Analysis
-
max time kernel
147s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 13:04
Static task
static1
Behavioral task
behavioral1
Sample
372fe4529580602a406a6ffad7739581.exe
Resource
win7-20231129-en
General
-
Target
372fe4529580602a406a6ffad7739581.exe
-
Size
673KB
-
MD5
372fe4529580602a406a6ffad7739581
-
SHA1
656104739470b5119ec630eb19603d9677a4fa03
-
SHA256
6fac52318b313ba9642ecb060c7725dbbd3e0b1146e936deb2b635ce7a255a2e
-
SHA512
5e3c4c50c0384a589f483d9b6abfaef3dd805e104dadc7156d8fb901e3aa272c134ff987e7fe7dbdb472e69321c5583bc3049882888806b993a36a1799cff76f
-
SSDEEP
12288:Z7n6jcVXAQfGq1Q/o2sKGUnQKlnZ3Xxs31:F6AVXpqMHUQKVZnc
Malware Config
Extracted
xloader
2.3
mej0
mtxs8.com
quickskiplondon.com
sltplanner.com
generatedate.com
amsinspections.com
tomrings.com
109friends.com
freelovereading.com
avalapartners.com
nordiqueluxury.com
inmbex.com
everybankatm.com
bo1899.com
ashymeadow.com
pubgm-chickendinner.com
takudolunch.com
carlagremiao.com
actonetheatre.com
wemhealth.com
khasomat.net
lartiqueusa.com
singularity.institute
ashsgx567d.com
sequoiaparts.net
ujriksalead.com
ag99.xyz
isabeltimon.com
bijyo-topic.site
homefuels.energy
2ofakinddesigns.com
iggglobal.com
ravenlightproductions.com
magicaltransform.com
2936vaquero.com
essentialme.network
thebrathouse.info
tecstrong.net
ayulaksmi.com
maximebazerque.com
bankdj.com
pizzaoff.com
eastcohemp.com
acordolimpo.com
mediacpstreamchile.com
wholesalefleuerdelis.com
chuangyuanfz.com
getcenteredwithclay.com
retaboo.com
ikonicboatcharters.com
parakhonskiy.com
tropical-therapy.com
metropitstop.com
municipiodeanton.net
valorplanodesaudemaranhao.info
alibabakanaat.com
creditsoptionsnow.com
arabgerman.digital
webspazio.com
sunsyncindia.com
jlsolutionspty.com
almightyamerican.com
nadirshirts.com
gdxinmu.com
postcaremedical.com
lifewithbriana.com
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/3828-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1988 set thread context of 3828 1988 372fe4529580602a406a6ffad7739581.exe 100 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3828 372fe4529580602a406a6ffad7739581.exe 3828 372fe4529580602a406a6ffad7739581.exe 3828 372fe4529580602a406a6ffad7739581.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1988 wrote to memory of 3828 1988 372fe4529580602a406a6ffad7739581.exe 100 PID 1988 wrote to memory of 3828 1988 372fe4529580602a406a6ffad7739581.exe 100 PID 1988 wrote to memory of 3828 1988 372fe4529580602a406a6ffad7739581.exe 100 PID 1988 wrote to memory of 3828 1988 372fe4529580602a406a6ffad7739581.exe 100 PID 1988 wrote to memory of 3828 1988 372fe4529580602a406a6ffad7739581.exe 100 PID 1988 wrote to memory of 3828 1988 372fe4529580602a406a6ffad7739581.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\372fe4529580602a406a6ffad7739581.exe"C:\Users\Admin\AppData\Local\Temp\372fe4529580602a406a6ffad7739581.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\372fe4529580602a406a6ffad7739581.exe"C:\Users\Admin\AppData\Local\Temp\372fe4529580602a406a6ffad7739581.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3828
-