Analysis
-
max time kernel
146s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:17
Static task
static1
Behavioral task
behavioral1
Sample
1IkqDVJJoOriyUm.exe
Resource
win7-20241010-en
General
-
Target
1IkqDVJJoOriyUm.exe
-
Size
767KB
-
MD5
28c79bcde960ca27c06655939081ee5a
-
SHA1
be93ed67953224fdb1b94ffb07e5f9f475f75eee
-
SHA256
c1651e761e73dbb33854b22a17eacc13a5193d412cc56c5c9310a01270c4d972
-
SHA512
57aaf67ce83cd9dbfdf86a2f651da5d8f3db2dcba56a6fffbb06a19000155bcc0db5b8386388122b517da345c4a1116024af676514d45f8f2543a17397dd8a41
-
SSDEEP
12288:9bGIibLg1mIc7JEYr8mxJ3AXCmdKhaJtMR7bHjIY2hnjwXSPFqge5JOEPpBja:hGIiI1VzmpJwylhaJt0cnjXmHPi
Malware Config
Extracted
xloader
2.3
c8ec
kingmeters.com
thawoman.com
cannabisinseconds.com
3966399.com
grabopolska.online
krystalpacifico.com
quibii.com
wangzhanceshi.online
blog-techtalks.com
refreshlightingcompany.com
justrightmap.net
sewabhartidelhi.com
noharminmasking.com
speedysignin.website
schwabinsttutional.com
carbon2algae.com
pateleprevention.com
techsavypinaki.com
onemindafrica.com
flowerpeony.com
luisitocarrion.online
utradhikari.com
iniyamedia.xyz
carininha.com
xcuseheqahee.com
osterwalder.swiss
brmteam.com
listotwarty.net
clearbraceshonoluluhi.com
healthsaha.com
urbanwealthbuilder.com
tougherthanhell.com
agouraahas.com
autotextmoney.com
ronfooproperty.com
roughntumbleadventures.com
coreelz.xyz
awakeandriseministry.com
ravexim3.com
gthai999.com
xn--uds17hya4f549f40d.net
diesel-diagnostics.com
wizponja.com
spiritcology.com
cqaddn.com
aqualogia.paris
bbscorpionrepel.com
namlongwaterpoint.com
tibetdy.com
mrgranparaiso.com
cands-services.com
grainedas.com
hsyl961.com
darylandyani.com
healthyremoteworking.com
zz3ddy.com
candocharters.com
peacemyanmar.com
auto-recruiting.net
millennialmediainc.com
fleetrepsusa.com
arneeverts.com
disorder-symptoms.com
militarychamberofcommerce.com
pourheloise.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2808-14-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2808-18-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2168-25-0x0000000000080000-0x00000000000A8000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2708 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2356 set thread context of 2808 2356 1IkqDVJJoOriyUm.exe 34 PID 2808 set thread context of 1200 2808 1IkqDVJJoOriyUm.exe 21 PID 2168 set thread context of 1200 2168 wlanext.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1IkqDVJJoOriyUm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlanext.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 2356 1IkqDVJJoOriyUm.exe 2356 1IkqDVJJoOriyUm.exe 2356 1IkqDVJJoOriyUm.exe 2356 1IkqDVJJoOriyUm.exe 2356 1IkqDVJJoOriyUm.exe 2356 1IkqDVJJoOriyUm.exe 2808 1IkqDVJJoOriyUm.exe 2808 1IkqDVJJoOriyUm.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2808 1IkqDVJJoOriyUm.exe 2808 1IkqDVJJoOriyUm.exe 2808 1IkqDVJJoOriyUm.exe 2168 wlanext.exe 2168 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2356 1IkqDVJJoOriyUm.exe Token: SeDebugPrivilege 2808 1IkqDVJJoOriyUm.exe Token: SeDebugPrivilege 2168 wlanext.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2920 2356 1IkqDVJJoOriyUm.exe 31 PID 2356 wrote to memory of 2920 2356 1IkqDVJJoOriyUm.exe 31 PID 2356 wrote to memory of 2920 2356 1IkqDVJJoOriyUm.exe 31 PID 2356 wrote to memory of 2920 2356 1IkqDVJJoOriyUm.exe 31 PID 2356 wrote to memory of 2928 2356 1IkqDVJJoOriyUm.exe 32 PID 2356 wrote to memory of 2928 2356 1IkqDVJJoOriyUm.exe 32 PID 2356 wrote to memory of 2928 2356 1IkqDVJJoOriyUm.exe 32 PID 2356 wrote to memory of 2928 2356 1IkqDVJJoOriyUm.exe 32 PID 2356 wrote to memory of 2904 2356 1IkqDVJJoOriyUm.exe 33 PID 2356 wrote to memory of 2904 2356 1IkqDVJJoOriyUm.exe 33 PID 2356 wrote to memory of 2904 2356 1IkqDVJJoOriyUm.exe 33 PID 2356 wrote to memory of 2904 2356 1IkqDVJJoOriyUm.exe 33 PID 2356 wrote to memory of 2808 2356 1IkqDVJJoOriyUm.exe 34 PID 2356 wrote to memory of 2808 2356 1IkqDVJJoOriyUm.exe 34 PID 2356 wrote to memory of 2808 2356 1IkqDVJJoOriyUm.exe 34 PID 2356 wrote to memory of 2808 2356 1IkqDVJJoOriyUm.exe 34 PID 2356 wrote to memory of 2808 2356 1IkqDVJJoOriyUm.exe 34 PID 2356 wrote to memory of 2808 2356 1IkqDVJJoOriyUm.exe 34 PID 2356 wrote to memory of 2808 2356 1IkqDVJJoOriyUm.exe 34 PID 1200 wrote to memory of 2168 1200 Explorer.EXE 35 PID 1200 wrote to memory of 2168 1200 Explorer.EXE 35 PID 1200 wrote to memory of 2168 1200 Explorer.EXE 35 PID 1200 wrote to memory of 2168 1200 Explorer.EXE 35 PID 2168 wrote to memory of 2708 2168 wlanext.exe 36 PID 2168 wrote to memory of 2708 2168 wlanext.exe 36 PID 2168 wrote to memory of 2708 2168 wlanext.exe 36 PID 2168 wrote to memory of 2708 2168 wlanext.exe 36
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\1IkqDVJJoOriyUm.exe"C:\Users\Admin\AppData\Local\Temp\1IkqDVJJoOriyUm.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\1IkqDVJJoOriyUm.exe"C:\Users\Admin\AppData\Local\Temp\1IkqDVJJoOriyUm.exe"3⤵PID:2920
-
-
C:\Users\Admin\AppData\Local\Temp\1IkqDVJJoOriyUm.exe"C:\Users\Admin\AppData\Local\Temp\1IkqDVJJoOriyUm.exe"3⤵PID:2928
-
-
C:\Users\Admin\AppData\Local\Temp\1IkqDVJJoOriyUm.exe"C:\Users\Admin\AppData\Local\Temp\1IkqDVJJoOriyUm.exe"3⤵PID:2904
-
-
C:\Users\Admin\AppData\Local\Temp\1IkqDVJJoOriyUm.exe"C:\Users\Admin\AppData\Local\Temp\1IkqDVJJoOriyUm.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\1IkqDVJJoOriyUm.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2708
-
-