Analysis
-
max time kernel
93s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 21:58
Static task
static1
Behavioral task
behavioral1
Sample
c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exe
Resource
win7-20241010-en
General
-
Target
c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exe
-
Size
490KB
-
MD5
6b5c151262e7e04e414579b38108a1d1
-
SHA1
f151bd3fb1cae8e597f8341e381be15ef7154b04
-
SHA256
c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5
-
SHA512
11644469db984f4afbd6eeb320f2a4a6893b96eb864b20233bc115209d9e83dbb61eef25311bce92146731bf0109ccc627698944b74f13b06a0ce7eec8d07fea
-
SSDEEP
6144:1GxhLwIa+v2TgTxWyYZW2uPxJgpjt61mAKc4WzJCZNozJztmz:0ftwgTx2W2upJgVmBKuzggtmz
Malware Config
Extracted
xloader
2.5
n8cr
mainponsel.com
twdesignacreation.com
obsidianfields.net
biologik.education
australianmeatandwine.com
metaverse360.biz
tenlog034.xyz
retryb.com
darbodrum.com
ouranos.xyz
equityreleaseshelpukweb.com
buck100.com
cfip-plongee.com
sundindustrial.com
godigitalwithpavitra.com
exodiguis.com
ncxogt.com
medyncity.store
bseafacepharma.online
dellmoor.com
thesaltandpeppercompany.com
salvationshippingsecurity.com
quarhu.net
isearchpartner.agency
mistikistapp.xyz
cfinvestmentsllc.com
istesdesv.xyz
lsurpriseremix.com
kirtansangeet.com
faceandco.clinic
189montreal.com
xn--tlq41iy6p.xn--czru2d
aestheticgeneration.com
pharmasolutionspr.net
rab.bet
lifeultimatejump.rest
mygreatsport.com
wwwinnovativeinteriorssdcom.com
alexchen032104.com
tatabet999.com
makeithappenshow.com
javcricket.com
dangkytrasauviettel360.club
radiesn.store
kreditkarten.center
iran-style.com
onhering.com
0e6.biz
insurancewineappraisals.com
stadichigh.com
denim-dots.com
finehedge.com
kcs-food.com
dashmints.com
recifetopschoolteacher.com
harryrowlandart.com
thearton.com
whatyummy.com
cockblocker.online
idf2000.com
hotdog-dsk.com
aardvarkbutter.com
tykazz.com
lbsp3.xyz
karasevda-jor.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4416-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exedescription pid process target process PID 4480 set thread context of 4416 4480 c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exe c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exec8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exepid process 4480 c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exe 4480 c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exe 4416 c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exe 4416 c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exedescription pid process Token: SeDebugPrivilege 4480 c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exedescription pid process target process PID 4480 wrote to memory of 4416 4480 c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exe c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exe PID 4480 wrote to memory of 4416 4480 c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exe c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exe PID 4480 wrote to memory of 4416 4480 c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exe c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exe PID 4480 wrote to memory of 4416 4480 c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exe c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exe PID 4480 wrote to memory of 4416 4480 c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exe c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exe PID 4480 wrote to memory of 4416 4480 c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exe c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exe"C:\Users\Admin\AppData\Local\Temp\c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exe"C:\Users\Admin\AppData\Local\Temp\c8d7ee1fa1df3177eeeae7bf891bb8bf5487bbec5e907d805095cea6bcbabbf5.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4416
-