memory of 2452 2840 c4033910eaa4944d2c84b15fb964cda9.exe 31 PID 2840 wrote to memory of 2452 2840 c4033910eaa4944d2c84b15fb964cda9.exe 31 PID 2840 wrote to memory of 2452 2840 c4033910eaa4944d2c84b15fb964cda9.exe 31 PID 2840 wrote to memory of 2452 2840 c4033910eaa4944d2c84b15fb964cda9.exe 31 PID 2840 wrote to memory of 2452 2840 c4033910eaa4944d2c84b15fb964cda9.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4033910eaa4944d2c84b15fb964cda9.exe"C:\Users\Admin\AppData\Local\Temp\c4033910eaa4944d2c84b15fb964cda9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\DRLdmehSEx" /XML "C:\Users\Admin\AppData\Local\Temp\tmp28C5.tmp"2⤵
- Creates scheduled task(s)
PID:2984
-
-
C:\Users\Admin\AppData\Local\Temp\c4033910eaa4944d2c84b15fb964cda9.exe"C:\Users\Admin\AppData\Local\Temp\c4033910eaa4944d2c84b15fb964cda9.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2452
-