Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:14
Static task
static1
Behavioral task
behavioral1
Sample
29dd69cfbede950f9d60f73f37b6ef375ecafce6a76e39f4be04cb5b018b5bfc.exe
Resource
win7-20240903-en
General
-
Target
29dd69cfbede950f9d60f73f37b6ef375ecafce6a76e39f4be04cb5b018b5bfc.exe
-
Size
607KB
-
MD5
5d6ee890a6926afe19c29151a45bb616
-
SHA1
c9d95f0b419c5222016879c7e40cfce8c2d5a751
-
SHA256
29dd69cfbede950f9d60f73f37b6ef375ecafce6a76e39f4be04cb5b018b5bfc
-
SHA512
307dae8b0f5dc8a9f3cbcf9c0a0e0e25d7b3bc25d7c13eab29d0bc3b00db8f6370ddd25c6202673feb95c54e58702f1b7fa84749648b732913993d73f3b33a59
-
SSDEEP
12288:jWYxaM8KuQq/b3FhL30Z/wSt5KECWAhmEq5Em:MjQSb3rLa/9WthmEqu
Malware Config
Extracted
xloader
2.3
cpa3
tabbys.art
az5t2mceh9p88.net
victorloubaque.com
artesublime.life
trends.fan
connectpeople2land.com
seodrift.com
carpetcleaningtexas.com
ibimedia.net
whizkeyopc.xyz
blazedisinfecting.com
high55.com
tunemydatabase.com
adoptidmind.com
evuevobjtwwnajtk.com
sonoranrp.com
modelbyvmj.com
jpsalesouth.site
wsezs.com
sanamostodos.com
ciritsoftware.com
theadulteressden.info
jt-magnets.com
finclip.net
zerkalo-joycasino-site.com
urlaubszentrale.com
dztdjxsb.com
reservadonarmando.com
webcheap.info
aizu-tera.net
mrsclaussmilecampaign.com
budhie.com
ibluedotpanowdbuy.com
ohohrosa.com
sherylpowellrealtor.com
clubays.com
cvbusinesscoach.com
asa-france.com
peeplogs.xyz
secuency.net
hiltonhead.travel
getcoupons4.com
affordweave.guru
thepen-rose.com
niharikafinancials.com
xn--hi5b21z0ea.com
jennybeautydiva.club
sportzmemorabilia.com
reproots.net
resartist.com
mimikis.info
cafepilots.com
waveyposture.com
skstchers.com
51jingbai.com
anyobodynobodypoker.com
bigskyheath.com
jaynebourke.com
3nde.com
foothillvbc.com
ziritusinkei-aoyama-seitai.com
agentequalitas.com
cuxship.com
2193s.com
pigglywigglybr.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2768-18-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2168 set thread context of 2768 2168 29dd69cfbede950f9d60f73f37b6ef375ecafce6a76e39f4be04cb5b018b5bfc.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2112 2768 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29dd69cfbede950f9d60f73f37b6ef375ecafce6a76e39f4be04cb5b018b5bfc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 29dd69cfbede950f9d60f73f37b6ef375ecafce6a76e39f4be04cb5b018b5bfc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2884 schtasks.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2884 2168 29dd69cfbede950f9d60f73f37b6ef375ecafce6a76e39f4be04cb5b018b5bfc.exe 31 PID 2168 wrote to memory of 2884 2168 29dd69cfbede950f9d60f73f37b6ef375ecafce6a76e39f4be04cb5b018b5bfc.exe 31 PID 2168 wrote to memory of 2884 2168 29dd69cfbede950f9d60f73f37b6ef375ecafce6a76e39f4be04cb5b018b5bfc.exe 31 PID 2168 wrote to memory of 2884 2168 29dd69cfbede950f9d60f73f37b6ef375ecafce6a76e39f4be04cb5b018b5bfc.exe 31 PID 2168 wrote to memory of 2768 2168 29dd69cfbede950f9d60f73f37b6ef375ecafce6a76e39f4be04cb5b018b5bfc.exe 32 PID 2168 wrote to memory of 2768 2168 29dd69cfbede950f9d60f73f37b6ef375ecafce6a76e39f4be04cb5b018b5bfc.exe 32 PID 2168 wrote to memory of 2768 2168 29dd69cfbede950f9d60f73f37b6ef375ecafce6a76e39f4be04cb5b018b5bfc.exe 32 PID 2168 wrote to memory of 2768 2168 29dd69cfbede950f9d60f73f37b6ef375ecafce6a76e39f4be04cb5b018b5bfc.exe 32 PID 2168 wrote to memory of 2768 2168 29dd69cfbede950f9d60f73f37b6ef375ecafce6a76e39f4be04cb5b018b5bfc.exe 32 PID 2168 wrote to memory of 2768 2168 29dd69cfbede950f9d60f73f37b6ef375ecafce6a76e39f4be04cb5b018b5bfc.exe 32 PID 2168 wrote to memory of 2768 2168 29dd69cfbede950f9d60f73f37b6ef375ecafce6a76e39f4be04cb5b018b5bfc.exe 32 PID 2768 wrote to memory of 2112 2768 29dd69cfbede950f9d60f73f37b6ef375ecafce6a76e39f4be04cb5b018b5bfc.exe 34 PID 2768 wrote to memory of 2112 2768 29dd69cfbede950f9d60f73f37b6ef375ecafce6a76e39f4be04cb5b018b5bfc.exe 34 PID 2768 wrote to memory of 2112 2768 29dd69cfbede950f9d60f73f37b6ef375ecafce6a76e39f4be04cb5b018b5bfc.exe 34 PID 2768 wrote to memory of 2112 2768 29dd69cfbede950f9d60f73f37b6ef375ecafce6a76e39f4be04cb5b018b5bfc.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\29dd69cfbede950f9d60f73f37b6ef375ecafce6a76e39f4be04cb5b018b5bfc.exe"C:\Users\Admin\AppData\Local\Temp\29dd69cfbede950f9d60f73f37b6ef375ecafce6a76e39f4be04cb5b018b5bfc.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RskdzZmXPGEAWj" /XML "C:\Users\Admin\AppData\Local\Temp\tmp317C.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2884
-
-
C:\Users\Admin\AppData\Local\Temp\29dd69cfbede950f9d60f73f37b6ef375ecafce6a76e39f4be04cb5b018b5bfc.exe"C:\Users\Admin\AppData\Local\Temp\29dd69cfbede950f9d60f73f37b6ef375ecafce6a76e39f4be04cb5b018b5bfc.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 363⤵
- Program crash
PID:2112
-
-