Analysis
-
max time kernel
135s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 22:51
Static task
static1
Behavioral task
behavioral1
Sample
b4e60a56123b44dcab2467876068b470b06bf973ea7379df45a2209f2ab88369.exe
Resource
win7-20240708-en
General
-
Target
b4e60a56123b44dcab2467876068b470b06bf973ea7379df45a2209f2ab88369.exe
-
Size
417KB
-
MD5
00228bf750fffc7aa651ceab92a561a4
-
SHA1
6402c98d86e5089382951750ab032362761e4aac
-
SHA256
b4e60a56123b44dcab2467876068b470b06bf973ea7379df45a2209f2ab88369
-
SHA512
a9ac73e68a4d21c0ee267864f59348e4572fdbbb7ec1cf137321b40b0bc0f5e777eb60215123265e9d448f22a11c23cbbc8a44f9dfb94d808dce88122c3154de
-
SSDEEP
6144:HuBpZ/BHaTfvTP3PrhHsTBVIjkjq9//HmJei88/gVsEAQGJqpOBhuhxu8r26yIb7:0ZSvTPVHu0L5Qh/gVsEmBhuhxu8rF7
Malware Config
Extracted
xloader
2.5
cda8
ajiwechouf.com
chesterkturner.store
tanxiaoyouhongru.space
indiacbc.com
coricanteen.com
supports-teams.com
triandreas.com
fyonkaly.com
m-bald-lab.com
frankserranolaw.com
testedeployheroku.club
wasildelivery.com
stonebyparamount.com
mehmetmercan.com
digitalmarketingyou.com
luxuryrelocationrentals.com
xn--e1aqdnq.store
scw-group.com
onelovemarketingsolution.com
diygardenlife.com
tabandehcard.com
websitesetupwiz.com
topay.biz
ktnfilm.xyz
piedsdetable.com
kevyinroland.quest
rosenkostenextra.com
cryptocoin-medics.com
overlandrealtors.com
fairydealparent.com
elitsa.one
wrdomens.com
parrottforjudge.com
thebersanpost.com
kokcoin.store
sellfrate.store
strijp.xyz
urbanravenllc.com
mmupvarejo.com
unquarreling.com
villa-hummingbird.com
alltart.com
ksyfgw9.com
aquiline.info
mmeltzer.net
ekstromab.com
titelvasem.quest
monnvoru.com
house-staff.com
autonomousmicro.com
castronovochocolates.com
bulk.house
paylito.com
xn--longevit-6ya.com
indako.store
sabrinamichelejohnson.com
mijaresprensa.com
civicinfluence.com
srmcarehospitals.com
vixflow.com
supermercadocarajas.com
novexappliances.com
nu865ci.com
tremblaycormier.com
irodori-cake.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/228-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
b4e60a56123b44dcab2467876068b470b06bf973ea7379df45a2209f2ab88369.exedescription pid process target process PID 3504 set thread context of 228 3504 b4e60a56123b44dcab2467876068b470b06bf973ea7379df45a2209f2ab88369.exe b4e60a56123b44dcab2467876068b470b06bf973ea7379df45a2209f2ab88369.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
b4e60a56123b44dcab2467876068b470b06bf973ea7379df45a2209f2ab88369.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4e60a56123b44dcab2467876068b470b06bf973ea7379df45a2209f2ab88369.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
b4e60a56123b44dcab2467876068b470b06bf973ea7379df45a2209f2ab88369.exepid process 228 b4e60a56123b44dcab2467876068b470b06bf973ea7379df45a2209f2ab88369.exe 228 b4e60a56123b44dcab2467876068b470b06bf973ea7379df45a2209f2ab88369.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
b4e60a56123b44dcab2467876068b470b06bf973ea7379df45a2209f2ab88369.exedescription pid process target process PID 3504 wrote to memory of 228 3504 b4e60a56123b44dcab2467876068b470b06bf973ea7379df45a2209f2ab88369.exe b4e60a56123b44dcab2467876068b470b06bf973ea7379df45a2209f2ab88369.exe PID 3504 wrote to memory of 228 3504 b4e60a56123b44dcab2467876068b470b06bf973ea7379df45a2209f2ab88369.exe b4e60a56123b44dcab2467876068b470b06bf973ea7379df45a2209f2ab88369.exe PID 3504 wrote to memory of 228 3504 b4e60a56123b44dcab2467876068b470b06bf973ea7379df45a2209f2ab88369.exe b4e60a56123b44dcab2467876068b470b06bf973ea7379df45a2209f2ab88369.exe PID 3504 wrote to memory of 228 3504 b4e60a56123b44dcab2467876068b470b06bf973ea7379df45a2209f2ab88369.exe b4e60a56123b44dcab2467876068b470b06bf973ea7379df45a2209f2ab88369.exe PID 3504 wrote to memory of 228 3504 b4e60a56123b44dcab2467876068b470b06bf973ea7379df45a2209f2ab88369.exe b4e60a56123b44dcab2467876068b470b06bf973ea7379df45a2209f2ab88369.exe PID 3504 wrote to memory of 228 3504 b4e60a56123b44dcab2467876068b470b06bf973ea7379df45a2209f2ab88369.exe b4e60a56123b44dcab2467876068b470b06bf973ea7379df45a2209f2ab88369.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4e60a56123b44dcab2467876068b470b06bf973ea7379df45a2209f2ab88369.exe"C:\Users\Admin\AppData\Local\Temp\b4e60a56123b44dcab2467876068b470b06bf973ea7379df45a2209f2ab88369.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\b4e60a56123b44dcab2467876068b470b06bf973ea7379df45a2209f2ab88369.exe"C:\Users\Admin\AppData\Local\Temp\b4e60a56123b44dcab2467876068b470b06bf973ea7379df45a2209f2ab88369.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:228
-