Analysis
-
max time kernel
121s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 12:50
Static task
static1
Behavioral task
behavioral1
Sample
190bbbb3ef3a08fc73a9d397f87de2ec.exe
Resource
win7-20231215-en
General
-
Target
190bbbb3ef3a08fc73a9d397f87de2ec.exe
-
Size
1.5MB
-
MD5
190bbbb3ef3a08fc73a9d397f87de2ec
-
SHA1
c81ffe08d0c6b7859d5c668fc8a756c8acb0b451
-
SHA256
6ce6f6c16310e90a3d624750f1d7146aa4d2e8baa04d409133869199d4a5d23a
-
SHA512
c379b287d4464bd1de5573500733429ea2cb40c45a67a56d90124660961199a4aa00f74dbdf45cab02ca67ce778787ad7b9fe993d59501c5dc869610a82a2f33
-
SSDEEP
12288:v+q3bFCO9bHBa3AWZavABd0YItKOxZsSbWQdOm//8xLrQ6H+Uy1Susr8MmH3j5:R19bHBiHj6cOxvbWQd9/EFMZZS5R0
Malware Config
Extracted
xloader
2.3
m7gs
goodxxxhigh.com
blun33.com
mcbt328.com
sxtdba.com
sagalocal.icu
spentonindustries.com
greatexpectationssouthshore.com
herzenco.com
duoxizhe.com
h-mawari.net
jeevicain.com
sculpted-vegan.net
vipchainwallet.com
smartanalytics.info
jiujirat.com
canhoquan8-centralpremium.com
pasarandir.com
mario17331.com
dillonsavage.com
ladiesboxx.com
theskinnytype.com
nucanmaple.com
studiotaimdesign.com
slideclubpolo.com
letsmovevietnam.com
nguoivosu.com
jesus-couture.com
xawtjd.com
admin-pethnampong.com
gcpwi.com
t-storms1.com
unesalleobscure.com
laura-claim.com
epc-scot.com
aqhuayuan.com
incredihomes.com
grptradinggold.com
kalotemo.com
sieuphamnaga.club
alabaj.info
butwhatdidyoulearn.com
madhurbazar.website
mrgreenwayhome.com
nowprepared.net
stealthshop.net
pinktoiletpaper.com
campershop-ec.com
greatnwrates.info
816savillerowterrace.com
bebonzer.com
centrdina.com
surveyfind4.club
doicard365.com
fitfromhomestore.com
festivalsofkerala.com
businessbison.com
ismailonline.com
coastebikes.com
jacobhirata.com
mordernhealth.com
xn--80ailshehb3a.xn--p1acf
homcraftz.com
votegoat.vote
radiobenditaesperanza.net
irelandmotorsports.co.uk
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2612-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2536 set thread context of 2612 2536 190bbbb3ef3a08fc73a9d397f87de2ec.exe 30 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2612 190bbbb3ef3a08fc73a9d397f87de2ec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2612 2536 190bbbb3ef3a08fc73a9d397f87de2ec.exe 30 PID 2536 wrote to memory of 2612 2536 190bbbb3ef3a08fc73a9d397f87de2ec.exe 30 PID 2536 wrote to memory of 2612 2536 190bbbb3ef3a08fc73a9d397f87de2ec.exe 30 PID 2536 wrote to memory of 2612 2536 190bbbb3ef3a08fc73a9d397f87de2ec.exe 30 PID 2536 wrote to memory of 2612 2536 190bbbb3ef3a08fc73a9d397f87de2ec.exe 30 PID 2536 wrote to memory of 2612 2536 190bbbb3ef3a08fc73a9d397f87de2ec.exe 30 PID 2536 wrote to memory of 2612 2536 190bbbb3ef3a08fc73a9d397f87de2ec.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\190bbbb3ef3a08fc73a9d397f87de2ec.exe"C:\Users\Admin\AppData\Local\Temp\190bbbb3ef3a08fc73a9d397f87de2ec.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\190bbbb3ef3a08fc73a9d397f87de2ec.exe"C:\Users\Admin\AppData\Local\Temp\190bbbb3ef3a08fc73a9d397f87de2ec.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2612
-