Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07-01-2024 00:33
Static task
static1
Behavioral task
behavioral1
Sample
4790a6bec0eb9efda12d2abe2bb38d00.exe
Resource
win7-20231215-en
General
-
Target
4790a6bec0eb9efda12d2abe2bb38d00.exe
-
Size
1.3MB
-
MD5
4790a6bec0eb9efda12d2abe2bb38d00
-
SHA1
fee62df00e5888398be1cf7d8abc716afe43d37d
-
SHA256
8b46ffe6f10e29d52a311f2516deb4f54b84ddedf75a3a6921e1423518658e26
-
SHA512
751bc4ca9266183b1e4ca855cac6734b3148a51db845c33d664f6ce49c19091f2b703c756d5b51be6ba98e5774d462b9313ab3e20f1d4efc518260b8bbcc0840
-
SSDEEP
24576:0EUzRj83ukaDcTG7dDkuepQUsjtbbn2YgVuZlZcjOsZ3ON:y83uka7kuOQVRr2RvrO
Malware Config
Extracted
xloader
2.3
n84e
upscalebuyer.com
qtict.net
karlgillard.com
fangsbags.com
blackwhitebangtan.com
lojaautomatica.com
browbabelondon.com
dupladocabelo.com
tcheap3dwdshop.com
htnmg.com
globaltradeview.com
instrumentwinebreathe.net
futurejobstech.com
notemanches.com
myconventionalcooking.xyz
doniang.com
ouruiwh.com
tecnologiatimes.com
yxbmfc.com
mae-baby.com
alsiha2020.com
zenqueue.com
myomlineservicing.com
justin-appel.com
protectallfarms.com
fairwaysxm.com
msec-santander.com
previem.com
legifo.com
reitzforrep.com
oanicoin.com
scorchonerecords.com
hheiy35.com
aurorabradfordoptometrists.com
kailinsen.com
ownerspreinspect.com
instantfames.com
wdi.technology
compareionizers.com
habbuhot.info
thinking-diversity.com
swagmansbreakfast.com
thepegasusclub.com
crazyhorseoutfitters.com
flvrpodcast.com
mz66a.com
vineyardtrailrides.com
khazana-bazaar.com
m-corgroup.com
kidsnbuds.com
whatsprosender.com
lundagers.com
betterhealthdc.com
mehtalawgroup.com
contex33.xyz
fastloanflorida.net
lautaigia.net
792argonne.com
xtravigant.com
anbotechsolution.com
minipockethouse.com
ehubo3y.com
greaterdenver.online
batracomputer.com
conectaragora.com
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2600-13-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1448 set thread context of 2600 1448 4790a6bec0eb9efda12d2abe2bb38d00.exe 29 -
Program crash 1 IoCs
pid pid_target Process 2728 2600 WerFault.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1448 wrote to memory of 2600 1448 4790a6bec0eb9efda12d2abe2bb38d00.exe 29 PID 1448 wrote to memory of 2600 1448 4790a6bec0eb9efda12d2abe2bb38d00.exe 29 PID 1448 wrote to memory of 2600 1448 4790a6bec0eb9efda12d2abe2bb38d00.exe 29 PID 1448 wrote to memory of 2600 1448 4790a6bec0eb9efda12d2abe2bb38d00.exe 29 PID 1448 wrote to memory of 2600 1448 4790a6bec0eb9efda12d2abe2bb38d00.exe 29 PID 1448 wrote to memory of 2600 1448 4790a6bec0eb9efda12d2abe2bb38d00.exe 29 PID 1448 wrote to memory of 2600 1448 4790a6bec0eb9efda12d2abe2bb38d00.exe 29 PID 2600 wrote to memory of 2728 2600 4790a6bec0eb9efda12d2abe2bb38d00.exe 28 PID 2600 wrote to memory of 2728 2600 4790a6bec0eb9efda12d2abe2bb38d00.exe 28 PID 2600 wrote to memory of 2728 2600 4790a6bec0eb9efda12d2abe2bb38d00.exe 28 PID 2600 wrote to memory of 2728 2600 4790a6bec0eb9efda12d2abe2bb38d00.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4790a6bec0eb9efda12d2abe2bb38d00.exe"C:\Users\Admin\AppData\Local\Temp\4790a6bec0eb9efda12d2abe2bb38d00.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\4790a6bec0eb9efda12d2abe2bb38d00.exe"C:\Users\Admin\AppData\Local\Temp\4790a6bec0eb9efda12d2abe2bb38d00.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 361⤵
- Program crash
PID:2728