Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:17
Static task
static1
Behavioral task
behavioral1
Sample
d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe
Resource
win7-20240903-en
General
-
Target
d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe
-
Size
495KB
-
MD5
63e399da64bb8241bead7bb544e4adfd
-
SHA1
fae9215acf6375e84629cfa374dc2fcddac0f965
-
SHA256
d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5
-
SHA512
2fb848f8e159e3c86d70008077e3717a594c79375c4fa652d7143685a33fda52236b9a8efff2a31e9e56c5e92a1feb5c66f8fbf0769d3296f501d3c250bc9270
-
SSDEEP
6144:C1qQRi7b6btLfjFnw70QSqdkVNIEwRcJN/dON6HegePEEo+M4/B:2qQRdrjJw70QYIEwANVm/sERMa
Malware Config
Extracted
xloader
2.5
cda8
ajiwechouf.com
chesterkturner.store
tanxiaoyouhongru.space
indiacbc.com
coricanteen.com
supports-teams.com
triandreas.com
fyonkaly.com
m-bald-lab.com
frankserranolaw.com
testedeployheroku.club
wasildelivery.com
stonebyparamount.com
mehmetmercan.com
digitalmarketingyou.com
luxuryrelocationrentals.com
xn--e1aqdnq.store
scw-group.com
onelovemarketingsolution.com
diygardenlife.com
tabandehcard.com
websitesetupwiz.com
topay.biz
ktnfilm.xyz
piedsdetable.com
kevyinroland.quest
rosenkostenextra.com
cryptocoin-medics.com
overlandrealtors.com
fairydealparent.com
elitsa.one
wrdomens.com
parrottforjudge.com
thebersanpost.com
kokcoin.store
sellfrate.store
strijp.xyz
urbanravenllc.com
mmupvarejo.com
unquarreling.com
villa-hummingbird.com
alltart.com
ksyfgw9.com
aquiline.info
mmeltzer.net
ekstromab.com
titelvasem.quest
monnvoru.com
house-staff.com
autonomousmicro.com
castronovochocolates.com
bulk.house
paylito.com
xn--longevit-6ya.com
indako.store
sabrinamichelejohnson.com
mijaresprensa.com
civicinfluence.com
srmcarehospitals.com
vixflow.com
supermercadocarajas.com
novexappliances.com
nu865ci.com
tremblaycormier.com
irodori-cake.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2736-10-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2688 set thread context of 2736 2688 d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe 34 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2688 d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe 2688 d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe 2688 d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe 2688 d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe 2688 d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe 2688 d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe 2736 d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2688 d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2964 2688 d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe 31 PID 2688 wrote to memory of 2964 2688 d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe 31 PID 2688 wrote to memory of 2964 2688 d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe 31 PID 2688 wrote to memory of 2964 2688 d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe 31 PID 2688 wrote to memory of 2764 2688 d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe 32 PID 2688 wrote to memory of 2764 2688 d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe 32 PID 2688 wrote to memory of 2764 2688 d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe 32 PID 2688 wrote to memory of 2764 2688 d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe 32 PID 2688 wrote to memory of 2740 2688 d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe 33 PID 2688 wrote to memory of 2740 2688 d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe 33 PID 2688 wrote to memory of 2740 2688 d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe 33 PID 2688 wrote to memory of 2740 2688 d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe 33 PID 2688 wrote to memory of 2736 2688 d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe 34 PID 2688 wrote to memory of 2736 2688 d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe 34 PID 2688 wrote to memory of 2736 2688 d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe 34 PID 2688 wrote to memory of 2736 2688 d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe 34 PID 2688 wrote to memory of 2736 2688 d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe 34 PID 2688 wrote to memory of 2736 2688 d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe 34 PID 2688 wrote to memory of 2736 2688 d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe"C:\Users\Admin\AppData\Local\Temp\d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe"C:\Users\Admin\AppData\Local\Temp\d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe"2⤵PID:2964
-
-
C:\Users\Admin\AppData\Local\Temp\d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe"C:\Users\Admin\AppData\Local\Temp\d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe"2⤵PID:2764
-
-
C:\Users\Admin\AppData\Local\Temp\d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe"C:\Users\Admin\AppData\Local\Temp\d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe"2⤵PID:2740
-
-
C:\Users\Admin\AppData\Local\Temp\d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe"C:\Users\Admin\AppData\Local\Temp\d86cf31f07e444277514916de369cb6b80e1a405a1ced387d04c1431b94461f5.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2736
-