Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-08-2024 00:23
Static task
static1
Behavioral task
behavioral1
Sample
9865e01c07005c2c391aca7c2a6fd527573f3fcd48b2e8577f2eab14ba6f55d2.exe
Resource
win7-20240708-en
General
-
Target
9865e01c07005c2c391aca7c2a6fd527573f3fcd48b2e8577f2eab14ba6f55d2.exe
-
Size
524KB
-
MD5
89b94e1ed5a44eb05adba3a516f010fb
-
SHA1
d5566abf7944d1ba830515eacf0b4647bf907bb4
-
SHA256
9865e01c07005c2c391aca7c2a6fd527573f3fcd48b2e8577f2eab14ba6f55d2
-
SHA512
edc0c56a33e4e4747c1d7306f4d777759c426a375d0283bc5f5af9b9ee7aa365602bb4dd43697d23bcbca82f35537b04f71d9bdf0cf23aebeda277dc30878e21
-
SSDEEP
12288:X9pL8dQnSsG5u8j/cYRHFuVv32+XAEDuME4lbMIOy:X9pL8dQnSsG5umRHFKjXAED+ibMXy
Malware Config
Extracted
xloader
2.3
ma3c
bensimonconstructions.com
margaretta.info
getreireply.com
jamierighetti.com
gxjljc.com
internet-exerzitien.com
appetiteintelligence.com
buscar-id-apple.com
unique-bikinis.com
enclassique.com
dafontonline.com
northamericancarbonexchange.com
yashasvsaluja.com
sn-international.com
humanvitality.site
sarahcasias.com
xn--vrv276h3cb.com
curiget.xyz
anxietyattackscure.com
angelstonecrystals.com
onestripemed.com
mirgran.com
boxtechtv.com
healthcontrol.net
eroutescheduling.com
betralifcannabis.com
advancefulfillmentcenter.net
graphicprofessor.com
booster-tresorerie.com
intibeso.xyz
modomo.amsterdam
rionaluo.net
6streeam.xyz
mobundlesco.com
sacredlight.store
xy4869.com
xn--casamio-9za.com
herma-shop.com
cfphoenixmembers.com
ssrpss.info
realunitystudio.com
itsjustinscode.com
wannabebody.com
bwbcoa.com
unitednations-office.com
dallasmalerevuetix.com
bestflowersandgifts.com
lojasmegamoveis.com
fyahvapes.com
salvofoods.com
meditationwithdaniel.com
2elden.com
romitoart.com
sci-mfg.com
xn--hy1bw5cd1ic1e75g84omki.com
erwinsiahaan.com
landreclaim.com
chuanyangwenhua.com
zzfuwusheji.com
cannabiss.clinic
sexichef.com
aymauxilia.com
conchcruiserswestpalm.com
rememberingedward.info
zq2003.com
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2628-1-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2340 set thread context of 2628 2340 9865e01c07005c2c391aca7c2a6fd527573f3fcd48b2e8577f2eab14ba6f55d2.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9865e01c07005c2c391aca7c2a6fd527573f3fcd48b2e8577f2eab14ba6f55d2.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2628 9865e01c07005c2c391aca7c2a6fd527573f3fcd48b2e8577f2eab14ba6f55d2.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2340 9865e01c07005c2c391aca7c2a6fd527573f3fcd48b2e8577f2eab14ba6f55d2.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2628 2340 9865e01c07005c2c391aca7c2a6fd527573f3fcd48b2e8577f2eab14ba6f55d2.exe 31 PID 2340 wrote to memory of 2628 2340 9865e01c07005c2c391aca7c2a6fd527573f3fcd48b2e8577f2eab14ba6f55d2.exe 31 PID 2340 wrote to memory of 2628 2340 9865e01c07005c2c391aca7c2a6fd527573f3fcd48b2e8577f2eab14ba6f55d2.exe 31 PID 2340 wrote to memory of 2628 2340 9865e01c07005c2c391aca7c2a6fd527573f3fcd48b2e8577f2eab14ba6f55d2.exe 31 PID 2340 wrote to memory of 2628 2340 9865e01c07005c2c391aca7c2a6fd527573f3fcd48b2e8577f2eab14ba6f55d2.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\9865e01c07005c2c391aca7c2a6fd527573f3fcd48b2e8577f2eab14ba6f55d2.exe"C:\Users\Admin\AppData\Local\Temp\9865e01c07005c2c391aca7c2a6fd527573f3fcd48b2e8577f2eab14ba6f55d2.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\9865e01c07005c2c391aca7c2a6fd527573f3fcd48b2e8577f2eab14ba6f55d2.exe"C:\Users\Admin\AppData\Local\Temp\9865e01c07005c2c391aca7c2a6fd527573f3fcd48b2e8577f2eab14ba6f55d2.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2628
-