Analysis
-
max time kernel
146s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 22:29
Static task
static1
Behavioral task
behavioral1
Sample
4sMcGGeBVCjd9IZ.exe
Resource
win7-20240903-en
General
-
Target
4sMcGGeBVCjd9IZ.exe
-
Size
766KB
-
MD5
a66b604ab210053291aa9c3a4434d5b9
-
SHA1
6841f037bc909103da8a43857dd05f91ca95cfd3
-
SHA256
7112b5fbfabba6a257da8523a6a1a982272941e48e072d8f8b7de372561dca48
-
SHA512
d95498915818517431e7523f3a10ebb9c4ea35857b7a247d576985195cbefc41c60034d78a1406bec804d5bf1183decfcbebaec67932e05123802cd9671368f3
-
SSDEEP
12288:QmK1ELtN5TE0ZQKLWy4JjbIoWiblbPgQ3WwiUKxwCA2aabp77DsjTIzgyf5A3FsE:DTESCBLxDgLZxi2aaF77Dswgyf5A3FsE
Malware Config
Extracted
xloader
2.5
p89m
wrapapplausechutney.xyz
covidmobiletestingmd.com
convey.gifts
b148tlrfee9evtvorgm5947.com
zmlhtjfls.com
mctrumpthyism.com
lilaixi.store
interstatehardwarenj.com
horakokode.com
42wilsonavenue.com
muskanphysio.com
absoluteuniquecrafts.store
donategame.online
greenlinkengineering.net
pinchanzosloyalty.com
companyintel.network
resumewriterguru.com
oakalleyatcimarron.com
sriyawealthplan.com
mpcollection.online
desclaw.net
amanchugera.com
intellicomeg.com
ejevisual.net
datwayclothing.com
swflgehc.com
arjweb.com
novatel-network.com
pixelmarketings.com
shopmoly.com
royalproxymarketing.com
getgavastore.com
firstborneggs.com
beautyrgv.info
nysshq.com
kainaatkurd.com
dustriaservices.com
eliamhome.com
040skz.xyz
transfer666.online
kjeftsizing.quest
awano-houmon.com
cybermve.online
25mpt.xyz
taicholdingglobal.com
shebreaksvegas.com
194ac.com
camimac.com
pufoil.com
leord.tech
algurgtyres-uae.com
familienstartup.com
932381.com
thebestsmartphones.com
techdotsystems.com
epowersportstechshow.com
ci-ohio.com
worldofman.art
juno-mariage.com
knowhepfoundation.com
fruitdonuts.com
hongshangxx.com
gf58573.com
leecoga.com
xn--reljame-jwa.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2708-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2708-17-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2564-22-0x00000000000C0000-0x00000000000E9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2208 set thread context of 2708 2208 4sMcGGeBVCjd9IZ.exe 31 PID 2708 set thread context of 1268 2708 MSBuild.exe 21 PID 2564 set thread context of 1268 2564 chkdsk.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4sMcGGeBVCjd9IZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chkdsk.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2708 MSBuild.exe 2708 MSBuild.exe 2564 chkdsk.exe 2564 chkdsk.exe 2564 chkdsk.exe 2564 chkdsk.exe 2564 chkdsk.exe 2564 chkdsk.exe 2564 chkdsk.exe 2564 chkdsk.exe 2564 chkdsk.exe 2564 chkdsk.exe 2564 chkdsk.exe 2564 chkdsk.exe 2564 chkdsk.exe 2564 chkdsk.exe 2564 chkdsk.exe 2564 chkdsk.exe 2564 chkdsk.exe 2564 chkdsk.exe 2564 chkdsk.exe 2564 chkdsk.exe 2564 chkdsk.exe 2564 chkdsk.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2708 MSBuild.exe 2708 MSBuild.exe 2708 MSBuild.exe 2564 chkdsk.exe 2564 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2208 4sMcGGeBVCjd9IZ.exe Token: SeDebugPrivilege 2708 MSBuild.exe Token: SeDebugPrivilege 2564 chkdsk.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2708 2208 4sMcGGeBVCjd9IZ.exe 31 PID 2208 wrote to memory of 2708 2208 4sMcGGeBVCjd9IZ.exe 31 PID 2208 wrote to memory of 2708 2208 4sMcGGeBVCjd9IZ.exe 31 PID 2208 wrote to memory of 2708 2208 4sMcGGeBVCjd9IZ.exe 31 PID 2208 wrote to memory of 2708 2208 4sMcGGeBVCjd9IZ.exe 31 PID 2208 wrote to memory of 2708 2208 4sMcGGeBVCjd9IZ.exe 31 PID 2208 wrote to memory of 2708 2208 4sMcGGeBVCjd9IZ.exe 31 PID 1268 wrote to memory of 2564 1268 Explorer.EXE 32 PID 1268 wrote to memory of 2564 1268 Explorer.EXE 32 PID 1268 wrote to memory of 2564 1268 Explorer.EXE 32 PID 1268 wrote to memory of 2564 1268 Explorer.EXE 32 PID 2564 wrote to memory of 2808 2564 chkdsk.exe 33 PID 2564 wrote to memory of 2808 2564 chkdsk.exe 33 PID 2564 wrote to memory of 2808 2564 chkdsk.exe 33 PID 2564 wrote to memory of 2808 2564 chkdsk.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\4sMcGGeBVCjd9IZ.exe"C:\Users\Admin\AppData\Local\Temp\4sMcGGeBVCjd9IZ.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2708
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2808
-
-