Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:19
Static task
static1
Behavioral task
behavioral1
Sample
BG V.085(07)-REVISED DRAFT BL.exe
Resource
win7-20240729-en
General
-
Target
BG V.085(07)-REVISED DRAFT BL.exe
-
Size
773KB
-
MD5
b3ee3a00329eb1a0e1ef3cd71f952747
-
SHA1
2d5eff3955d2ded49ede5b526c9bd0e2a1afcf19
-
SHA256
b95718e6a008dc7f10900054853e7347c62f38463edcd17c9527c2d491ee7721
-
SHA512
35e11cb2ca02c0a2f20fde84c59afd67ec6993462316c4d54212a2f1a52dcf1109e1a1d166c71fded3bfb63c3adf521f1b93c9fcb7cea658826bcda26bf56313
-
SSDEEP
12288:7HGfIuwOEVGkSj5kG9oIZOFVsE9oINa6cy5IjTJWjUoOxQUzfiU16MHsS1P/oDel:z5uwOe0P9oI0KW/NariABGGDMSuH6
Malware Config
Extracted
xloader
2.5
ge32
purduegreeks.com
votehaddockformayor.com
sdacademy.net
boston-ninpo.com
algaeagora.com
myntlaccount.online
xn--eckwa3d3b3a2j.xyz
iytvdt.com
ibrnbw.com
outnoble.online
atmosferas.net
sathapornstainlesssteel.com
pantaneirajeans.online
classyeventsco.com
classyhousemarket.com
onlinemarketingvancouver.com
multi-familycompany.com
dirttinc.com
frilance.club
cpw883.com
riley-rieth.net
foxy.media
butterflyrealtyga.com
thetacktrunk2.xyz
ksuyearofgreece.com
bullyingpreventionnow.com
mecasso.store
smartlifeblockchain.net
lowriskcoin20.com
unasolucioendesa.com
furtherthancapital.com
fewland.club
ubspropertymanage.com
siliancecapital.com
alternativeforpalmoil.com
digitaleconomy.pro
siam-mexico.com
eur48.com
arstic.com
optimuszorgtwente.online
550shelberta.com
collegedictionary.net
lingkarlengan.com
news24aawaz.com
sanmi113.com
gallerykidson.com
cammer.store
arzukaragoz.website
newworldguzellik.xyz
ducer.info
gombc-c01.com
sheskingdomvibez.com
absolutesextoys.com
inthespiritofhorses.com
toppsfanatics.com
gratitudejournalteenboys.com
carzenterprise.com
stemglobal.net
dylanofficial.com
53292b.com
avon-kaliningrad.online
digitalent.gmbh
controlparental24.com
swordsave.com
outerverse.estate
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral2/memory/1148-12-0x0000000008590000-0x00000000085B9000-memory.dmp xloader behavioral2/memory/400-18-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/400-22-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1484-27-0x0000000000D40000-0x0000000000D69000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1148 set thread context of 400 1148 BG V.085(07)-REVISED DRAFT BL.exe 91 PID 400 set thread context of 3560 400 BG V.085(07)-REVISED DRAFT BL.exe 56 PID 400 set thread context of 3560 400 BG V.085(07)-REVISED DRAFT BL.exe 56 PID 1484 set thread context of 3560 1484 NETSTAT.EXE 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BG V.085(07)-REVISED DRAFT BL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1484 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 400 BG V.085(07)-REVISED DRAFT BL.exe 400 BG V.085(07)-REVISED DRAFT BL.exe 400 BG V.085(07)-REVISED DRAFT BL.exe 400 BG V.085(07)-REVISED DRAFT BL.exe 400 BG V.085(07)-REVISED DRAFT BL.exe 400 BG V.085(07)-REVISED DRAFT BL.exe 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE 1484 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 400 BG V.085(07)-REVISED DRAFT BL.exe 400 BG V.085(07)-REVISED DRAFT BL.exe 400 BG V.085(07)-REVISED DRAFT BL.exe 400 BG V.085(07)-REVISED DRAFT BL.exe 1484 NETSTAT.EXE 1484 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 400 BG V.085(07)-REVISED DRAFT BL.exe Token: SeDebugPrivilege 1484 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1148 wrote to memory of 400 1148 BG V.085(07)-REVISED DRAFT BL.exe 91 PID 1148 wrote to memory of 400 1148 BG V.085(07)-REVISED DRAFT BL.exe 91 PID 1148 wrote to memory of 400 1148 BG V.085(07)-REVISED DRAFT BL.exe 91 PID 1148 wrote to memory of 400 1148 BG V.085(07)-REVISED DRAFT BL.exe 91 PID 1148 wrote to memory of 400 1148 BG V.085(07)-REVISED DRAFT BL.exe 91 PID 1148 wrote to memory of 400 1148 BG V.085(07)-REVISED DRAFT BL.exe 91 PID 3560 wrote to memory of 1484 3560 Explorer.EXE 92 PID 3560 wrote to memory of 1484 3560 Explorer.EXE 92 PID 3560 wrote to memory of 1484 3560 Explorer.EXE 92 PID 1484 wrote to memory of 5048 1484 NETSTAT.EXE 93 PID 1484 wrote to memory of 5048 1484 NETSTAT.EXE 93 PID 1484 wrote to memory of 5048 1484 NETSTAT.EXE 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\BG V.085(07)-REVISED DRAFT BL.exe"C:\Users\Admin\AppData\Local\Temp\BG V.085(07)-REVISED DRAFT BL.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\BG V.085(07)-REVISED DRAFT BL.exe"C:\Users\Admin\AppData\Local\Temp\BG V.085(07)-REVISED DRAFT BL.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:400
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\BG V.085(07)-REVISED DRAFT BL.exe"3⤵
- System Location Discovery: System Language Discovery
PID:5048
-
-