Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 22:29
Static task
static1
Behavioral task
behavioral1
Sample
4sMcGGeBVCjd9IZ.exe
Resource
win7-20240903-en
General
-
Target
4sMcGGeBVCjd9IZ.exe
-
Size
766KB
-
MD5
a66b604ab210053291aa9c3a4434d5b9
-
SHA1
6841f037bc909103da8a43857dd05f91ca95cfd3
-
SHA256
7112b5fbfabba6a257da8523a6a1a982272941e48e072d8f8b7de372561dca48
-
SHA512
d95498915818517431e7523f3a10ebb9c4ea35857b7a247d576985195cbefc41c60034d78a1406bec804d5bf1183decfcbebaec67932e05123802cd9671368f3
-
SSDEEP
12288:QmK1ELtN5TE0ZQKLWy4JjbIoWiblbPgQ3WwiUKxwCA2aabp77DsjTIzgyf5A3FsE:DTESCBLxDgLZxi2aaF77Dswgyf5A3FsE
Malware Config
Extracted
xloader
2.5
p89m
wrapapplausechutney.xyz
covidmobiletestingmd.com
convey.gifts
b148tlrfee9evtvorgm5947.com
zmlhtjfls.com
mctrumpthyism.com
lilaixi.store
interstatehardwarenj.com
horakokode.com
42wilsonavenue.com
muskanphysio.com
absoluteuniquecrafts.store
donategame.online
greenlinkengineering.net
pinchanzosloyalty.com
companyintel.network
resumewriterguru.com
oakalleyatcimarron.com
sriyawealthplan.com
mpcollection.online
desclaw.net
amanchugera.com
intellicomeg.com
ejevisual.net
datwayclothing.com
swflgehc.com
arjweb.com
novatel-network.com
pixelmarketings.com
shopmoly.com
royalproxymarketing.com
getgavastore.com
firstborneggs.com
beautyrgv.info
nysshq.com
kainaatkurd.com
dustriaservices.com
eliamhome.com
040skz.xyz
transfer666.online
kjeftsizing.quest
awano-houmon.com
cybermve.online
25mpt.xyz
taicholdingglobal.com
shebreaksvegas.com
194ac.com
camimac.com
pufoil.com
leord.tech
algurgtyres-uae.com
familienstartup.com
932381.com
thebestsmartphones.com
techdotsystems.com
epowersportstechshow.com
ci-ohio.com
worldofman.art
juno-mariage.com
knowhepfoundation.com
fruitdonuts.com
hongshangxx.com
gf58573.com
leecoga.com
xn--reljame-jwa.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/2744-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2744-18-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/832-23-0x0000000000FA0000-0x0000000000FC9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3400 set thread context of 2744 3400 4sMcGGeBVCjd9IZ.exe 93 PID 2744 set thread context of 3436 2744 MSBuild.exe 56 PID 832 set thread context of 3436 832 ipconfig.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4sMcGGeBVCjd9IZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 832 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 3400 4sMcGGeBVCjd9IZ.exe 3400 4sMcGGeBVCjd9IZ.exe 2744 MSBuild.exe 2744 MSBuild.exe 2744 MSBuild.exe 2744 MSBuild.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe 832 ipconfig.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2744 MSBuild.exe 2744 MSBuild.exe 2744 MSBuild.exe 832 ipconfig.exe 832 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3400 4sMcGGeBVCjd9IZ.exe Token: SeDebugPrivilege 2744 MSBuild.exe Token: SeDebugPrivilege 832 ipconfig.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3400 wrote to memory of 1028 3400 4sMcGGeBVCjd9IZ.exe 92 PID 3400 wrote to memory of 1028 3400 4sMcGGeBVCjd9IZ.exe 92 PID 3400 wrote to memory of 1028 3400 4sMcGGeBVCjd9IZ.exe 92 PID 3400 wrote to memory of 2744 3400 4sMcGGeBVCjd9IZ.exe 93 PID 3400 wrote to memory of 2744 3400 4sMcGGeBVCjd9IZ.exe 93 PID 3400 wrote to memory of 2744 3400 4sMcGGeBVCjd9IZ.exe 93 PID 3400 wrote to memory of 2744 3400 4sMcGGeBVCjd9IZ.exe 93 PID 3400 wrote to memory of 2744 3400 4sMcGGeBVCjd9IZ.exe 93 PID 3400 wrote to memory of 2744 3400 4sMcGGeBVCjd9IZ.exe 93 PID 3436 wrote to memory of 832 3436 Explorer.EXE 94 PID 3436 wrote to memory of 832 3436 Explorer.EXE 94 PID 3436 wrote to memory of 832 3436 Explorer.EXE 94 PID 832 wrote to memory of 1916 832 ipconfig.exe 95 PID 832 wrote to memory of 1916 832 ipconfig.exe 95 PID 832 wrote to memory of 1916 832 ipconfig.exe 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\4sMcGGeBVCjd9IZ.exe"C:\Users\Admin\AppData\Local\Temp\4sMcGGeBVCjd9IZ.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:1028
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1916
-
-