Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:16
Behavioral task
behavioral1
Sample
b.exe
Resource
win7-20241023-en
General
-
Target
b.exe
-
Size
164KB
-
MD5
abcf9c4951969838d5f6ba1c366628f2
-
SHA1
ed7503276c7ffbab2caa4ee5162e9bbda42fa921
-
SHA256
3a273798af77eead6eb9269b272f25c99a26ca3f6c7e38567249f66484f6edec
-
SHA512
073cbafd67ca5399e32b52cd2bc4b91161799b955d96f53d1549c113e578f6be7464a30b5f9c649db47045d8e0b19cafde150c1d3f7b4b84529016147b3e2572
-
SSDEEP
3072:MpW/wWQ5EkDbwmSuoUufCzPwcldRhJYPe+rrWbKpDhwi9F4bb:tTHduoD8IcldR8W+rrjp9D9F4b
Malware Config
Extracted
xloader
2.5
u8cq
ardentb.com
kaeltefath.com
galataegitimkurumlari.net
rap8b55d.com
zn9998.com
alvinceremiaam.xyz
whitecorp.net
plandout.com
craftscora.com
katx.info
ruleship.com
qinuxdrone4k.com
vtprealtor.com
serviciomovistar.online
amazon939.com
gm8898.com
housesyrron.com
impqtantaou.com
linksmarttech.net
tubbipets.com
chuangfu5188.com
1kyx3.com
hawkmart.xyz
persianclassic.com
superhuemn.com
ausawarenesscodeday.com
adayapsu.com
mutagenicity.net
theperfecttrainer.com
1053548.com
pixbycla.com
108manga.com
kastore.club
onlinerhost.com
satsess.com
woo02.com
eastafricaschools.com
service-web-j-p.com
dchlandscapingco.com
magdawithoutborders.com
pentest.ink
insta-spect.com
unapologeticlyme.net
afamilytree.net
braincoolingpillow.xyz
6551arlington.com
patriotlogisticsjobs.com
sunswood.club
orchidthaija.com
therm-coil-mfg-co.xyz
isabeaumoon.com
dot.foundation
amprope.com
silkeys.info
recwings.com
nops.rest
receiptsloepc.xyz
thewanderinglatina.com
ncgf50.xyz
ecoddr.net
sersaudavelsempre.online
illuminatelocal.com
nzhzygba.com
gamesoftempire.com
3lettercode.com
Signatures
-
Xloader family
-
Xloader payload 2 IoCs
resource yara_rule behavioral1/memory/2320-2-0x0000000000E70000-0x0000000000E99000-memory.dmp xloader behavioral1/memory/2320-6-0x0000000000E70000-0x0000000000E99000-memory.dmp xloader -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2320 set thread context of 1184 2320 b.exe 21 PID 2320 set thread context of 1184 2320 b.exe 21 -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2320 b.exe 2320 b.exe 2320 b.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2320 b.exe 2320 b.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2320 b.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\b.exe"C:\Users\Admin\AppData\Local\Temp\b.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2320
-