Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:17
Static task
static1
Behavioral task
behavioral1
Sample
1IkqDVJJoOriyUm.exe
Resource
win7-20241010-en
General
-
Target
1IkqDVJJoOriyUm.exe
-
Size
767KB
-
MD5
28c79bcde960ca27c06655939081ee5a
-
SHA1
be93ed67953224fdb1b94ffb07e5f9f475f75eee
-
SHA256
c1651e761e73dbb33854b22a17eacc13a5193d412cc56c5c9310a01270c4d972
-
SHA512
57aaf67ce83cd9dbfdf86a2f651da5d8f3db2dcba56a6fffbb06a19000155bcc0db5b8386388122b517da345c4a1116024af676514d45f8f2543a17397dd8a41
-
SSDEEP
12288:9bGIibLg1mIc7JEYr8mxJ3AXCmdKhaJtMR7bHjIY2hnjwXSPFqge5JOEPpBja:hGIiI1VzmpJwylhaJt0cnjXmHPi
Malware Config
Extracted
xloader
2.3
c8ec
kingmeters.com
thawoman.com
cannabisinseconds.com
3966399.com
grabopolska.online
krystalpacifico.com
quibii.com
wangzhanceshi.online
blog-techtalks.com
refreshlightingcompany.com
justrightmap.net
sewabhartidelhi.com
noharminmasking.com
speedysignin.website
schwabinsttutional.com
carbon2algae.com
pateleprevention.com
techsavypinaki.com
onemindafrica.com
flowerpeony.com
luisitocarrion.online
utradhikari.com
iniyamedia.xyz
carininha.com
xcuseheqahee.com
osterwalder.swiss
brmteam.com
listotwarty.net
clearbraceshonoluluhi.com
healthsaha.com
urbanwealthbuilder.com
tougherthanhell.com
agouraahas.com
autotextmoney.com
ronfooproperty.com
roughntumbleadventures.com
coreelz.xyz
awakeandriseministry.com
ravexim3.com
gthai999.com
xn--uds17hya4f549f40d.net
diesel-diagnostics.com
wizponja.com
spiritcology.com
cqaddn.com
aqualogia.paris
bbscorpionrepel.com
namlongwaterpoint.com
tibetdy.com
mrgranparaiso.com
cands-services.com
grainedas.com
hsyl961.com
darylandyani.com
healthyremoteworking.com
zz3ddy.com
candocharters.com
peacemyanmar.com
auto-recruiting.net
millennialmediainc.com
fleetrepsusa.com
arneeverts.com
disorder-symptoms.com
militarychamberofcommerce.com
pourheloise.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/1944-13-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/1944-18-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/2628-23-0x0000000000150000-0x0000000000178000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3564 set thread context of 1944 3564 1IkqDVJJoOriyUm.exe 99 PID 1944 set thread context of 3484 1944 1IkqDVJJoOriyUm.exe 56 PID 2628 set thread context of 3484 2628 cscript.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1IkqDVJJoOriyUm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 1944 1IkqDVJJoOriyUm.exe 1944 1IkqDVJJoOriyUm.exe 1944 1IkqDVJJoOriyUm.exe 1944 1IkqDVJJoOriyUm.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe 2628 cscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1944 1IkqDVJJoOriyUm.exe 1944 1IkqDVJJoOriyUm.exe 1944 1IkqDVJJoOriyUm.exe 2628 cscript.exe 2628 cscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1944 1IkqDVJJoOriyUm.exe Token: SeDebugPrivilege 2628 cscript.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3564 wrote to memory of 1944 3564 1IkqDVJJoOriyUm.exe 99 PID 3564 wrote to memory of 1944 3564 1IkqDVJJoOriyUm.exe 99 PID 3564 wrote to memory of 1944 3564 1IkqDVJJoOriyUm.exe 99 PID 3564 wrote to memory of 1944 3564 1IkqDVJJoOriyUm.exe 99 PID 3564 wrote to memory of 1944 3564 1IkqDVJJoOriyUm.exe 99 PID 3564 wrote to memory of 1944 3564 1IkqDVJJoOriyUm.exe 99 PID 3484 wrote to memory of 2628 3484 Explorer.EXE 100 PID 3484 wrote to memory of 2628 3484 Explorer.EXE 100 PID 3484 wrote to memory of 2628 3484 Explorer.EXE 100 PID 2628 wrote to memory of 3628 2628 cscript.exe 101 PID 2628 wrote to memory of 3628 2628 cscript.exe 101 PID 2628 wrote to memory of 3628 2628 cscript.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\1IkqDVJJoOriyUm.exe"C:\Users\Admin\AppData\Local\Temp\1IkqDVJJoOriyUm.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\1IkqDVJJoOriyUm.exe"C:\Users\Admin\AppData\Local\Temp\1IkqDVJJoOriyUm.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\1IkqDVJJoOriyUm.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3628
-
-