Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 08:03
Static task
static1
Behavioral task
behavioral1
Sample
243d713a5124eb1bb3b1ee2e70c7a404d531da84c68bbfa5a838b092a1058a7a.exe
Resource
win7-20240221-en
General
-
Target
243d713a5124eb1bb3b1ee2e70c7a404d531da84c68bbfa5a838b092a1058a7a.exe
-
Size
1.1MB
-
MD5
f9bc884d392b1cf3476d36733d443bea
-
SHA1
0355cac4a25abc48cc625b2da9187e7f0d1e5574
-
SHA256
243d713a5124eb1bb3b1ee2e70c7a404d531da84c68bbfa5a838b092a1058a7a
-
SHA512
b59affcf56c37f8837ffe1009eda97ae871bed924c83526ddf139dc6ddce304f56ebc4df4dee2d01dfc09147eff1c8cef5692ce331e5ba49349e4fb9e9edaf48
-
SSDEEP
24576:JYXKi8Tg5e4Nkva4tZxXw4icnnmPHZYD5F3Kd8:JYXKi8Tee64tp7mhYj3Ke
Malware Config
Extracted
xloader
2.3
usur
purpopup.com
mrswarrenspodcast.com
blinbins.com
parahomeoffice.com
20next.com
quiala.com
newccosecurity.net
throughthehagstone.com
hnxslawfirm.com
sztoium.icu
fullembodiedwoman.com
sankara-yoga.com
foottrafficcollective.com
acruxvacations.com
jadeena.com
neurotypicalspouse.com
onlyinwallkill.com
laurenkilbane.com
thebendavonte.com
regencydevelopmentstoronto.com
txkjsf.com
plasticmouldtools.com
trumphatersfortrump.com
nflkidz.com
reversemortgageloansmiami.com
thestockforums.com
hairessentialtips.com
rockwoodregent.com
flymonsters.com
harmonizedoffices.net
legacythemusic.com
dogsplaypalace.com
thescentedlifeco.com
alqzd.life
pandemiccraftee.com
tapoutclan.com
uoulogarinknowa.com
exploregodchurch.com
greenlinebg.com
lancheraiz.com
easonmarketingllc.com
titlecollective.net
wwwssphealth.com
towardsqa.com
sumarealcon.com
y-signs.com
wonderland.one
massapequapublicschools.com
costadelmarmexicangrill.com
frogtarget.net
lowendtherapy.com
empservicesfl.com
sumbadriftresort.com
martijnvanderlinden.media
ponexmedia.com
steezx.com
designmaveriuk.com
oumeijs.com
thechroniclesanonymous.com
tigasaki.com
meteormates.com
renoaleworx.com
familie-repenning.com
assept.com
etnttcil.com
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2440-14-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1712 set thread context of 2440 1712 243d713a5124eb1bb3b1ee2e70c7a404d531da84c68bbfa5a838b092a1058a7a.exe 30 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2440 243d713a5124eb1bb3b1ee2e70c7a404d531da84c68bbfa5a838b092a1058a7a.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2440 1712 243d713a5124eb1bb3b1ee2e70c7a404d531da84c68bbfa5a838b092a1058a7a.exe 30 PID 1712 wrote to memory of 2440 1712 243d713a5124eb1bb3b1ee2e70c7a404d531da84c68bbfa5a838b092a1058a7a.exe 30 PID 1712 wrote to memory of 2440 1712 243d713a5124eb1bb3b1ee2e70c7a404d531da84c68bbfa5a838b092a1058a7a.exe 30 PID 1712 wrote to memory of 2440 1712 243d713a5124eb1bb3b1ee2e70c7a404d531da84c68bbfa5a838b092a1058a7a.exe 30 PID 1712 wrote to memory of 2440 1712 243d713a5124eb1bb3b1ee2e70c7a404d531da84c68bbfa5a838b092a1058a7a.exe 30 PID 1712 wrote to memory of 2440 1712 243d713a5124eb1bb3b1ee2e70c7a404d531da84c68bbfa5a838b092a1058a7a.exe 30 PID 1712 wrote to memory of 2440 1712 243d713a5124eb1bb3b1ee2e70c7a404d531da84c68bbfa5a838b092a1058a7a.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\243d713a5124eb1bb3b1ee2e70c7a404d531da84c68bbfa5a838b092a1058a7a.exe"C:\Users\Admin\AppData\Local\Temp\243d713a5124eb1bb3b1ee2e70c7a404d531da84c68bbfa5a838b092a1058a7a.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\243d713a5124eb1bb3b1ee2e70c7a404d531da84c68bbfa5a838b092a1058a7a.exe"C:\Users\Admin\AppData\Local\Temp\243d713a5124eb1bb3b1ee2e70c7a404d531da84c68bbfa5a838b092a1058a7a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2440
-