Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 06:30
Static task
static1
Behavioral task
behavioral1
Sample
111d2be6108ec665c15caae8b6964387.exe
Resource
win7-20231215-en
General
-
Target
111d2be6108ec665c15caae8b6964387.exe
-
Size
1.3MB
-
MD5
111d2be6108ec665c15caae8b6964387
-
SHA1
04228ee5fb9fbe16b3a6406f64a067c15d549faa
-
SHA256
69a08fcc2b3eb5499a9356a801bb646d7726dc158cba7f141335997f374ead38
-
SHA512
2fcf5640c8fc5d08ed6737caab9fe8f359671f272b1a0992c360887e6166597b9cfd7c5efe7b5e2c418b0e9dd0392e54ea4bfe1b7aa62437cc509869f49c2a94
-
SSDEEP
24576:oKIUradyDYzq7qbJvrd3nKivWV/Nm/y12Nhmk+p:nIqadyM27qbFrZJdyYw
Malware Config
Extracted
xloader
2.3
ssee
portalcanaa.com
korzino.com
dlylms.net
smartearphoneshop.com
olimiloshop.com
auvdigitalstack.com
ydxc.chat
yhk868.com
lifeinthedport.com
self-sciencelabs.com
scandicpack.com
hold-sometimes.xyz
beiputei.com
yourrealtorcoach.com
rxods.com
fundsoption.com
ahlstromclothes.com
ksdieselparts.com
accountmangerford.com
kuwaitlogistic.com
xuanthanhpham.com
uybike.com
babyacademycy.com
zhongbuwujin.com
reclaimminnesota.net
yurunhuatian.com
eigowith.com
pharmviewfarms.com
mcmillan-phillips.com
xinkseo.com
dabaichuihl.com
modifiedmkt.com
magnificocreative.com
energytrainingireland.com
special-beauty.net
solutionexperts.xyz
upstaff.info
taravelis.online
lushthingz.com
harwestco.com
126034cp.com
lamdep-gluwhitevn.website
megenep.com
upperreceiver.com
healthywayservices.com
groupebpcenatixis.com
blackledorganizations.net
carolinasoares.com
bureaultd.com
smartcontractlegalfirm.com
perfecshipping.com
aktarbaba.com
bulukx.com
wazolerino.info
account.farm
skstchers.com
perwiranusa.com
ourtown.directory
cuidomiforma.com
thecodestage.com
0898htt.com
yamalo.club
hdzj365.xyz
canaldotenis.com
idt-metrofireandsecurity.com
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2012-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2912 set thread context of 2012 2912 111d2be6108ec665c15caae8b6964387.exe 30 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2012 111d2be6108ec665c15caae8b6964387.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2912 wrote to memory of 2012 2912 111d2be6108ec665c15caae8b6964387.exe 30 PID 2912 wrote to memory of 2012 2912 111d2be6108ec665c15caae8b6964387.exe 30 PID 2912 wrote to memory of 2012 2912 111d2be6108ec665c15caae8b6964387.exe 30 PID 2912 wrote to memory of 2012 2912 111d2be6108ec665c15caae8b6964387.exe 30 PID 2912 wrote to memory of 2012 2912 111d2be6108ec665c15caae8b6964387.exe 30 PID 2912 wrote to memory of 2012 2912 111d2be6108ec665c15caae8b6964387.exe 30 PID 2912 wrote to memory of 2012 2912 111d2be6108ec665c15caae8b6964387.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\111d2be6108ec665c15caae8b6964387.exe"C:\Users\Admin\AppData\Local\Temp\111d2be6108ec665c15caae8b6964387.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\111d2be6108ec665c15caae8b6964387.exe"C:\Users\Admin\AppData\Local\Temp\111d2be6108ec665c15caae8b6964387.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2012
-