Analysis
-
max time kernel
173s -
max time network
226s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 06:39
Static task
static1
Behavioral task
behavioral1
Sample
0c38fc3c0a2465e3a15e1bac02f6b4bb.exe
Resource
win7-20231215-en
General
-
Target
0c38fc3c0a2465e3a15e1bac02f6b4bb.exe
-
Size
252KB
-
MD5
0c38fc3c0a2465e3a15e1bac02f6b4bb
-
SHA1
8220e570da33641eafcc094ba8824c2624bc92ff
-
SHA256
b84be8911946bbe709de08dcaa4c04efc8640d92889dd5603c8afaad142a79af
-
SHA512
8a339b9f4e36cc04cee2cc4ac1f3f3e1e3124579ef8fb3ba81f68182d89da16ed3247cfc3cf7e22952853d9daa1d486c9ef98c704a4164049a70c5b4bc7291b8
-
SSDEEP
6144:6w1Rg0otCAGOKVUZbz2kp7b+dRD0lV/erzs062suy:v13GzWUZG9D0/UFvy
Malware Config
Extracted
xloader
2.3
pagi
makehrworkable.com
sound-wisdom.com
blacts.com
caenantglamping.com
meridiancpas.com
draughtedinn.co.uk
windywoodshc.com
mintmovileplus.com
pubgeventdailylogin.com
thesocialdzr.com
holapv.com
racevc.com
openpula.pro
wepreventstroke.com
autoclosy.com
enginkarabacak.com
15096eec1652.info
buildthefoundation.net
pwilliamberciklaw.com
paramountrevenueadvisors.com
omaetomoko.com
hastingsranchphysgrp.com
dakotarealestategroup.com
domentemenegi39.net
sightuiop.com
automobiliatint.com
mensfashiontody.com
jonmyquizz.com
avaknew.info
coloradoriverfoodbank.com
thechiemgauers.com
bungalowbankers.com
askmelaptop.com
sadlercc.net
igengchuang.com
maisondesjeunesamos.com
fortehomesrl.com
shmysd.com
topitemsworldwide.xyz
mandyabelljustbelieves.com
sistams.com
sdapkute.com
tickermine.com
thelettermuse.com
jcuiovpoizelrkjlkwcpopoisq.info
bitmaticperu.com
permalinkbusiness.com
axing8898.xyz
fwbzjx.com
pandemicleaders.com
rusmumrik.com
ggfbank.com
lilinvestor.com
rewawealth.com
eugenerentallisting.com
xtremboat.com
apelidos.net
erlebnistage-tomcat.com
critfix.com
canadianhempsociety.com
showqiang.com
arisbasics.com
t1978.com
kocnetelgroup.com
hornti.com
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/1908-3-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1392 set thread context of 1908 1392 0c38fc3c0a2465e3a15e1bac02f6b4bb.exe 90 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1908 0c38fc3c0a2465e3a15e1bac02f6b4bb.exe 1908 0c38fc3c0a2465e3a15e1bac02f6b4bb.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1392 0c38fc3c0a2465e3a15e1bac02f6b4bb.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1392 wrote to memory of 1908 1392 0c38fc3c0a2465e3a15e1bac02f6b4bb.exe 90 PID 1392 wrote to memory of 1908 1392 0c38fc3c0a2465e3a15e1bac02f6b4bb.exe 90 PID 1392 wrote to memory of 1908 1392 0c38fc3c0a2465e3a15e1bac02f6b4bb.exe 90 PID 1392 wrote to memory of 1908 1392 0c38fc3c0a2465e3a15e1bac02f6b4bb.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c38fc3c0a2465e3a15e1bac02f6b4bb.exe"C:\Users\Admin\AppData\Local\Temp\0c38fc3c0a2465e3a15e1bac02f6b4bb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\0c38fc3c0a2465e3a15e1bac02f6b4bb.exe"C:\Users\Admin\AppData\Local\Temp\0c38fc3c0a2465e3a15e1bac02f6b4bb.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1908
-