Overview
overview
10Static
static
369d6130e88...0N.exe
windows7-x64
1069d6130e88...0N.exe
windows10-2004-x64
7$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3NBProjects...in.exe
windows7-x64
7NBProjects...in.exe
windows10-2004-x64
7Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
27-08-2024 19:19
Static task
static1
Behavioral task
behavioral1
Sample
69d6130e88b7f0157c2c24ceb2cc4a40N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
69d6130e88b7f0157c2c24ceb2cc4a40N.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
NBProjects/ParticleFirmware/nbproject/private/uninstall-particle-toolchain.exe
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
NBProjects/ParticleFirmware/nbproject/private/uninstall-particle-toolchain.exe
Resource
win10v2004-20240802-en
General
-
Target
69d6130e88b7f0157c2c24ceb2cc4a40N.exe
-
Size
416KB
-
MD5
69d6130e88b7f0157c2c24ceb2cc4a40
-
SHA1
041718d23c5b77e72dc65490279cb1f34b4bcced
-
SHA256
07fb86d2d29812a93d65900435235baf42de5cd83e6dfe381f099a1967746aa2
-
SHA512
f4403c609138c87c8de4da0f36995efe3f1e81289c0840e97d3e4fd35274350ff320cb05747236a3c6f8fd57a2022d6f95c69c3178914f7c2cbc75f800d28e63
-
SSDEEP
6144:/QqJb5mFCQcGNYpmUIfvlQdFMkbkz13XQCbbGJJPH4hErRqUHvB:z5mFvcyYQhfvWMkbu1nQdJ8OvB
Malware Config
Extracted
xloader
2.3
or4i
cylindberg.com
qsmpy.world
hairmaxxclinic.com
teesfitpro.com
changethecompany.net
painteredmond.com
shebagholdings.com
wasteexport.com
salesclerkadage.life
rainboxs.com
lingoblasterdiscount.com
booweats.com
topcasino-111.com
downtoearthwork.com
carry-hai.com
nassaustreetcorp.com
directflence.com
basictrainningphothos.com
virtualayurveda.com
dar-sanidad.com
businessenglish.company
safegrinder.com
blissfulyogamullicahill.com
smartmatch-dating-api.com
heaset.com
fingerpointingimp.com
rogersbeefarm.com
guysgunsandcountry.com
attackbit.com
bawalturki.com
goodmanifest.com
healshameyoga.com
citiphoneonline.com
canaltransportllc.com
theflagdude.com
mmgenius.com
ikeberto.com
sky-cargo.net
tecquestrian.com
ashleylovica.com
contorig2.com
nowhealthdays.com
dadaoliangpi.com
three.guide
anoussa.com
fanyingfu001.com
matthewdimartino.com
ventadearticulosreligiosos.com
collegesupermatch.com
king-jackpot.com
puppillows.store
woodforsmoke.com
globaltradesclub.com
flipkart-max-sale.xyz
carlyle-cocao.com
cuntrera.com
sadafalbahariq.com
spmomgoals.com
mk-365.com
yanghuoquan.com
xn--espacesacr-k7a.com
pidelodirecto.com
0o-a-8v4l76.net
aqayeseo.com
nobleandmarble.com
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/2196-13-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Loads dropped DLL 2 IoCs
Processes:
69d6130e88b7f0157c2c24ceb2cc4a40N.exepid Process 808 69d6130e88b7f0157c2c24ceb2cc4a40N.exe 808 69d6130e88b7f0157c2c24ceb2cc4a40N.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
69d6130e88b7f0157c2c24ceb2cc4a40N.exedescription pid Process procid_target PID 808 set thread context of 2196 808 69d6130e88b7f0157c2c24ceb2cc4a40N.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
69d6130e88b7f0157c2c24ceb2cc4a40N.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69d6130e88b7f0157c2c24ceb2cc4a40N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
69d6130e88b7f0157c2c24ceb2cc4a40N.exepid Process 2196 69d6130e88b7f0157c2c24ceb2cc4a40N.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
69d6130e88b7f0157c2c24ceb2cc4a40N.exepid Process 808 69d6130e88b7f0157c2c24ceb2cc4a40N.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
69d6130e88b7f0157c2c24ceb2cc4a40N.exedescription pid Process procid_target PID 808 wrote to memory of 2196 808 69d6130e88b7f0157c2c24ceb2cc4a40N.exe 30 PID 808 wrote to memory of 2196 808 69d6130e88b7f0157c2c24ceb2cc4a40N.exe 30 PID 808 wrote to memory of 2196 808 69d6130e88b7f0157c2c24ceb2cc4a40N.exe 30 PID 808 wrote to memory of 2196 808 69d6130e88b7f0157c2c24ceb2cc4a40N.exe 30 PID 808 wrote to memory of 2196 808 69d6130e88b7f0157c2c24ceb2cc4a40N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\69d6130e88b7f0157c2c24ceb2cc4a40N.exe"C:\Users\Admin\AppData\Local\Temp\69d6130e88b7f0157c2c24ceb2cc4a40N.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\69d6130e88b7f0157c2c24ceb2cc4a40N.exe"C:\Users\Admin\AppData\Local\Temp\69d6130e88b7f0157c2c24ceb2cc4a40N.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f