Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:17
Static task
static1
Behavioral task
behavioral1
Sample
72dc174480feca1dcb4e4f3bd6810dc141d51262329b6529ca405537b9273c28.exe
Resource
win7-20240903-en
General
-
Target
72dc174480feca1dcb4e4f3bd6810dc141d51262329b6529ca405537b9273c28.exe
-
Size
812KB
-
MD5
7aa2115149b7facfb16e18b081c7e0f8
-
SHA1
085f3b76e733f557966031cce2459f7290136cf3
-
SHA256
72dc174480feca1dcb4e4f3bd6810dc141d51262329b6529ca405537b9273c28
-
SHA512
29e7480a30b1aee1bfef82955312aeaee65903371b391ea3ac3f85fce4e2ac5da6385b4c7c88853d374ed4c7183b65c829e9c21e1afbe503f1cf239c4c17a36d
-
SSDEEP
24576:+memCwOrJpz+oGTbOEVbpfY4tUtvNRIQsfp:0Xf62vPsB
Malware Config
Extracted
xloader
2.5
m46a
conventionline.com
ukrules.online
rhubarbsloheu.xyz
csliangzhi.com
extentionbyyegane.com
snikido.com
holidaycheck.cloud
docomoaz.xyz
torrentinfo.online
arabianelnuyg.top
integrations-304vjp.xyz
newbalanceclearance.xyz
riqnahbww-tui.net
fendoremi.com
oneportalmegastore.online
onlyconference.com
cannabisbeertoken.com
assetto.digital
kathcorp.com
7075aluminyum.com
jtselec.com
tylerclarkjre.com
lonisvingtoyof2.xyz
leisya.space
thoughtsinmytwenties.com
westcoastmarinellc.com
katerenae.com
cefb.xyz
grosors.com
ernestosepo.com
csuitebackoffice.com
ecumickem.quest
vatspa.info
austinlandsforsale.com
hooyotech.com
steakshack.company
inlanddistributing.com
saudaveleternamente.online
simonhadingphotography.com
tamyoz-almousa.com
osendata.com
nikitastepurov.xyz
serhatsahinmimarlik.com
somejrise.store
talklegaldocs.com
nftfaucet.club
celebrationrelaxation.com
spreadflair.com
mollyagee.com
texitnews.com
online-security.support
jaxdieselrepair.com
fluffypetco.com
tsoharformations.com
flotents.com
watergentw.com
bisexualtv.com
studiohdesignsllc.com
viopartner.com
pianowithrobert.com
newszmint.com
6261763.win
chevesfernando.com
changguoyun.com
haoli360.com
Signatures
-
Xloader family
-
Xloader payload 2 IoCs
resource yara_rule behavioral1/memory/2780-14-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2780-17-0x0000000000700000-0x0000000000A03000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2324 set thread context of 2780 2324 72dc174480feca1dcb4e4f3bd6810dc141d51262329b6529ca405537b9273c28.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 72dc174480feca1dcb4e4f3bd6810dc141d51262329b6529ca405537b9273c28.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2780 72dc174480feca1dcb4e4f3bd6810dc141d51262329b6529ca405537b9273c28.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2780 2324 72dc174480feca1dcb4e4f3bd6810dc141d51262329b6529ca405537b9273c28.exe 31 PID 2324 wrote to memory of 2780 2324 72dc174480feca1dcb4e4f3bd6810dc141d51262329b6529ca405537b9273c28.exe 31 PID 2324 wrote to memory of 2780 2324 72dc174480feca1dcb4e4f3bd6810dc141d51262329b6529ca405537b9273c28.exe 31 PID 2324 wrote to memory of 2780 2324 72dc174480feca1dcb4e4f3bd6810dc141d51262329b6529ca405537b9273c28.exe 31 PID 2324 wrote to memory of 2780 2324 72dc174480feca1dcb4e4f3bd6810dc141d51262329b6529ca405537b9273c28.exe 31 PID 2324 wrote to memory of 2780 2324 72dc174480feca1dcb4e4f3bd6810dc141d51262329b6529ca405537b9273c28.exe 31 PID 2324 wrote to memory of 2780 2324 72dc174480feca1dcb4e4f3bd6810dc141d51262329b6529ca405537b9273c28.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\72dc174480feca1dcb4e4f3bd6810dc141d51262329b6529ca405537b9273c28.exe"C:\Users\Admin\AppData\Local\Temp\72dc174480feca1dcb4e4f3bd6810dc141d51262329b6529ca405537b9273c28.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\72dc174480feca1dcb4e4f3bd6810dc141d51262329b6529ca405537b9273c28.exe"C:\Users\Admin\AppData\Local\Temp\72dc174480feca1dcb4e4f3bd6810dc141d51262329b6529ca405537b9273c28.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2780
-