Analysis
-
max time kernel
100s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
13/01/2024, 12:46
Static task
static1
Behavioral task
behavioral1
Sample
58f2fc9e3b1e045d4f6040e0b15e7b3d.exe
Resource
win7-20231215-en
General
-
Target
58f2fc9e3b1e045d4f6040e0b15e7b3d.exe
-
Size
1.3MB
-
MD5
58f2fc9e3b1e045d4f6040e0b15e7b3d
-
SHA1
3fd996467fc1b057e9f0fe436dd7f46cf460e688
-
SHA256
5d73a302ff09dd9d39420703dc50c9530ac6e78b55c762f9c03df76be39d6c2c
-
SHA512
a4d0627fedf36e64aca0dd5154189d0fd280f212adc8e700c3e01ce6a4fe818454b7f3afe79ae37d45b990573be9eaf8d9d3ef58aed2cb19f27d66c64c94d044
-
SSDEEP
24576:l7rkW5oaXpcB7mVSaccPuvcd5OGQT/1/0nS+7n4SYwqK4zf3RTsAHWAgqChJ+huE:lbiecHHgtrszyaNQuiNB/e
Malware Config
Extracted
xloader
2.3
p596
ushistorical.com
lovepropertylondon.com
acupress-the-point.com
3772548.com
ambientabuse.com
primaveracm.com
themidwestmomblog.com
havasavunma.com
rockyroadbrand.com
zzphys.com
masque-inclusif.com
myeonyeokplus.com
linkernet.pro
zezirma.com
mysiniar.com
andreamall.com
mattesonauto.com
wandopowerinc.com
casaurgence.com
salishseaquilts.com
yourchanceisnow.com
tumulusresearch.com
blendandspend.com
pevention.com
cloudrevolutionawards.com
beadedbodied.com
marylandpaymentrelief.net
5935699.com
silverleafcompanies.com
slxxxhub.com
combatstriking.com
sex-shop.life
cuncunkan.com
italiamo-magagine.com
sfvoterguide.com
2012boulevard.com
mslookbook.com
897tj1.net
cgslnc.net
kashyaptalkz.com
researchcse.com
lunzhu168.com
mlfkt.com
customcardstudio.com
kirklandramblerforsale.com
magetu.info
wptheme247.com
purposedenver.com
journaldelaphotographie.com
yieldwadi.site
mobilefriendlysites.com
ocularjournal.com
consigli.energy
infintylights.com
itcohempproject.com
montcairo.net
allegrohascockroaches.com
flexbandofficial.com
greatindiapropertyshow.com
kabin-fever.com
designsoc.com
javlao.com
controltower.services
masihsarap.com
lapashawhite.com
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2976-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2752 set thread context of 2976 2752 58f2fc9e3b1e045d4f6040e0b15e7b3d.exe 29 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2752 58f2fc9e3b1e045d4f6040e0b15e7b3d.exe 2976 58f2fc9e3b1e045d4f6040e0b15e7b3d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2752 58f2fc9e3b1e045d4f6040e0b15e7b3d.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2752 wrote to memory of 2976 2752 58f2fc9e3b1e045d4f6040e0b15e7b3d.exe 29 PID 2752 wrote to memory of 2976 2752 58f2fc9e3b1e045d4f6040e0b15e7b3d.exe 29 PID 2752 wrote to memory of 2976 2752 58f2fc9e3b1e045d4f6040e0b15e7b3d.exe 29 PID 2752 wrote to memory of 2976 2752 58f2fc9e3b1e045d4f6040e0b15e7b3d.exe 29 PID 2752 wrote to memory of 2976 2752 58f2fc9e3b1e045d4f6040e0b15e7b3d.exe 29 PID 2752 wrote to memory of 2976 2752 58f2fc9e3b1e045d4f6040e0b15e7b3d.exe 29 PID 2752 wrote to memory of 2976 2752 58f2fc9e3b1e045d4f6040e0b15e7b3d.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\58f2fc9e3b1e045d4f6040e0b15e7b3d.exe"C:\Users\Admin\AppData\Local\Temp\58f2fc9e3b1e045d4f6040e0b15e7b3d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\58f2fc9e3b1e045d4f6040e0b15e7b3d.exe"C:\Users\Admin\AppData\Local\Temp\58f2fc9e3b1e045d4f6040e0b15e7b3d.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2976
-