Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 20:52
Static task
static1
Behavioral task
behavioral1
Sample
3ddba9dd096fe52fcd90d41478bfcba5.exe
Resource
win7-20231215-en
General
-
Target
3ddba9dd096fe52fcd90d41478bfcba5.exe
-
Size
677KB
-
MD5
3ddba9dd096fe52fcd90d41478bfcba5
-
SHA1
43c708bca3d1bb944adc81b3b7a1f7b2fb80c4f6
-
SHA256
435b924af18dce67e3fbc2b55fc515b839fe883da2e10fd3c8c21859a1181d64
-
SHA512
5c7e6ce588c3236370b88a385733301161b3ed5869e4cfbde5b7d6b04a1c3b1f4ae4ae5c268dde2923bc4c091f70edd19cf14cf4995de19f19c27cbc6e064feb
-
SSDEEP
12288:PLI/HK7zE857ioHjT4d1MIi7vKgwl6m/Zcl2APRq6to0D2TPgRqIq:zb7ioHjT44j7vPmhwn9X2T+
Malware Config
Extracted
xloader
2.3
ssee
portalcanaa.com
korzino.com
dlylms.net
smartearphoneshop.com
olimiloshop.com
auvdigitalstack.com
ydxc.chat
yhk868.com
lifeinthedport.com
self-sciencelabs.com
scandicpack.com
hold-sometimes.xyz
beiputei.com
yourrealtorcoach.com
rxods.com
fundsoption.com
ahlstromclothes.com
ksdieselparts.com
accountmangerford.com
kuwaitlogistic.com
xuanthanhpham.com
uybike.com
babyacademycy.com
zhongbuwujin.com
reclaimminnesota.net
yurunhuatian.com
eigowith.com
pharmviewfarms.com
mcmillan-phillips.com
xinkseo.com
dabaichuihl.com
modifiedmkt.com
magnificocreative.com
energytrainingireland.com
special-beauty.net
solutionexperts.xyz
upstaff.info
taravelis.online
lushthingz.com
harwestco.com
126034cp.com
lamdep-gluwhitevn.website
megenep.com
upperreceiver.com
healthywayservices.com
groupebpcenatixis.com
blackledorganizations.net
carolinasoares.com
bureaultd.com
smartcontractlegalfirm.com
perfecshipping.com
aktarbaba.com
bulukx.com
wazolerino.info
account.farm
skstchers.com
perwiranusa.com
ourtown.directory
cuidomiforma.com
thecodestage.com
0898htt.com
yamalo.club
hdzj365.xyz
canaldotenis.com
idt-metrofireandsecurity.com
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2808-14-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2236 set thread context of 2808 2236 3ddba9dd096fe52fcd90d41478bfcba5.exe 31 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2236 3ddba9dd096fe52fcd90d41478bfcba5.exe 2808 3ddba9dd096fe52fcd90d41478bfcba5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2236 3ddba9dd096fe52fcd90d41478bfcba5.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2220 2236 3ddba9dd096fe52fcd90d41478bfcba5.exe 30 PID 2236 wrote to memory of 2220 2236 3ddba9dd096fe52fcd90d41478bfcba5.exe 30 PID 2236 wrote to memory of 2220 2236 3ddba9dd096fe52fcd90d41478bfcba5.exe 30 PID 2236 wrote to memory of 2220 2236 3ddba9dd096fe52fcd90d41478bfcba5.exe 30 PID 2236 wrote to memory of 2808 2236 3ddba9dd096fe52fcd90d41478bfcba5.exe 31 PID 2236 wrote to memory of 2808 2236 3ddba9dd096fe52fcd90d41478bfcba5.exe 31 PID 2236 wrote to memory of 2808 2236 3ddba9dd096fe52fcd90d41478bfcba5.exe 31 PID 2236 wrote to memory of 2808 2236 3ddba9dd096fe52fcd90d41478bfcba5.exe 31 PID 2236 wrote to memory of 2808 2236 3ddba9dd096fe52fcd90d41478bfcba5.exe 31 PID 2236 wrote to memory of 2808 2236 3ddba9dd096fe52fcd90d41478bfcba5.exe 31 PID 2236 wrote to memory of 2808 2236 3ddba9dd096fe52fcd90d41478bfcba5.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ddba9dd096fe52fcd90d41478bfcba5.exe"C:\Users\Admin\AppData\Local\Temp\3ddba9dd096fe52fcd90d41478bfcba5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\3ddba9dd096fe52fcd90d41478bfcba5.exe"C:\Users\Admin\AppData\Local\Temp\3ddba9dd096fe52fcd90d41478bfcba5.exe"2⤵PID:2220
-
-
C:\Users\Admin\AppData\Local\Temp\3ddba9dd096fe52fcd90d41478bfcba5.exe"C:\Users\Admin\AppData\Local\Temp\3ddba9dd096fe52fcd90d41478bfcba5.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2808
-