Analysis
-
max time kernel
110s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 22:50
Static task
static1
Behavioral task
behavioral1
Sample
10b55b038f70d21f31cd55f787d44ae0N.exe
Resource
win7-20240704-en
General
-
Target
10b55b038f70d21f31cd55f787d44ae0N.exe
-
Size
743KB
-
MD5
10b55b038f70d21f31cd55f787d44ae0
-
SHA1
8ffb7bd8228f943c54e5137f1894dc6c8b4a54d3
-
SHA256
6a648e78826c4e2e6a4c1f984c91cbedadf14344383306d023f4730d481bce05
-
SHA512
86855a81e92af79055d141f52b73305734763cda1ca4602709e88e819c0e6b6b432bd60b24bde53d07081e2ad20a24dce62e502417be1f6bb665b55f62dea963
-
SSDEEP
12288:zlqyqREeIzk+ZkO+SaTu8psEd7zp5I56IW3B2kb+tqYtkmJ1M:zNeIzJZkO5qsoPva6hEOsqOk0
Malware Config
Extracted
xloader
2.5
hfhf
ddhh9500.com
lesterkwilson.store
southasianrepublicans.com
azumo.xyz
emptycc.net
lelasthriftboutique.com
redis76.com
marinebelaroi.com
hallibrewerproductions.com
elevareassessoria.com
haozhugou.com
anti-ragebot.com
bardo.xyz
dryerventmastersllc.com
qmhdxu.biz
getgoldentoday.com
crippledom.com
primedispatchers.com
052et.xyz
h2adubai.com
coolspanishlikeyou.com
medyncity.store
zahediseresht.com
oliviasnowceramics.com
techis-ichiro.com
shoppingindia.tech
actpress.net
p2psite.net
emplealegal.com
moriwafuu.website
assetmortgagenc.com
newbalancepeak.xyz
xn--ruilnhen-f2a67a660z.com
loveyoumoreboutique.com
vnethotspot.online
theadaptiveadvantage.com
gobestbooks.com
baileys.pet
searchwebnetwork.online
s-thtv.com
nowuckas.top
badkyker.quest
xmqzyz.com
keennook.com
fisocialmedia.com
special-controls.online
xiphiasys.com
gonorthindianbites.com
cqmogj.com
capgeminimerchandise.com
gextop.com
822941.com
azzawisynapses.com
biyell.com
magnauniversity.com
wofmyhome.online
yourchariott.com
escortworks.xyz
balancethekeytoeverything.com
marypetshop.com
universitetrading.com
finessetrades.com
luxalbridi.com
explorebrowser.com
cbrevival.com
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2668-13-0x000000000A500000-0x000000000A529000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
10b55b038f70d21f31cd55f787d44ae0N.exedescription pid process target process PID 2668 set thread context of 4808 2668 10b55b038f70d21f31cd55f787d44ae0N.exe 10b55b038f70d21f31cd55f787d44ae0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
10b55b038f70d21f31cd55f787d44ae0N.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10b55b038f70d21f31cd55f787d44ae0N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
10b55b038f70d21f31cd55f787d44ae0N.exepid process 4808 10b55b038f70d21f31cd55f787d44ae0N.exe 4808 10b55b038f70d21f31cd55f787d44ae0N.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
10b55b038f70d21f31cd55f787d44ae0N.exedescription pid process Token: SeDebugPrivilege 2668 10b55b038f70d21f31cd55f787d44ae0N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
10b55b038f70d21f31cd55f787d44ae0N.exedescription pid process target process PID 2668 wrote to memory of 4808 2668 10b55b038f70d21f31cd55f787d44ae0N.exe 10b55b038f70d21f31cd55f787d44ae0N.exe PID 2668 wrote to memory of 4808 2668 10b55b038f70d21f31cd55f787d44ae0N.exe 10b55b038f70d21f31cd55f787d44ae0N.exe PID 2668 wrote to memory of 4808 2668 10b55b038f70d21f31cd55f787d44ae0N.exe 10b55b038f70d21f31cd55f787d44ae0N.exe PID 2668 wrote to memory of 4808 2668 10b55b038f70d21f31cd55f787d44ae0N.exe 10b55b038f70d21f31cd55f787d44ae0N.exe PID 2668 wrote to memory of 4808 2668 10b55b038f70d21f31cd55f787d44ae0N.exe 10b55b038f70d21f31cd55f787d44ae0N.exe PID 2668 wrote to memory of 4808 2668 10b55b038f70d21f31cd55f787d44ae0N.exe 10b55b038f70d21f31cd55f787d44ae0N.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\10b55b038f70d21f31cd55f787d44ae0N.exe"C:\Users\Admin\AppData\Local\Temp\10b55b038f70d21f31cd55f787d44ae0N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\10b55b038f70d21f31cd55f787d44ae0N.exe"C:\Users\Admin\AppData\Local\Temp\10b55b038f70d21f31cd55f787d44ae0N.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4808