Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
02/02/2024, 13:09
Static task
static1
Behavioral task
behavioral1
Sample
89988ac505f3a7eedd5a842d23683f10.exe
Resource
win7-20231215-en
General
-
Target
89988ac505f3a7eedd5a842d23683f10.exe
-
Size
921KB
-
MD5
89988ac505f3a7eedd5a842d23683f10
-
SHA1
087322adf2ee38e7b50bdc0b0a3c92d6657e5ab4
-
SHA256
f515599d9ab7045656d0976c3aa5740feab68f862fa2e339379a1118f8ccba4a
-
SHA512
03f97c8fe7240f0b89013ed8fe77cefad7ac61d70f9e07981986d96663b4dc90530485c204fe5d9e0e481bb49f4b7301fb3874f57aec17f66afe011b9adea514
-
SSDEEP
12288:FextSIBGwdaXS2IaG+Xn+yaH8yNwQu8mLusqsw+4aDHC/pnyGfoB8ZqiCNu:Ext7BTd/aTyHteusqswA9sw8iU
Malware Config
Extracted
xloader
2.3
ftgq
naturalbeautyapparel.com
abtotalsolution.com
periclescapitalmanagement.com
pleasejustdont.com
ryanscode.com
carsandscooters.com
best-polarized-sunglasses.com
hoodshawaii.com
titaefred.com
tomrings.com
swededenoting.host
birthdaytease.com
xaydzn.com
scutganxun.com
gdzhongle.com
alossol.com
shivamshield.com
fashionnailsjohnston.com
jobuelas.com
arvopaert.com
leabsayang.com
lakeviewfashions.com
tekisltd.com
akeromeganutra.com
countdown-yourspecialday.info
altshiftdel.com
xn--80apahn7a.space
travisisyourrealtor.com
zerelle.com
mdmppropertydetroit.com
lilijwood.com
takansampai.com
caibiriji.com
theruthyfoundation.com
lacasitadeeithne.com
markashleycollins.com
illuvoice.com
227592.com
omehaspancakemix.com
darkmad.net
buttonsandchary.com
balkanesport.com
hapax23.com
enniscarter.com
churchdogma.com
katharinarabl.net
pcbboattours.com
gloriousbdreseller.com
dreambuildarchitect.com
4114global.com
probabilisticstatements.info
quliao999.com
ahmed-mohammed.online
caribbeannorthcoast.com
tequilamidnight.com
2-sny68-w2mz.net
teknokablo.com
ozarktek.com
youreternalseen.com
sarahdutra.com
streamcommunitty.com
tweepstats.com
paulautoservices.com
lahamburguesadetuvida.com
mambomakaya.com
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2792-3-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2168 set thread context of 2792 2168 89988ac505f3a7eedd5a842d23683f10.exe 23 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2792 89988ac505f3a7eedd5a842d23683f10.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2168 89988ac505f3a7eedd5a842d23683f10.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2792 2168 89988ac505f3a7eedd5a842d23683f10.exe 23 PID 2168 wrote to memory of 2792 2168 89988ac505f3a7eedd5a842d23683f10.exe 23 PID 2168 wrote to memory of 2792 2168 89988ac505f3a7eedd5a842d23683f10.exe 23 PID 2168 wrote to memory of 2792 2168 89988ac505f3a7eedd5a842d23683f10.exe 23 PID 2168 wrote to memory of 2792 2168 89988ac505f3a7eedd5a842d23683f10.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\89988ac505f3a7eedd5a842d23683f10.exe"C:\Users\Admin\AppData\Local\Temp\89988ac505f3a7eedd5a842d23683f10.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\89988ac505f3a7eedd5a842d23683f10.exe"C:\Users\Admin\AppData\Local\Temp\89988ac505f3a7eedd5a842d23683f10.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2792
-