Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-07-2024 10:58
Static task
static1
Behavioral task
behavioral1
Sample
9b38c45acf649b5db02318330583b66e8f70f637a54ef40db50afbef85a0cbb6.exe
Resource
win7-20240708-en
General
-
Target
9b38c45acf649b5db02318330583b66e8f70f637a54ef40db50afbef85a0cbb6.exe
-
Size
651KB
-
MD5
f41074eaa3e27940c9659ed547264c46
-
SHA1
b95ec335db31a00d2ec118afec3ff1a5885f93d4
-
SHA256
9b38c45acf649b5db02318330583b66e8f70f637a54ef40db50afbef85a0cbb6
-
SHA512
65c8b8f2fb091725bf5ce52777882f325ef08c72ae9693bebdf45e9d65b46c6b36f6b59f36ab3b5ffd1325ec43c52df49f5afd78597bda4fc664642d5609a498
-
SSDEEP
12288:2fBafvIKSe9qVlyQSRanh4cMVPzF62RIoDKbB38kjrhmlrFrncR:24f/R0VlyAh4DUoDKV38kjrUrF
Malware Config
Extracted
xloader
2.7
uem3
darwinschools.com
polytherm-vloerverwarming.com
sinibelanja.website
erasemy.info
domainedelapoujade.info
freidaperry.com
ensoustudio.com
xjyjjy.com
ezhuilike.com
equipoheza.com
vtsr-health.com
elanagro.online
savas-jewelry.com
hispahoo.com
nlsc.chat
wharxl.icu
funandfoodboat.com
usdtsearch.com
experimentguardian.xyz
bikeell.com
betterviewconstructionlbk.com
ghettogunclub.com
turspot.com
xin175.com
hayatcevredanismanlik.com
vd0z5br8fd1yw.xyz
appindustry.online
timinis23.com
ramaniclothing.com
wisdomedu.info
duckholland.com
disintar.xyz
paragondronesolutions.com
cronos-dapp.com
hnfstricareeast.com
tatyejoao.com
xcashe.com
holythricehq.com
roslandcapittal.com
icarus-soft.com
kamerad.xyz
vineabank.com
chahuajie.com
mezilus.com
think-and-create.com
arslanrecep.com
themgboutique.com
onlinemarketingdegreesar.com
greattaxhelper.com
zackbphoto.com
kimisugar.com
fa1063.xyz
astrofrance.online
homesteaddesignstudio.net
norskeplanteskoler.online
pastafrescabg.com
rentrentrent.online
wolfgestione.com
hubinvoice.com
penelopegracemusic.com
tsrhlive.com
midbots.com
antipeek.net
veekvefs.com
boxingfishstudios.com
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2636-11-0x0000000000400000-0x000000000042B000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
9b38c45acf649b5db02318330583b66e8f70f637a54ef40db50afbef85a0cbb6.exedescription pid Process procid_target PID 1716 set thread context of 2636 1716 9b38c45acf649b5db02318330583b66e8f70f637a54ef40db50afbef85a0cbb6.exe 30 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
9b38c45acf649b5db02318330583b66e8f70f637a54ef40db50afbef85a0cbb6.exepid Process 2636 9b38c45acf649b5db02318330583b66e8f70f637a54ef40db50afbef85a0cbb6.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
9b38c45acf649b5db02318330583b66e8f70f637a54ef40db50afbef85a0cbb6.exedescription pid Process procid_target PID 1716 wrote to memory of 2636 1716 9b38c45acf649b5db02318330583b66e8f70f637a54ef40db50afbef85a0cbb6.exe 30 PID 1716 wrote to memory of 2636 1716 9b38c45acf649b5db02318330583b66e8f70f637a54ef40db50afbef85a0cbb6.exe 30 PID 1716 wrote to memory of 2636 1716 9b38c45acf649b5db02318330583b66e8f70f637a54ef40db50afbef85a0cbb6.exe 30 PID 1716 wrote to memory of 2636 1716 9b38c45acf649b5db02318330583b66e8f70f637a54ef40db50afbef85a0cbb6.exe 30 PID 1716 wrote to memory of 2636 1716 9b38c45acf649b5db02318330583b66e8f70f637a54ef40db50afbef85a0cbb6.exe 30 PID 1716 wrote to memory of 2636 1716 9b38c45acf649b5db02318330583b66e8f70f637a54ef40db50afbef85a0cbb6.exe 30 PID 1716 wrote to memory of 2636 1716 9b38c45acf649b5db02318330583b66e8f70f637a54ef40db50afbef85a0cbb6.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b38c45acf649b5db02318330583b66e8f70f637a54ef40db50afbef85a0cbb6.exe"C:\Users\Admin\AppData\Local\Temp\9b38c45acf649b5db02318330583b66e8f70f637a54ef40db50afbef85a0cbb6.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\9b38c45acf649b5db02318330583b66e8f70f637a54ef40db50afbef85a0cbb6.exe"C:\Users\Admin\AppData\Local\Temp\9b38c45acf649b5db02318330583b66e8f70f637a54ef40db50afbef85a0cbb6.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2636
-