Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 07:19
Static task
static1
Behavioral task
behavioral1
Sample
11f3b98b2126362766db354da379662e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
11f3b98b2126362766db354da379662e.exe
Resource
win10v2004-20231215-en
General
-
Target
11f3b98b2126362766db354da379662e.exe
-
Size
231KB
-
MD5
11f3b98b2126362766db354da379662e
-
SHA1
54da8ed5af07efed41e1faf4a870242dbf48c4f8
-
SHA256
dcfe7b2bec62bcc80e54c023bddc64a865538e113b39102f116d84b9019963a4
-
SHA512
2fe8dfd6965067fb660042e652718b7de27b902ca5fd7edfbba20326420e9a2a7c8ace4202ec00161c70351795fbe32b96807327bdee9c3d0e86d10616553ffb
-
SSDEEP
6144:TAdKgsvy9iF8IAgzWVpRv45rcWYvpw64QbdzUAbsgrE6tB6:eKbvSGzWjBNv264QbdzZbsgrE6tB6
Malware Config
Extracted
xloader
2.3
u8aa
quantexchanges.com
hizliarac.com
dropsdementanovohamburgo.com
tcinsurancegroup.net
byobvendors.com
arteasba.com
azrealtorsmastermind.com
voiceof5aabtv.com
zoom-bloopers.com
jxsenmei.com
interia-poczta.email
coolgiftbaskets.net
magetu.info
weedliberal.com
drsergiocastilloangiologo.com
starinsiderau.com
weightneutralmetflex.com
youxiandian.com
liberation.media
ferrari-news.com
holger3d.com
usisfirst1.com
n2yta.com
dreamsonfile.com
ctsquiroz.net
swastikbrass.com
decentfinance.net
fredricksburgcityschool.com
thetiffanyhiggins.com
emmadaniels.com
fiercebodystudios.com
ehealthkorea.com
molecular-nutritionist.com
leobomb.com
bellsecuritygroup.com
trueeclipse.com
aaviera.com
divebarmn.com
vipwellnessandnutrition.com
salepants.club
homthumb.com
suthabuilders.com
sskbrothers.com
vickysviews.com
100classicgames.com
mygadgetsolution.com
greenhawke.com
beehomeco.com
ishsy.com
morikomasuyo.art
nigeriawomenawards.com
xn--n7qp7x312b.com
cananyonehearme.com
list-logistik.com
ciicgroupinc.com
netyatra.com
exclusivecasinooffer.com
muyue7.com
organikfuzion-sd.com
kamilogy.com
pinnacleresilience.com
jstzjckj.com
rosannebelanger.com
coreburncycle.com
cryptodeposit.info
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2296-1-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2672 set thread context of 2296 2672 11f3b98b2126362766db354da379662e.exe 15 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2296 11f3b98b2126362766db354da379662e.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2672 11f3b98b2126362766db354da379662e.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2296 2672 11f3b98b2126362766db354da379662e.exe 15 PID 2672 wrote to memory of 2296 2672 11f3b98b2126362766db354da379662e.exe 15 PID 2672 wrote to memory of 2296 2672 11f3b98b2126362766db354da379662e.exe 15 PID 2672 wrote to memory of 2296 2672 11f3b98b2126362766db354da379662e.exe 15 PID 2672 wrote to memory of 2296 2672 11f3b98b2126362766db354da379662e.exe 15
Processes
-
C:\Users\Admin\AppData\Local\Temp\11f3b98b2126362766db354da379662e.exe"C:\Users\Admin\AppData\Local\Temp\11f3b98b2126362766db354da379662e.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
PID:2296
-
C:\Users\Admin\AppData\Local\Temp\11f3b98b2126362766db354da379662e.exe"C:\Users\Admin\AppData\Local\Temp\11f3b98b2126362766db354da379662e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2672