Analysis
-
max time kernel
145s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:20
Behavioral task
behavioral1
Sample
dump.exe
Resource
win7-20240903-en
General
-
Target
dump.exe
-
Size
160KB
-
MD5
ac8e94fe61f6dc8c33785c9a6fd474b8
-
SHA1
e3e1dcf21308ac20a1ed5f18a83d34479f7361d9
-
SHA256
a828137f26efcaa656d7ff8b220aef97b33e32125eb36d6d62b964a83f13057b
-
SHA512
2f9c32ea45ee9b043693648e94d5d354223a54a0cebfc40763b0cfd0960d5e2f10e21d24f101cf5f1eb7005156b70f436f3c5d85d50ebab4e1c4f4ef7826deb6
-
SSDEEP
3072:VZBq0c6gQ/qI4rQo4j1PHrFf+baIH7VO5dUdYkVo0z8gT4GNefG:Vm09Wco4hvhfKrBO5dUdYkVo0RsfG
Malware Config
Extracted
xloader
2.3
mej0
mtxs8.com
quickskiplondon.com
sltplanner.com
generatedate.com
amsinspections.com
tomrings.com
109friends.com
freelovereading.com
avalapartners.com
nordiqueluxury.com
inmbex.com
everybankatm.com
bo1899.com
ashymeadow.com
pubgm-chickendinner.com
takudolunch.com
carlagremiao.com
actonetheatre.com
wemhealth.com
khasomat.net
lartiqueusa.com
singularity.institute
ashsgx567d.com
sequoiaparts.net
ujriksalead.com
ag99.xyz
isabeltimon.com
bijyo-topic.site
homefuels.energy
2ofakinddesigns.com
iggglobal.com
ravenlightproductions.com
magicaltransform.com
2936vaquero.com
essentialme.network
thebrathouse.info
tecstrong.net
ayulaksmi.com
maximebazerque.com
bankdj.com
pizzaoff.com
eastcohemp.com
acordolimpo.com
mediacpstreamchile.com
wholesalefleuerdelis.com
chuangyuanfz.com
getcenteredwithclay.com
retaboo.com
ikonicboatcharters.com
parakhonskiy.com
tropical-therapy.com
metropitstop.com
municipiodeanton.net
valorplanodesaudemaranhao.info
alibabakanaat.com
creditsoptionsnow.com
arabgerman.digital
webspazio.com
sunsyncindia.com
jlsolutionspty.com
almightyamerican.com
nadirshirts.com
gdxinmu.com
postcaremedical.com
lifewithbriana.com
Signatures
-
Xloader family
-
Xloader payload 2 IoCs
resource yara_rule behavioral1/memory/2024-2-0x00000000013C0000-0x00000000013E8000-memory.dmp xloader behavioral1/memory/1792-6-0x0000000000080000-0x00000000000A8000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 800 cmd.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2024 set thread context of 1212 2024 dump.exe 21 PID 1792 set thread context of 1212 1792 cmmon32.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmmon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2024 dump.exe 2024 dump.exe 1792 cmmon32.exe 1792 cmmon32.exe 1792 cmmon32.exe 1792 cmmon32.exe 1792 cmmon32.exe 1792 cmmon32.exe 1792 cmmon32.exe 1792 cmmon32.exe 1792 cmmon32.exe 1792 cmmon32.exe 1792 cmmon32.exe 1792 cmmon32.exe 1792 cmmon32.exe 1792 cmmon32.exe 1792 cmmon32.exe 1792 cmmon32.exe 1792 cmmon32.exe 1792 cmmon32.exe 1792 cmmon32.exe 1792 cmmon32.exe 1792 cmmon32.exe 1792 cmmon32.exe 1792 cmmon32.exe 1792 cmmon32.exe 1792 cmmon32.exe 1792 cmmon32.exe 1792 cmmon32.exe 1792 cmmon32.exe 1792 cmmon32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2024 dump.exe 2024 dump.exe 2024 dump.exe 1792 cmmon32.exe 1792 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2024 dump.exe Token: SeDebugPrivilege 1792 cmmon32.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1212 wrote to memory of 1792 1212 Explorer.EXE 31 PID 1212 wrote to memory of 1792 1212 Explorer.EXE 31 PID 1212 wrote to memory of 1792 1212 Explorer.EXE 31 PID 1212 wrote to memory of 1792 1212 Explorer.EXE 31 PID 1792 wrote to memory of 800 1792 cmmon32.exe 32 PID 1792 wrote to memory of 800 1792 cmmon32.exe 32 PID 1792 wrote to memory of 800 1792 cmmon32.exe 32 PID 1792 wrote to memory of 800 1792 cmmon32.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\dump.exe"C:\Users\Admin\AppData\Local\Temp\dump.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2024
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\dump.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:800
-
-