Analysis
-
max time kernel
138s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-10-2024 21:07
Behavioral task
behavioral1
Sample
586a9900fca452e2afa7a4522204fc6a3c2536d66672dc7a24e189467c3d2a74.exe
Resource
win7-20240903-en
General
-
Target
586a9900fca452e2afa7a4522204fc6a3c2536d66672dc7a24e189467c3d2a74.exe
-
Size
887KB
-
MD5
53da05e0ba0640d11a2f68f93849d18f
-
SHA1
a6f6965cd9aee9f4942283a5eef8d3af92b1d440
-
SHA256
586a9900fca452e2afa7a4522204fc6a3c2536d66672dc7a24e189467c3d2a74
-
SHA512
438ea73954d4ff1e9c89225d2177361d55fc8e13290d595905cc9a2b7f7461f5ccc89b4af7646c1ac811f2a1631c5d88abfe1f9995e79609d67681296b63c593
-
SSDEEP
12288:4witCMnl6uqdnPqgduxjrYVS8Ln0TIxZ8bIC4UgqfLZvDyrNrT:5cCNXYgskVP0Ty8r4UgWtDQJ
Malware Config
Extracted
xloader
2.1
cia6
zyciecodzienne.com
106hiddenoakstrail.com
petvetrx.com
meiyaio.com
mathstutorsouthglasgow.com
smartbizwithgq.com
sotoki.com
merencena.com
cmplubumbashi.net
redcandlemedia.net
gangidesign.online
onlinesfashion.com
hannael-it.com
forgedforpurpose.com
servingdivisiion.com
myskindeepbeauty.com
massagebyauriel.com
lafrancequejaime.com
karlgillard.com
baharran.com
boronj.com
saintlyla.com
carlsbadswimwear.com
urbanocity.store
thebabythings.com
7939699.com
melbourneorthopaedicrehab.com
gabbybiancaa.com
isuzumetroonline.com
knwaxdsvp.icu
gkespa.com
mamedaxundov.com
cleo.vision
51jingbai.com
cia3mega.info
epilaguzelliksalonu.xyz
chilangabandaclothing.com
preciousbeautyvibes.com
yesonmeasurec.vote
baithakkhana.com
bjscoe.com
qualitycrc.com
whereidratherbe.com
falloffreddietheleaf.com
translaml.com
houseofbeautycollections.com
lsleep.com
shihtzuparadise.info
quantummindinstitute.com
joshuabadillo.com
mql5robot.com
meccahalalmarket.com
wwwawrusa.com
archidzen.com
7dayscale.info
sokvlyw.icu
virginebikes.com
philippschofield.com
everythingdesign.agency
classcraftepiced.online
hbchgjc.com
ukimaco.com
hu7ds6vi4x5qy2zz.com
boostsantestore.com
eparegistrar.com
Signatures
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/2704-4-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
586a9900fca452e2afa7a4522204fc6a3c2536d66672dc7a24e189467c3d2a74.exedescription pid process target process PID 1136 set thread context of 2704 1136 586a9900fca452e2afa7a4522204fc6a3c2536d66672dc7a24e189467c3d2a74.exe 586a9900fca452e2afa7a4522204fc6a3c2536d66672dc7a24e189467c3d2a74.exe -
Processes:
resource yara_rule behavioral2/memory/1136-0-0x0000000000400000-0x00000000004DF000-memory.dmp upx behavioral2/memory/1136-5-0x0000000000400000-0x00000000004DF000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
586a9900fca452e2afa7a4522204fc6a3c2536d66672dc7a24e189467c3d2a74.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 586a9900fca452e2afa7a4522204fc6a3c2536d66672dc7a24e189467c3d2a74.exe -
Modifies registry class 2 IoCs
Processes:
586a9900fca452e2afa7a4522204fc6a3c2536d66672dc7a24e189467c3d2a74.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ 586a9900fca452e2afa7a4522204fc6a3c2536d66672dc7a24e189467c3d2a74.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ 586a9900fca452e2afa7a4522204fc6a3c2536d66672dc7a24e189467c3d2a74.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
586a9900fca452e2afa7a4522204fc6a3c2536d66672dc7a24e189467c3d2a74.exe586a9900fca452e2afa7a4522204fc6a3c2536d66672dc7a24e189467c3d2a74.exepid process 1136 586a9900fca452e2afa7a4522204fc6a3c2536d66672dc7a24e189467c3d2a74.exe 1136 586a9900fca452e2afa7a4522204fc6a3c2536d66672dc7a24e189467c3d2a74.exe 2704 586a9900fca452e2afa7a4522204fc6a3c2536d66672dc7a24e189467c3d2a74.exe 2704 586a9900fca452e2afa7a4522204fc6a3c2536d66672dc7a24e189467c3d2a74.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
586a9900fca452e2afa7a4522204fc6a3c2536d66672dc7a24e189467c3d2a74.exepid process 1136 586a9900fca452e2afa7a4522204fc6a3c2536d66672dc7a24e189467c3d2a74.exe -
Suspicious use of WriteProcessMemory 5 IoCs
Processes:
586a9900fca452e2afa7a4522204fc6a3c2536d66672dc7a24e189467c3d2a74.exedescription pid process target process PID 1136 wrote to memory of 4672 1136 586a9900fca452e2afa7a4522204fc6a3c2536d66672dc7a24e189467c3d2a74.exe splwow64.exe PID 1136 wrote to memory of 4672 1136 586a9900fca452e2afa7a4522204fc6a3c2536d66672dc7a24e189467c3d2a74.exe splwow64.exe PID 1136 wrote to memory of 2704 1136 586a9900fca452e2afa7a4522204fc6a3c2536d66672dc7a24e189467c3d2a74.exe 586a9900fca452e2afa7a4522204fc6a3c2536d66672dc7a24e189467c3d2a74.exe PID 1136 wrote to memory of 2704 1136 586a9900fca452e2afa7a4522204fc6a3c2536d66672dc7a24e189467c3d2a74.exe 586a9900fca452e2afa7a4522204fc6a3c2536d66672dc7a24e189467c3d2a74.exe PID 1136 wrote to memory of 2704 1136 586a9900fca452e2afa7a4522204fc6a3c2536d66672dc7a24e189467c3d2a74.exe 586a9900fca452e2afa7a4522204fc6a3c2536d66672dc7a24e189467c3d2a74.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\586a9900fca452e2afa7a4522204fc6a3c2536d66672dc7a24e189467c3d2a74.exe"C:\Users\Admin\AppData\Local\Temp\586a9900fca452e2afa7a4522204fc6a3c2536d66672dc7a24e189467c3d2a74.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4672
-
-
C:\Users\Admin\AppData\Local\Temp\586a9900fca452e2afa7a4522204fc6a3c2536d66672dc7a24e189467c3d2a74.exe"C:\Users\Admin\AppData\Local\Temp\586a9900fca452e2afa7a4522204fc6a3c2536d66672dc7a24e189467c3d2a74.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2704
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:2184