Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2024 14:42
Static task
static1
Behavioral task
behavioral1
Sample
cd327d55e481bdb301265079b80c8af67b4c6b3f9cd5de9cfe7906749c8249d5N.exe
Resource
win7-20240708-en
General
-
Target
cd327d55e481bdb301265079b80c8af67b4c6b3f9cd5de9cfe7906749c8249d5N.exe
-
Size
223KB
-
MD5
db37d1e2931c760f34d98449f3f643d0
-
SHA1
7783156205a04b0a6c92268ed56bcfbddac4652c
-
SHA256
cd327d55e481bdb301265079b80c8af67b4c6b3f9cd5de9cfe7906749c8249d5
-
SHA512
fa8ad7553c56cd67fcfcee351f4e1386ab999954f3ea690d43b2ca1c3c060eb7bb9620f8fb2014ac82b1d993ab3bf6dd04a4d287c460cbb79f1ee4e6bf39df2e
-
SSDEEP
6144:4YS+dkhpLFpaZaIuBUd0rtFjurSTDyJLIkRdlHYe+y5yMNT:4YddgpLFpaZaIUSqtFqrSHyJLIkRdd5L
Malware Config
Extracted
xloader
2.3
qian
jurutv.com
hyenanews.com
zhurucap.com
a-ruholdings.com
sakering.com
genecite.com
turkiye-gov-tr.net
thealexagency.com
nelvairenecruzadojulon.com
bleusleep.com
justsfind.com
chayaadatrao.com
thitruongquocte.com
todorecord.com
69-1hn7uc.net
basecampadventurevans.com
stormberggrouptn.com
tomrings.com
7187295.com
jomaline.com
elementscommerce.com
malacziczi.com
hotelampm.com
twicebilingual.com
oakriverrealty.com
christinemarek.com
myrevisionguide.com
homecocktailkit.com
szhel.com
preopready.com
ahsjy.com
puvumo.com
prismaticbody.com
michael-svoboda.com
dnasoft.info
handnhanddetailing.com
airqueen.online
imanparsublimaciones.com
txly.club
acumenics.xyz
brintonlodgebrew.com
allyearfitness.com
healthcareexpertnetwork.com
rebelnqueen.com
koperasicin.com
thelatamshop.com
zerotouchbilling.com
fortworthresidences.net
moreklks.com
dunnah.com
chanceruffalo.com
inmocasaplus.com
kingddt.com
asmaraconsulting.com
ensafet.com
chuyingdai.com
bailcally.com
carmacindia.com
crowd50.online
olamodaboutique.com
pubgxfree15.com
oldfirehouseshelter.com
littleredbarndesigns.com
securityfirstsc.com
kiasales.net
Signatures
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/1324-2-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 716 set thread context of 1324 716 cd327d55e481bdb301265079b80c8af67b4c6b3f9cd5de9cfe7906749c8249d5N.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cd327d55e481bdb301265079b80c8af67b4c6b3f9cd5de9cfe7906749c8249d5N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1324 cd327d55e481bdb301265079b80c8af67b4c6b3f9cd5de9cfe7906749c8249d5N.exe 1324 cd327d55e481bdb301265079b80c8af67b4c6b3f9cd5de9cfe7906749c8249d5N.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 716 cd327d55e481bdb301265079b80c8af67b4c6b3f9cd5de9cfe7906749c8249d5N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 716 wrote to memory of 1324 716 cd327d55e481bdb301265079b80c8af67b4c6b3f9cd5de9cfe7906749c8249d5N.exe 83 PID 716 wrote to memory of 1324 716 cd327d55e481bdb301265079b80c8af67b4c6b3f9cd5de9cfe7906749c8249d5N.exe 83 PID 716 wrote to memory of 1324 716 cd327d55e481bdb301265079b80c8af67b4c6b3f9cd5de9cfe7906749c8249d5N.exe 83 PID 716 wrote to memory of 1324 716 cd327d55e481bdb301265079b80c8af67b4c6b3f9cd5de9cfe7906749c8249d5N.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\cd327d55e481bdb301265079b80c8af67b4c6b3f9cd5de9cfe7906749c8249d5N.exe"C:\Users\Admin\AppData\Local\Temp\cd327d55e481bdb301265079b80c8af67b4c6b3f9cd5de9cfe7906749c8249d5N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Users\Admin\AppData\Local\Temp\cd327d55e481bdb301265079b80c8af67b4c6b3f9cd5de9cfe7906749c8249d5N.exe"C:\Users\Admin\AppData\Local\Temp\cd327d55e481bdb301265079b80c8af67b4c6b3f9cd5de9cfe7906749c8249d5N.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1324
-