Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 07:23
Static task
static1
Behavioral task
behavioral1
Sample
CTM_50,000.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
CTM_50,000.exe
Resource
win10v2004-20240412-en
General
-
Target
CTM_50,000.exe
-
Size
324KB
-
MD5
0745a91ca11c4c208560564ec24451d7
-
SHA1
cd7d14c1b17841b118e4e1f1fc473612654f2f31
-
SHA256
4796e12d5a33b3b717b0ddc65286b9de7479e86bc91cc0bdb843722a5b62951b
-
SHA512
dfcf69496dd86e8e5d379c530899536a7a64c0ed5b4c05bac8282fee655541ea4d69df80e9d41026d260118825e8e0cbb64e8f8d2fbf0d1e0f868edfe72a5466
-
SSDEEP
6144:oBrf0xh3Hfr5YwuLpVtE/qpDVl2HwW429mdix4KRYLCeA8ntOOrdT0y:+rf0P3HD5YQ/qp5UHwWmix4TLCQXrd7
Malware Config
Extracted
xloader
2.3
eca0
azappz.com
ruptiti.com
gewinntaservices.com
skip1-dndasasd.com
frithwtych.com
modularinmobiliaria.com
conwhot.club
drsarahcoxon.com
aplaycasinovhod.com
schaunmonksadv.com
rpm856.com
xn--vhq1km0kx70a.com
motheryer.com
coasttocoastballers.net
imitationdesign.com
newnoname.com
asiyim.com
orient-indonesia.com
rushmoremd.com
tridentking.co.uk
sup3ro.com
gonnabeaguzman.com
aimneo.com
cipdlac2020.com
mtmexclusive.com
wizarduel.com
sejam.press
josigun.club
ahtymy.com
quintadefaraz.com
rainbowcloudpaperco.com
tjzhtz.net
buyspygear.com
myusabilityscore.com
adkacresestates.com
limoreloves.com
cytsnnn.com
solisdq.info
fluyee.com
surfseltzer.com
qatarorigin.com
hitechnolog.com
ilovesandton.com
sxtdba.com
cycladesluxuryvillas.com
abundance-drive.com
lintasdimensimedia.com
therealstudentlife.com
theseaglasscafe.com
rooms-id.email
messefrankfurt.events
practti.com
xgllzx.com
pizzamangione.com
junaidpathan.com
beerdigungenindeu.com
nyctophilia.net
sagroupo.com
prisonbreaknetflix.com
newelectrictoothbrush.com
aleesmarble.com
oroshi-ichiba.com
thefractalsociety.com
kasmr.com
colwnpiece.club
Signatures
-
Xloader payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2192-2-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2192-7-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2192-11-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2556-18-0x0000000000080000-0x00000000000A8000-memory.dmp xloader behavioral1/memory/2556-20-0x0000000000080000-0x00000000000A8000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2608 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
CTM_50,000.exeCTM_50,000.execmmon32.exedescription pid Process procid_target PID 1968 set thread context of 2192 1968 CTM_50,000.exe 28 PID 2192 set thread context of 1176 2192 CTM_50,000.exe 21 PID 2192 set thread context of 1176 2192 CTM_50,000.exe 21 PID 2556 set thread context of 1176 2556 cmmon32.exe 21 -
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
CTM_50,000.execmmon32.exepid Process 2192 CTM_50,000.exe 2192 CTM_50,000.exe 2192 CTM_50,000.exe 2556 cmmon32.exe 2556 cmmon32.exe 2556 cmmon32.exe 2556 cmmon32.exe 2556 cmmon32.exe 2556 cmmon32.exe 2556 cmmon32.exe 2556 cmmon32.exe 2556 cmmon32.exe 2556 cmmon32.exe 2556 cmmon32.exe 2556 cmmon32.exe 2556 cmmon32.exe 2556 cmmon32.exe 2556 cmmon32.exe 2556 cmmon32.exe 2556 cmmon32.exe 2556 cmmon32.exe 2556 cmmon32.exe 2556 cmmon32.exe 2556 cmmon32.exe 2556 cmmon32.exe 2556 cmmon32.exe 2556 cmmon32.exe 2556 cmmon32.exe 2556 cmmon32.exe 2556 cmmon32.exe 2556 cmmon32.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
CTM_50,000.exeCTM_50,000.execmmon32.exepid Process 1968 CTM_50,000.exe 2192 CTM_50,000.exe 2192 CTM_50,000.exe 2192 CTM_50,000.exe 2192 CTM_50,000.exe 2556 cmmon32.exe 2556 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
CTM_50,000.execmmon32.exedescription pid Process Token: SeDebugPrivilege 2192 CTM_50,000.exe Token: SeDebugPrivilege 2556 cmmon32.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
CTM_50,000.exeExplorer.EXEcmmon32.exedescription pid Process procid_target PID 1968 wrote to memory of 2192 1968 CTM_50,000.exe 28 PID 1968 wrote to memory of 2192 1968 CTM_50,000.exe 28 PID 1968 wrote to memory of 2192 1968 CTM_50,000.exe 28 PID 1968 wrote to memory of 2192 1968 CTM_50,000.exe 28 PID 1968 wrote to memory of 2192 1968 CTM_50,000.exe 28 PID 1176 wrote to memory of 2556 1176 Explorer.EXE 29 PID 1176 wrote to memory of 2556 1176 Explorer.EXE 29 PID 1176 wrote to memory of 2556 1176 Explorer.EXE 29 PID 1176 wrote to memory of 2556 1176 Explorer.EXE 29 PID 2556 wrote to memory of 2608 2556 cmmon32.exe 30 PID 2556 wrote to memory of 2608 2556 cmmon32.exe 30 PID 2556 wrote to memory of 2608 2556 cmmon32.exe 30 PID 2556 wrote to memory of 2608 2556 cmmon32.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\CTM_50,000.exe"C:\Users\Admin\AppData\Local\Temp\CTM_50,000.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\CTM_50,000.exe"C:\Users\Admin\AppData\Local\Temp\CTM_50,000.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2192
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\CTM_50,000.exe"3⤵
- Deletes itself
PID:2608
-
-