Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:18
Static task
static1
Behavioral task
behavioral1
Sample
e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nbjkg.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nbjkg.dll
Resource
win10v2004-20241007-en
General
-
Target
e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe
-
Size
369KB
-
MD5
e4e56f7fefe037591b5115092d6ee990
-
SHA1
b8d25f0e321c32e22af6df64d513c1d88e9f592c
-
SHA256
e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862
-
SHA512
c90369ee2284a101d964a850bca76f18608eed6c74c6f38f4e457006a227b9b504e22ebdddaed267e69293d98fe1e2d7c9f2e18fc213b1aeeb55243a4295dd02
-
SSDEEP
6144:c8LxBD6v9qhYrE2Z3igLitp6ULh4UG+y63WzaHV4KTL6UK46cbpJ2qbglQA:XYrP3X0p6yGB6Gza4KTj6Up5bglH
Malware Config
Extracted
xloader
2.5
dhua
ketostar.club
icanmakeyoufamous.com
claimygdejection.com
garlicinterestedparent.xyz
bits-clicks.com
030atk.xyz
ballwiegand.com
logs-illumidesk.com
785686.com
flnewsfeed.com
transporteshrj.net
agenciamundodigital.online
bowersllc.com
urchncenw.com
wuauwuaumx.com
littlesportsacademy.com
xn--m3chb3ax0abdta3fwhk.com
prmarketings.com
jiaozhanlianmeng.com
whenisthestore.space
ventureagora.net
ditrixmed.store
gitlab-tamskillpage.com
samgravikasnidhi.com
lenti4you.com
reviewallstarscommerce.com
nissimarble.com
md2px.xyz
tristarelectronics.net
you11.net
vaccinationfraud.xyz
bu3helo.com
marcellcheckpoint.com
hassinkandroos.com
socw.quest
screenedscooptoknow-today.info
aciburada.com
edimacare.com
smokenation.net
elga-groupinc.com
26dgj.xyz
chandleenews.com
sugarcanemultisport.com
nichellejonesrealtor.com
architektschnur.com
atehgroup.com
ocoeeboys.com
zanesells.com
878971.com
infringement-notice.com
orzame.com
darlindough.com
bwpassionenterprise.com
switchress.com
willcowblog.online
rsyncpalace.com
ayderstudio.com
ascotintrenational.com
omeducationhelp.com
kimberleydawnwallace.com
thereisnooneway.com
marketobserve.com
sildenafilnrx.com
willowbaldwin.com
segurosramosroman.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2512-9-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Loads dropped DLL 1 IoCs
pid Process 1268 e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1268 set thread context of 2512 1268 e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2512 e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1268 wrote to memory of 2512 1268 e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe 31 PID 1268 wrote to memory of 2512 1268 e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe 31 PID 1268 wrote to memory of 2512 1268 e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe 31 PID 1268 wrote to memory of 2512 1268 e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe 31 PID 1268 wrote to memory of 2512 1268 e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe 31 PID 1268 wrote to memory of 2512 1268 e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe 31 PID 1268 wrote to memory of 2512 1268 e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe"C:\Users\Admin\AppData\Local\Temp\e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe"C:\Users\Admin\AppData\Local\Temp\e881ca5d0fedf03389648c542b240467572cb0c1ffae147d30c0e2d521f53862.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD5ff488c7d8f8f03c34e67a7ac3ebeaafe
SHA1bbc4aacac09047d12f6ea5b54a24255e9389ba0e
SHA256b6f7a133237e590893ca7e6aceb76d96c8bfff8c767dcd4db53a57b366366dfa
SHA5129955013d4f601507ab35453a5b38063cadd2f75946ed998169d7fc42fe133deed31a0927693c8f131161df5281e0a2499b2b37359f7662b3e948c2cf407e11f1