Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:21
Static task
static1
Behavioral task
behavioral1
Sample
588395RQ9484481001088.exe
Resource
win7-20240903-en
General
-
Target
588395RQ9484481001088.exe
-
Size
435KB
-
MD5
5c4f900c98ae6bc1a60989ff945518cf
-
SHA1
512810a254405e9250dec9036293904ec37ac86f
-
SHA256
08302b5e5672ba31f714c6ff192a0abb07fabedc63fb1fe256a3ec4ac5512818
-
SHA512
8606005882accae561c729268bd82f57a0c1006d6c925ead479d69aa3cda191bd6bb32e2bf66c3cc431bb29dd4c61d0f9cb71febe7bb4c20377e6be7df12d00f
-
SSDEEP
6144:Y4vXf2uStjUqgJqjpdKJJWJtJwkzJslW0Eu+7WSOmycqEbMRXqrQ:yjULJqjpEJmUkOQ0t+aSO+MRXQQ
Malware Config
Extracted
xloader
2.5
w240
deathgummys.com
accentuable.info
logisticairpetrelocators.com
playdropmats.com
ewshop.club
bislists.com
pkkjoo.net
goldenkaktus.com
bigspiderproductions.com
funessences.com
gimpydogproductions.com
motivatedmarketinggroup.com
bjadd.com
2ux3ms.com
zafzi.com
oldmanemailplan.xyz
quotexlibya.com
mobco.store
stofferogbo.kim
akidsguidetotheworld.com
rubiotravel.com
dcmr-ns.com
cetalimited.com
salon-nsk.com
allinvtesler.info
ccfuydao.com
fotorestaurante360.com
expatinternetphone.com
aeb-global.net
bjhsthkj.com
616671.com
hhdopg.xyz
maleaou.com
la-invisible.com
mobliranrad.com
fideicomisario.com
texorse.website
xcdy1818.com
chaosmatheclub.com
yabateam.com
trevoreckhoff.com
sheaselectricla.com
818recordsllc.com
onchainanimals.com
groupe-oden.net
ranbix.com
temppou.com
generalcorporations.net
thesunnysoulsisters.com
610crew.com
schmetterlingimmobilien.com
nas-jinsung.com
customapronsnow.com
porsedanbe.xyz
portjob63.com
viajeroscuriosos.com
swisstrustcitybank.com
mmxohs.com
nanobiotechlabs.com
scorpionproductionsbymk.com
dev-projectmanagement.com
xaaz2.xyz
13lee.com
appcoinsupport.services
palisadesburgers.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2576-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2576-17-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2580-22-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2464 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1548 set thread context of 2576 1548 588395RQ9484481001088.exe 31 PID 2576 set thread context of 1184 2576 588395RQ9484481001088.exe 21 PID 2580 set thread context of 1184 2580 explorer.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 588395RQ9484481001088.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 1548 588395RQ9484481001088.exe 1548 588395RQ9484481001088.exe 2576 588395RQ9484481001088.exe 2576 588395RQ9484481001088.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe 2580 explorer.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2576 588395RQ9484481001088.exe 2576 588395RQ9484481001088.exe 2576 588395RQ9484481001088.exe 2580 explorer.exe 2580 explorer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1548 588395RQ9484481001088.exe Token: SeDebugPrivilege 2576 588395RQ9484481001088.exe Token: SeDebugPrivilege 2580 explorer.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1548 wrote to memory of 2652 1548 588395RQ9484481001088.exe 30 PID 1548 wrote to memory of 2652 1548 588395RQ9484481001088.exe 30 PID 1548 wrote to memory of 2652 1548 588395RQ9484481001088.exe 30 PID 1548 wrote to memory of 2652 1548 588395RQ9484481001088.exe 30 PID 1548 wrote to memory of 2576 1548 588395RQ9484481001088.exe 31 PID 1548 wrote to memory of 2576 1548 588395RQ9484481001088.exe 31 PID 1548 wrote to memory of 2576 1548 588395RQ9484481001088.exe 31 PID 1548 wrote to memory of 2576 1548 588395RQ9484481001088.exe 31 PID 1548 wrote to memory of 2576 1548 588395RQ9484481001088.exe 31 PID 1548 wrote to memory of 2576 1548 588395RQ9484481001088.exe 31 PID 1548 wrote to memory of 2576 1548 588395RQ9484481001088.exe 31 PID 1184 wrote to memory of 2580 1184 Explorer.EXE 32 PID 1184 wrote to memory of 2580 1184 Explorer.EXE 32 PID 1184 wrote to memory of 2580 1184 Explorer.EXE 32 PID 1184 wrote to memory of 2580 1184 Explorer.EXE 32 PID 2580 wrote to memory of 2464 2580 explorer.exe 33 PID 2580 wrote to memory of 2464 2580 explorer.exe 33 PID 2580 wrote to memory of 2464 2580 explorer.exe 33 PID 2580 wrote to memory of 2464 2580 explorer.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\588395RQ9484481001088.exe"C:\Users\Admin\AppData\Local\Temp\588395RQ9484481001088.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\588395RQ9484481001088.exe"C:\Users\Admin\AppData\Local\Temp\588395RQ9484481001088.exe"3⤵PID:2652
-
-
C:\Users\Admin\AppData\Local\Temp\588395RQ9484481001088.exe"C:\Users\Admin\AppData\Local\Temp\588395RQ9484481001088.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\588395RQ9484481001088.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2464
-
-