Analysis
-
max time kernel
96s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:17
Static task
static1
Behavioral task
behavioral1
Sample
42aa0f6f52d1280d1b150376031a9c93a319771b478dbcf69c540cabfc7a7336.exe
Resource
win7-20241010-en
General
-
Target
42aa0f6f52d1280d1b150376031a9c93a319771b478dbcf69c540cabfc7a7336.exe
-
Size
624KB
-
MD5
d99953eb7bdc48ba8a60718a99e8b545
-
SHA1
8d1524f9866ef71dd0e95bbaab8ec37d9b5e71cc
-
SHA256
42aa0f6f52d1280d1b150376031a9c93a319771b478dbcf69c540cabfc7a7336
-
SHA512
58ffa96e531bcdbb9b2f29d4a018df2b82a124cde0aa5b40b8e8f584b109ea4c44581c264ef3051fbe0bf3f6ae86645f48d9be1767e8835fee7269cbcb717e90
-
SSDEEP
12288:/JHHgmUCW70uXwFGMxlviBL5p/UgTF3y8pJr9L9mRMu:xngmUJ4ugFBiLp/U+CgJZLkM
Malware Config
Extracted
xloader
2.5
6f3o
mathoussecleaningservices.com
yogirajhousekeeping.com
abigbowlofcorn.com
jasonkerkmans.com
drugbar.biz
ofilmyzillz.agency
453821.com
reginamaiden.com
bearingsloirb.xyz
trc-bilibao.com
yiyo-group.com
johnkhamilton.store
siliconpklfjl.xyz
edimacare.com
littlerebelmanagement.com
mailheld.digital
nexteventtnpasumo5.xyz
arabatalmustahlik.com
423674.com
orwickeu.com
saengseon.com
my-digital-touch.com
sabertoothgym.com
xn--hc0bm0v0zb40ifs0a.com
polypronoun.com
jackchiu.xyz
stagecoachlakehome.com
julien-magicien.com
kuyperconsultingllc.com
anabolenpower.store
uyerdas.info
mntecc.com
michelle-roberson.com
mobilismedical.group
vancouvermoving.biz
anesthetizing.com
4troprofilms.com
nu865ci.com
jcyaccessories.com
wonderbrandperu.com
euroiwaterjet.com
valgtrizoma.quest
tynyseaverheum.com
alsosprachzamolxis.com
hummet.com
runnerstrainingplan.com
hanumantpyro.com
imnntoken.club
myapple3.com
xn--sienteespaa-beb.com
erectnipple.com
hailieco.com
lemondog.net
registelk.com
beukenvink.com
xrqesoxxjzqh.mobi
leme-eu.com
altradesigns.com
aquaculturelighting.net
apsz.net
kingnamsbackup.com
xinglijf.xyz
zclub.space
blkgrlmagc711.com
olangeskineogutu.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/2424-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1696 set thread context of 2424 1696 42aa0f6f52d1280d1b150376031a9c93a319771b478dbcf69c540cabfc7a7336.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42aa0f6f52d1280d1b150376031a9c93a319771b478dbcf69c540cabfc7a7336.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2424 42aa0f6f52d1280d1b150376031a9c93a319771b478dbcf69c540cabfc7a7336.exe 2424 42aa0f6f52d1280d1b150376031a9c93a319771b478dbcf69c540cabfc7a7336.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2424 1696 42aa0f6f52d1280d1b150376031a9c93a319771b478dbcf69c540cabfc7a7336.exe 99 PID 1696 wrote to memory of 2424 1696 42aa0f6f52d1280d1b150376031a9c93a319771b478dbcf69c540cabfc7a7336.exe 99 PID 1696 wrote to memory of 2424 1696 42aa0f6f52d1280d1b150376031a9c93a319771b478dbcf69c540cabfc7a7336.exe 99 PID 1696 wrote to memory of 2424 1696 42aa0f6f52d1280d1b150376031a9c93a319771b478dbcf69c540cabfc7a7336.exe 99 PID 1696 wrote to memory of 2424 1696 42aa0f6f52d1280d1b150376031a9c93a319771b478dbcf69c540cabfc7a7336.exe 99 PID 1696 wrote to memory of 2424 1696 42aa0f6f52d1280d1b150376031a9c93a319771b478dbcf69c540cabfc7a7336.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\42aa0f6f52d1280d1b150376031a9c93a319771b478dbcf69c540cabfc7a7336.exe"C:\Users\Admin\AppData\Local\Temp\42aa0f6f52d1280d1b150376031a9c93a319771b478dbcf69c540cabfc7a7336.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\42aa0f6f52d1280d1b150376031a9c93a319771b478dbcf69c540cabfc7a7336.exe"C:\Users\Admin\AppData\Local\Temp\42aa0f6f52d1280d1b150376031a9c93a319771b478dbcf69c540cabfc7a7336.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2424
-