Analysis
-
max time kernel
84s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
31-08-2024 12:46
Static task
static1
Behavioral task
behavioral1
Sample
506458aaeef61f70cf73da3d71d5452cd859cfd9fbcc7cf515d27265ace2421d.exe
Resource
win7-20240729-en
General
-
Target
506458aaeef61f70cf73da3d71d5452cd859cfd9fbcc7cf515d27265ace2421d.exe
-
Size
425KB
-
MD5
c0e07faebfd4b0977ac802e3bc73958a
-
SHA1
0277d0bc9bc70b7b013adb9e7500dd0cbd0b863e
-
SHA256
506458aaeef61f70cf73da3d71d5452cd859cfd9fbcc7cf515d27265ace2421d
-
SHA512
7ce148455e4a6152ac5ede04e595cafcb5e9363efc0d79552726a34fc1b7b595028758774d4358f581ec12a1a0a8823e5aa2dcc226a20763d32f17c95d6aa752
-
SSDEEP
6144:i6Uqd2GhNOQVwKtCcaEyfM2Q4NmbBggh13Rtm1DnMaKvzmr3:fUi2iNOQVlVPOTpqBtUDnMamQ
Malware Config
Extracted
xloader
2.5
euzn
235296tyc.com
gold12guide.art
baibuaherb.com
weberwines.tax
chezvitoria.com
aidenb.tech
pitchdeckservice.com
surgeryforfdf.xyz
workunvaccinated.com
hrtaro.com
yourotcs.com
sonimultispecialityclinic.com
consultantadvisors.com
pentesting-consulting.com
dantechs.digital
longshifa.online
taweilai.net
imyusuke.com
cashndashfinancial.com
fasiglimt.quest
jakital.com
graywolfdesign.com
pepeavatar.com
predixlogisticscourier.com
football-transfer-news.pro
herbalmedication.xyz
esd66.com
janesgalant.quest
abcrefreshments.com
chaoxy.com
rediscoveringyouhealing.com
mcrjadr5.xyz
n4sins.com
faithful-presence.com
013yu.xyz
isystemslanka.com
newbeautydk.com
ethiopia-info.com
hgaffiliates.net
anodynemedicalmassage.com
esohgroup.com
clinicamonicabarros.com
rafathecook.com
londonescort.xyz
dreamites.com
webtiyan.com
cnnautorepair.com
soposhshop.com
aarohaninsight2021.com
arceprojects.com
mecasso.store
mirai-energy.com
barwg.com
angeescollections-shop.com
xinlishiqiaoqiao.xyz
linuxsauce.net
dirbn.com
anandiaper.xyz
blackpanther.online
livinwoodbridgefarms.com
diepraxiskommunikation.com
radiosaptshahid.com
gofieldtest.com
minxtales.com
heser.net
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4040-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
506458aaeef61f70cf73da3d71d5452cd859cfd9fbcc7cf515d27265ace2421d.exedescription pid Process procid_target PID 4284 set thread context of 4040 4284 506458aaeef61f70cf73da3d71d5452cd859cfd9fbcc7cf515d27265ace2421d.exe 96 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
506458aaeef61f70cf73da3d71d5452cd859cfd9fbcc7cf515d27265ace2421d.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 506458aaeef61f70cf73da3d71d5452cd859cfd9fbcc7cf515d27265ace2421d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
506458aaeef61f70cf73da3d71d5452cd859cfd9fbcc7cf515d27265ace2421d.exepid Process 4040 506458aaeef61f70cf73da3d71d5452cd859cfd9fbcc7cf515d27265ace2421d.exe 4040 506458aaeef61f70cf73da3d71d5452cd859cfd9fbcc7cf515d27265ace2421d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
506458aaeef61f70cf73da3d71d5452cd859cfd9fbcc7cf515d27265ace2421d.exedescription pid Process procid_target PID 4284 wrote to memory of 4040 4284 506458aaeef61f70cf73da3d71d5452cd859cfd9fbcc7cf515d27265ace2421d.exe 96 PID 4284 wrote to memory of 4040 4284 506458aaeef61f70cf73da3d71d5452cd859cfd9fbcc7cf515d27265ace2421d.exe 96 PID 4284 wrote to memory of 4040 4284 506458aaeef61f70cf73da3d71d5452cd859cfd9fbcc7cf515d27265ace2421d.exe 96 PID 4284 wrote to memory of 4040 4284 506458aaeef61f70cf73da3d71d5452cd859cfd9fbcc7cf515d27265ace2421d.exe 96 PID 4284 wrote to memory of 4040 4284 506458aaeef61f70cf73da3d71d5452cd859cfd9fbcc7cf515d27265ace2421d.exe 96 PID 4284 wrote to memory of 4040 4284 506458aaeef61f70cf73da3d71d5452cd859cfd9fbcc7cf515d27265ace2421d.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\506458aaeef61f70cf73da3d71d5452cd859cfd9fbcc7cf515d27265ace2421d.exe"C:\Users\Admin\AppData\Local\Temp\506458aaeef61f70cf73da3d71d5452cd859cfd9fbcc7cf515d27265ace2421d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\506458aaeef61f70cf73da3d71d5452cd859cfd9fbcc7cf515d27265ace2421d.exe"C:\Users\Admin\AppData\Local\Temp\506458aaeef61f70cf73da3d71d5452cd859cfd9fbcc7cf515d27265ace2421d.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4040
-