Analysis
-
max time kernel
114s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 20:13
Static task
static1
Behavioral task
behavioral1
Sample
02b89444a1d633c44e1e9e54e3fdd1b0.exe
Resource
win7-20231215-en
General
-
Target
02b89444a1d633c44e1e9e54e3fdd1b0.exe
-
Size
945KB
-
MD5
02b89444a1d633c44e1e9e54e3fdd1b0
-
SHA1
6d560a1c41457fa9c88d5d218ea4a9ae670fbedd
-
SHA256
52b0438a43977e210e58786f139697a9007854f624d8901c891a9af69b87667f
-
SHA512
1521d912a90f74e46a6428eb4ee6bdf7561ff05260b9243a34e724b9be1424bec2f7c78ea527097a3d75f349e5afa485bc9aeb159d6186e1f621e462eacda5f7
-
SSDEEP
12288:qxDc9F3nC0Py3gAhSEJbjJEK1+E5Gl6twEtG5FhVvjRrry8rXcuzDD8qfv:6J5Gl6HE5FhhjRvy8Zdv
Malware Config
Extracted
xloader
2.3
earz
halacoupon.com
anthos-labs.com
hagertylabs.net
l1992.com
856379580.xyz
rcbb-technologies.com
realhoggapparel.com
sauceprince.com
tootingcab.com
4chase5.com
ordergogibibimbap.com
nyj.xyz
dermixspa.com
premiergiftingco.com
razorcentric.com
mbrealtyadvisors.com
officialjazz.club
cctv006.com
hbcuatthepolls.info
prestamos-ya.com
braara.com
yeetgolf.com
lecotonrose.com
cjmakeupartisttx.com
erdhardt.com
talasaz.com
battisonsemtech.com
kblzs.com
educatemyemployees.com
goodgame1.com
graxdev.com
retirementparner.com
oakdalecasino.com
patsoases.com
thebiodetonators.com
bomachinaconvention.com
bett3r.com
2ug35refd.com
wholesalekingsauto.net
welcomeenlighten.club
woman2watch.com
retireemedical-tagcomet.com
astudentdevelop.com
cryptocaviar.com
tedstone.info
racevc.com
eogrlqf.icu
glamourousglory.com
vfb2020.com
hudsonvalleyproject.com
learningtolive365.com
createspace.sucks
kaojinwolove.com
pureandrich.com
textenvsschreiben.com
devis-danseuse-bresilienne.com
nidape-cfm.com
johnnyfong.com
thehappymoose.com
ldq.cool
capdistribution.pro
khangkhilinh.com
biomonde-dannemarie.com
sterlingrhone.com
furnitureizmir.com
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/4052-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2148 set thread context of 4052 2148 02b89444a1d633c44e1e9e54e3fdd1b0.exe 96 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4052 02b89444a1d633c44e1e9e54e3fdd1b0.exe 4052 02b89444a1d633c44e1e9e54e3fdd1b0.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2148 wrote to memory of 4052 2148 02b89444a1d633c44e1e9e54e3fdd1b0.exe 96 PID 2148 wrote to memory of 4052 2148 02b89444a1d633c44e1e9e54e3fdd1b0.exe 96 PID 2148 wrote to memory of 4052 2148 02b89444a1d633c44e1e9e54e3fdd1b0.exe 96 PID 2148 wrote to memory of 4052 2148 02b89444a1d633c44e1e9e54e3fdd1b0.exe 96 PID 2148 wrote to memory of 4052 2148 02b89444a1d633c44e1e9e54e3fdd1b0.exe 96 PID 2148 wrote to memory of 4052 2148 02b89444a1d633c44e1e9e54e3fdd1b0.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\02b89444a1d633c44e1e9e54e3fdd1b0.exe"C:\Users\Admin\AppData\Local\Temp\02b89444a1d633c44e1e9e54e3fdd1b0.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\02b89444a1d633c44e1e9e54e3fdd1b0.exe"C:\Users\Admin\AppData\Local\Temp\02b89444a1d633c44e1e9e54e3fdd1b0.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4052
-