Analysis
-
max time kernel
148s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
29-09-2024 22:40
Static task
static1
Behavioral task
behavioral1
Sample
61vPFITGkbgCrMT.exe
Resource
win7-20240903-en
General
-
Target
61vPFITGkbgCrMT.exe
-
Size
494KB
-
MD5
1562a3db939188c19ab5696f83c6e036
-
SHA1
b3964c733cff09ac94c9b4bc9c1f3d8c985a07f2
-
SHA256
619ab2c40c40c107e921df3ccd7f44946ab5a353939da1f3834213f3a507a4c0
-
SHA512
d2f39982222f5b01886e7ff5646b6c1bee44c8b8debef5ea5849235e93b42fd08aae701930f6aca9faff967ccf1c6e4be2c4f219fb0dad5a980b09b4734bd1a0
-
SSDEEP
12288:M1Uq03gcZI9plKGV05SJlpC//RRoRMQTB1:u0wcZI3lKruiXRmRMy1
Malware Config
Extracted
xloader
2.3
ur06
philippebrooksdesign.com
cmoorestudio.com
profille-sarina23tammara.club
dqulxe.com
uiffinger.com
nolarapper.com
maconanimalexterminator.com
bisovka.com
loveisloveent.com
datication.com
spxo66.com
drhelpnow.com
ladybug-cle.com
macocome.com
thepoppysocks.com
eldritchparadox.com
mercadolibre.company
ismartfarm.com
kansascarlot.com
kevinld.com
p87mbu2ss.xyz
the-makery.info
untegoro.site
newyorkcityhemorrhoidcenter.com
crystalclearwholistics.com
iregentos.info
fullskis.com
promanconsortium.com
800029120.com
mummyisme.com
humpychocks.com
myfavestuff.store
naturalfemina.com
bimetalthermostatksd.com
draysehaniminciftligi.com
sf9820.com
4thop.com
24les.com
thepupcrew.com
strangephobias.com
hotmamabody.com
restaurantsilhouette.com
texasadultdayservices.com
binahaiat.com
nipseythegreat.com
pelisplusxd.net
mamborio.com
elitedigitalperformance.com
therileyretreat.com
aieqbgk.icu
corkboardit.net
katieberiont.com
telemedicinehamilton.com
imagistor.com
tekdesignltd.com
bmw-7979.com
animaliaartist.com
straightlineautoserviceerie.net
qoo10online.com
tesseracoffee.com
central-car-sales.com
thecleaningenthusiast.com
musicmercch.com
pearlpham.com
allismd.com
Signatures
-
Xloader payload 5 IoCs
Processes:
resource yara_rule behavioral2/memory/2676-5-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/2676-10-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/2676-14-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/5080-23-0x0000000001240000-0x0000000001268000-memory.dmp xloader behavioral2/memory/5080-25-0x0000000001240000-0x0000000001268000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
Processes:
61vPFITGkbgCrMT.exe61vPFITGkbgCrMT.exemsiexec.exedescription pid Process procid_target PID 4812 set thread context of 2676 4812 61vPFITGkbgCrMT.exe 93 PID 2676 set thread context of 3468 2676 61vPFITGkbgCrMT.exe 56 PID 2676 set thread context of 3468 2676 61vPFITGkbgCrMT.exe 56 PID 5080 set thread context of 3468 5080 msiexec.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
61vPFITGkbgCrMT.exemsiexec.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61vPFITGkbgCrMT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 34 IoCs
Processes:
61vPFITGkbgCrMT.exemsiexec.exepid Process 2676 61vPFITGkbgCrMT.exe 2676 61vPFITGkbgCrMT.exe 2676 61vPFITGkbgCrMT.exe 2676 61vPFITGkbgCrMT.exe 2676 61vPFITGkbgCrMT.exe 2676 61vPFITGkbgCrMT.exe 5080 msiexec.exe 5080 msiexec.exe 5080 msiexec.exe 5080 msiexec.exe 5080 msiexec.exe 5080 msiexec.exe 5080 msiexec.exe 5080 msiexec.exe 5080 msiexec.exe 5080 msiexec.exe 5080 msiexec.exe 5080 msiexec.exe 5080 msiexec.exe 5080 msiexec.exe 5080 msiexec.exe 5080 msiexec.exe 5080 msiexec.exe 5080 msiexec.exe 5080 msiexec.exe 5080 msiexec.exe 5080 msiexec.exe 5080 msiexec.exe 5080 msiexec.exe 5080 msiexec.exe 5080 msiexec.exe 5080 msiexec.exe 5080 msiexec.exe 5080 msiexec.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
61vPFITGkbgCrMT.exemsiexec.exepid Process 2676 61vPFITGkbgCrMT.exe 2676 61vPFITGkbgCrMT.exe 2676 61vPFITGkbgCrMT.exe 2676 61vPFITGkbgCrMT.exe 5080 msiexec.exe 5080 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
61vPFITGkbgCrMT.exemsiexec.exedescription pid Process Token: SeDebugPrivilege 2676 61vPFITGkbgCrMT.exe Token: SeDebugPrivilege 5080 msiexec.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
61vPFITGkbgCrMT.exeExplorer.EXEmsiexec.exedescription pid Process procid_target PID 4812 wrote to memory of 2676 4812 61vPFITGkbgCrMT.exe 93 PID 4812 wrote to memory of 2676 4812 61vPFITGkbgCrMT.exe 93 PID 4812 wrote to memory of 2676 4812 61vPFITGkbgCrMT.exe 93 PID 4812 wrote to memory of 2676 4812 61vPFITGkbgCrMT.exe 93 PID 4812 wrote to memory of 2676 4812 61vPFITGkbgCrMT.exe 93 PID 4812 wrote to memory of 2676 4812 61vPFITGkbgCrMT.exe 93 PID 3468 wrote to memory of 5080 3468 Explorer.EXE 94 PID 3468 wrote to memory of 5080 3468 Explorer.EXE 94 PID 3468 wrote to memory of 5080 3468 Explorer.EXE 94 PID 5080 wrote to memory of 3340 5080 msiexec.exe 95 PID 5080 wrote to memory of 3340 5080 msiexec.exe 95 PID 5080 wrote to memory of 3340 5080 msiexec.exe 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\61vPFITGkbgCrMT.exe"C:\Users\Admin\AppData\Local\Temp\61vPFITGkbgCrMT.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\61vPFITGkbgCrMT.exe"C:\Users\Admin\AppData\Local\Temp\61vPFITGkbgCrMT.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\61vPFITGkbgCrMT.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3340
-
-