Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:21
Static task
static1
Behavioral task
behavioral1
Sample
588395RQ9484481001088.exe
Resource
win7-20240903-en
General
-
Target
588395RQ9484481001088.exe
-
Size
435KB
-
MD5
5c4f900c98ae6bc1a60989ff945518cf
-
SHA1
512810a254405e9250dec9036293904ec37ac86f
-
SHA256
08302b5e5672ba31f714c6ff192a0abb07fabedc63fb1fe256a3ec4ac5512818
-
SHA512
8606005882accae561c729268bd82f57a0c1006d6c925ead479d69aa3cda191bd6bb32e2bf66c3cc431bb29dd4c61d0f9cb71febe7bb4c20377e6be7df12d00f
-
SSDEEP
6144:Y4vXf2uStjUqgJqjpdKJJWJtJwkzJslW0Eu+7WSOmycqEbMRXqrQ:yjULJqjpEJmUkOQ0t+aSO+MRXQQ
Malware Config
Extracted
xloader
2.5
w240
deathgummys.com
accentuable.info
logisticairpetrelocators.com
playdropmats.com
ewshop.club
bislists.com
pkkjoo.net
goldenkaktus.com
bigspiderproductions.com
funessences.com
gimpydogproductions.com
motivatedmarketinggroup.com
bjadd.com
2ux3ms.com
zafzi.com
oldmanemailplan.xyz
quotexlibya.com
mobco.store
stofferogbo.kim
akidsguidetotheworld.com
rubiotravel.com
dcmr-ns.com
cetalimited.com
salon-nsk.com
allinvtesler.info
ccfuydao.com
fotorestaurante360.com
expatinternetphone.com
aeb-global.net
bjhsthkj.com
616671.com
hhdopg.xyz
maleaou.com
la-invisible.com
mobliranrad.com
fideicomisario.com
texorse.website
xcdy1818.com
chaosmatheclub.com
yabateam.com
trevoreckhoff.com
sheaselectricla.com
818recordsllc.com
onchainanimals.com
groupe-oden.net
ranbix.com
temppou.com
generalcorporations.net
thesunnysoulsisters.com
610crew.com
schmetterlingimmobilien.com
nas-jinsung.com
customapronsnow.com
porsedanbe.xyz
portjob63.com
viajeroscuriosos.com
swisstrustcitybank.com
mmxohs.com
nanobiotechlabs.com
scorpionproductionsbymk.com
dev-projectmanagement.com
xaaz2.xyz
13lee.com
appcoinsupport.services
palisadesburgers.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/2052-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2052-16-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3648-21-0x0000000000A00000-0x0000000000A29000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1472 set thread context of 2052 1472 588395RQ9484481001088.exe 100 PID 2052 set thread context of 3528 2052 588395RQ9484481001088.exe 56 PID 3648 set thread context of 3528 3648 systray.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 588395RQ9484481001088.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systray.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 2052 588395RQ9484481001088.exe 2052 588395RQ9484481001088.exe 2052 588395RQ9484481001088.exe 2052 588395RQ9484481001088.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe 3648 systray.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2052 588395RQ9484481001088.exe 2052 588395RQ9484481001088.exe 2052 588395RQ9484481001088.exe 3648 systray.exe 3648 systray.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2052 588395RQ9484481001088.exe Token: SeDebugPrivilege 3648 systray.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1472 wrote to memory of 2052 1472 588395RQ9484481001088.exe 100 PID 1472 wrote to memory of 2052 1472 588395RQ9484481001088.exe 100 PID 1472 wrote to memory of 2052 1472 588395RQ9484481001088.exe 100 PID 1472 wrote to memory of 2052 1472 588395RQ9484481001088.exe 100 PID 1472 wrote to memory of 2052 1472 588395RQ9484481001088.exe 100 PID 1472 wrote to memory of 2052 1472 588395RQ9484481001088.exe 100 PID 3528 wrote to memory of 3648 3528 Explorer.EXE 101 PID 3528 wrote to memory of 3648 3528 Explorer.EXE 101 PID 3528 wrote to memory of 3648 3528 Explorer.EXE 101 PID 3648 wrote to memory of 1532 3648 systray.exe 102 PID 3648 wrote to memory of 1532 3648 systray.exe 102 PID 3648 wrote to memory of 1532 3648 systray.exe 102
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\588395RQ9484481001088.exe"C:\Users\Admin\AppData\Local\Temp\588395RQ9484481001088.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\588395RQ9484481001088.exe"C:\Users\Admin\AppData\Local\Temp\588395RQ9484481001088.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2052
-
-
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\588395RQ9484481001088.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1532
-
-