Analysis
-
max time kernel
100s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:19
Static task
static1
Behavioral task
behavioral1
Sample
4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe
Resource
win7-20240903-en
General
-
Target
4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe
-
Size
1.1MB
-
MD5
3702c5efbf064afe0436e61bc355ca94
-
SHA1
5760a5ed8d7d0b30e1c06530df6c6ef5a44de572
-
SHA256
4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897
-
SHA512
4d7e47565d3c9ceff0ec1ba1e7ae56abf85dec43511d362a4f3625b22729abbed0cbf3a32ba250b18e887535f2686a2026b32122776cf5435efd95396e3023fa
-
SSDEEP
24576:TG4N0uzw3OvrnKuzTBZzPVT8EhMykjeSnqhXx4QbUIx1/3a+t9rGsWapUf99VVx:dN0N3ODrB5dIPykjehxhUIx1/q+tZVkX
Malware Config
Extracted
xloader
2.5
p1nr
daas.contractors
cabanatvs.com
jinlowe.com
onbtwy.space
successportal.net
lodolamacze.info
thesilveralchemist.com
honobono-kobo.com
comouv.com
coyotecastbullets.com
pwotech.com
lakebernardcottages.com
sportsparadise365.com
chuyentrasauvietelonline.club
ncambiental.com
persiantrips.travel
binomo-market.website
girls-ish.com
yuzurin777.com
viaronsport.com
hunttheicedown.net
vagrum.com
sigi.group
crepclinic.com
ducer.info
willysbuildingcenter.com
elegantdeer.com
abishq.club
orcabear.com
thelindleyfamily.com
thewitchandcauldron.com
bitesofwellness.online
studio30floral.com
foliesdulac.com
foodfar.space
bickershawfestival.com
jengilbertsoftballacademy.com
vyrex.club
windowzteam.com
yugongh.info
affiliaterooted.com
derineducation.com
stellcon.net
egurusolution.com
moyue16.com
hexademvba.online
daomining.tech
juscall.online
wakeup-marketing.com
one2life.com
myunitedexpress.com
vinotrentino.info
boneskillet.com
remembermepromos.com
shopkyrobak.com
rotisera.com
41mpt.xyz
foodzy24.com
trianglepost.press
drm-00.com
green-drive.net
kmongpil.com
dannihealth.com
diasporaspices.com
xn--papiro-7ta.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/2276-24-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1696 4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1696 set thread context of 2276 1696 4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1696 4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe 1696 4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe 1696 4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe 1696 4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe 1696 4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe 1696 4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe 1696 4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe 1696 4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe 1696 4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe 1696 4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe 1696 4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe 1696 4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe 2276 4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe 2276 4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1696 wrote to memory of 2276 1696 4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe 99 PID 1696 wrote to memory of 2276 1696 4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe 99 PID 1696 wrote to memory of 2276 1696 4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe 99 PID 1696 wrote to memory of 2276 1696 4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe 99 PID 1696 wrote to memory of 2276 1696 4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe"C:\Users\Admin\AppData\Local\Temp\4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe"C:\Users\Admin\AppData\Local\Temp\4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2276
-