Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:16
Behavioral task
behavioral1
Sample
b.exe
Resource
win7-20241023-en
General
-
Target
b.exe
-
Size
164KB
-
MD5
abcf9c4951969838d5f6ba1c366628f2
-
SHA1
ed7503276c7ffbab2caa4ee5162e9bbda42fa921
-
SHA256
3a273798af77eead6eb9269b272f25c99a26ca3f6c7e38567249f66484f6edec
-
SHA512
073cbafd67ca5399e32b52cd2bc4b91161799b955d96f53d1549c113e578f6be7464a30b5f9c649db47045d8e0b19cafde150c1d3f7b4b84529016147b3e2572
-
SSDEEP
3072:MpW/wWQ5EkDbwmSuoUufCzPwcldRhJYPe+rrWbKpDhwi9F4bb:tTHduoD8IcldR8W+rrjp9D9F4b
Malware Config
Extracted
xloader
2.5
u8cq
ardentb.com
kaeltefath.com
galataegitimkurumlari.net
rap8b55d.com
zn9998.com
alvinceremiaam.xyz
whitecorp.net
plandout.com
craftscora.com
katx.info
ruleship.com
qinuxdrone4k.com
vtprealtor.com
serviciomovistar.online
amazon939.com
gm8898.com
housesyrron.com
impqtantaou.com
linksmarttech.net
tubbipets.com
chuangfu5188.com
1kyx3.com
hawkmart.xyz
persianclassic.com
superhuemn.com
ausawarenesscodeday.com
adayapsu.com
mutagenicity.net
theperfecttrainer.com
1053548.com
pixbycla.com
108manga.com
kastore.club
onlinerhost.com
satsess.com
woo02.com
eastafricaschools.com
service-web-j-p.com
dchlandscapingco.com
magdawithoutborders.com
pentest.ink
insta-spect.com
unapologeticlyme.net
afamilytree.net
braincoolingpillow.xyz
6551arlington.com
patriotlogisticsjobs.com
sunswood.club
orchidthaija.com
therm-coil-mfg-co.xyz
isabeaumoon.com
dot.foundation
amprope.com
silkeys.info
recwings.com
nops.rest
receiptsloepc.xyz
thewanderinglatina.com
ncgf50.xyz
ecoddr.net
sersaudavelsempre.online
illuminatelocal.com
nzhzygba.com
gamesoftempire.com
3lettercode.com
Signatures
-
Xloader family
-
Xloader payload 2 IoCs
resource yara_rule behavioral2/memory/4944-2-0x00000000001D0000-0x00000000001F9000-memory.dmp xloader behavioral2/memory/4056-7-0x0000000000C80000-0x0000000000CA9000-memory.dmp xloader -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4944 set thread context of 3568 4944 b.exe 56 PID 4056 set thread context of 3568 4056 wlanext.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlanext.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4944 b.exe 4944 b.exe 4944 b.exe 4944 b.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe 4056 wlanext.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4944 b.exe 4944 b.exe 4944 b.exe 4056 wlanext.exe 4056 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4944 b.exe Token: SeDebugPrivilege 4056 wlanext.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3568 wrote to memory of 4056 3568 Explorer.EXE 83 PID 3568 wrote to memory of 4056 3568 Explorer.EXE 83 PID 3568 wrote to memory of 4056 3568 Explorer.EXE 83 PID 4056 wrote to memory of 3732 4056 wlanext.exe 85 PID 4056 wrote to memory of 3732 4056 wlanext.exe 85 PID 4056 wrote to memory of 3732 4056 wlanext.exe 85
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\b.exe"C:\Users\Admin\AppData\Local\Temp\b.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4944
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\b.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3732
-
-