Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:17
Static task
static1
Behavioral task
behavioral1
Sample
4e7c66e1c2f9dae5fdf45d434a77175c7bbacb110f60a4a2a4b29a1dc6625d25.exe
Resource
win7-20240708-en
General
-
Target
4e7c66e1c2f9dae5fdf45d434a77175c7bbacb110f60a4a2a4b29a1dc6625d25.exe
-
Size
688KB
-
MD5
4c969dd62718394edafdc9d8d395a7e7
-
SHA1
10e3bad2db00ff95eb312d6d3bdd7d9f6e0dbfb7
-
SHA256
4e7c66e1c2f9dae5fdf45d434a77175c7bbacb110f60a4a2a4b29a1dc6625d25
-
SHA512
5bee7349a174f710c00b347843358cfb6110c7169e47ba772bd3b0b4ae34076a7a0924febce4c303924d903dffec8e5987556298cb19e2d56e5bd792b72b2aec
-
SSDEEP
12288:Ge0WDJvB4mouTniJRVtJPplA1d635HWU/bNVtv0o+lIWgjjbEf/UWwGCS7IDKUVD:GebZAuT3gjjbEf/UWwGCtDBV68
Malware Config
Extracted
xloader
2.5
m3ci
424964.com
ocean-breath-retreat.com
icidedansdehors.art
wrochtthurl.quest
6455gfg.top
dgfipmailservice.online
banjofarmenica.com
dkcazin.com
jobs-fp.com
karens-kornerr.com
parmaesq.com
nuevochile.net
inputsquad.com
consultacedula-sep.digital
taogoubao.net
gimmesolar.com
bluelacedefense.com
grandagent.club
warqatalzawaj.com
getvirbelanow.com
omnifichub.com
rjtherealest.com
hqpzchmo.xyz
pearl-street-art.com
dudukrumah.com
resetmybutton.info
dinodao.xyz
payment-securecard.com
gorjessbyjessicaservice.website
edayispeove.com
glorian34.com
moviezwaphd.red
bxqiche.com
associate-cien.com
coparivan.quest
buyseneca.com
del-directory.xyz
thedarkhuntressexperience.com
trevaleaf.com
kwsi.online
2552111.com
highpacts.com
queenslandspirits.com
magazinhaberlerim.com
radialodge.com
packgames.store
sterre.one
tkspoboys.com
datashen.com
xn--4gqyn781iuoq.xyz
breadnbutterflies.com
intotheground.net
tenlog043.xyz
bendingwillowbirth.com
lavellwesley.com
aumpatho.com
fdklflkdioerklfdke.store
nxscrapbook.com
dan-is-a-ghey-retard.com
retailzoohub.com
pause-beautystore.com
accentpavementmaintenance.com
brittsballers.com
indev-mobility.info
bravobug.net
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/3924-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3924-17-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2132-23-0x0000000000960000-0x0000000000989000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4904 set thread context of 3924 4904 4e7c66e1c2f9dae5fdf45d434a77175c7bbacb110f60a4a2a4b29a1dc6625d25.exe 97 PID 3924 set thread context of 3488 3924 RegSvcs.exe 56 PID 2132 set thread context of 3488 2132 explorer.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e7c66e1c2f9dae5fdf45d434a77175c7bbacb110f60a4a2a4b29a1dc6625d25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 3924 RegSvcs.exe 3924 RegSvcs.exe 3924 RegSvcs.exe 3924 RegSvcs.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe 2132 explorer.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3924 RegSvcs.exe 3924 RegSvcs.exe 3924 RegSvcs.exe 2132 explorer.exe 2132 explorer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4904 4e7c66e1c2f9dae5fdf45d434a77175c7bbacb110f60a4a2a4b29a1dc6625d25.exe Token: SeDebugPrivilege 3924 RegSvcs.exe Token: SeDebugPrivilege 2132 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4904 wrote to memory of 3924 4904 4e7c66e1c2f9dae5fdf45d434a77175c7bbacb110f60a4a2a4b29a1dc6625d25.exe 97 PID 4904 wrote to memory of 3924 4904 4e7c66e1c2f9dae5fdf45d434a77175c7bbacb110f60a4a2a4b29a1dc6625d25.exe 97 PID 4904 wrote to memory of 3924 4904 4e7c66e1c2f9dae5fdf45d434a77175c7bbacb110f60a4a2a4b29a1dc6625d25.exe 97 PID 4904 wrote to memory of 3924 4904 4e7c66e1c2f9dae5fdf45d434a77175c7bbacb110f60a4a2a4b29a1dc6625d25.exe 97 PID 4904 wrote to memory of 3924 4904 4e7c66e1c2f9dae5fdf45d434a77175c7bbacb110f60a4a2a4b29a1dc6625d25.exe 97 PID 4904 wrote to memory of 3924 4904 4e7c66e1c2f9dae5fdf45d434a77175c7bbacb110f60a4a2a4b29a1dc6625d25.exe 97 PID 3488 wrote to memory of 2132 3488 Explorer.EXE 98 PID 3488 wrote to memory of 2132 3488 Explorer.EXE 98 PID 3488 wrote to memory of 2132 3488 Explorer.EXE 98 PID 2132 wrote to memory of 4588 2132 explorer.exe 101 PID 2132 wrote to memory of 4588 2132 explorer.exe 101 PID 2132 wrote to memory of 4588 2132 explorer.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\4e7c66e1c2f9dae5fdf45d434a77175c7bbacb110f60a4a2a4b29a1dc6625d25.exe"C:\Users\Admin\AppData\Local\Temp\4e7c66e1c2f9dae5fdf45d434a77175c7bbacb110f60a4a2a4b29a1dc6625d25.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3924
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4588
-
-