Analysis
-
max time kernel
146s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 20:20
Behavioral task
behavioral1
Sample
dump.exe
Resource
win7-20240903-en
General
-
Target
dump.exe
-
Size
160KB
-
MD5
ac8e94fe61f6dc8c33785c9a6fd474b8
-
SHA1
e3e1dcf21308ac20a1ed5f18a83d34479f7361d9
-
SHA256
a828137f26efcaa656d7ff8b220aef97b33e32125eb36d6d62b964a83f13057b
-
SHA512
2f9c32ea45ee9b043693648e94d5d354223a54a0cebfc40763b0cfd0960d5e2f10e21d24f101cf5f1eb7005156b70f436f3c5d85d50ebab4e1c4f4ef7826deb6
-
SSDEEP
3072:VZBq0c6gQ/qI4rQo4j1PHrFf+baIH7VO5dUdYkVo0z8gT4GNefG:Vm09Wco4hvhfKrBO5dUdYkVo0RsfG
Malware Config
Extracted
xloader
2.3
mej0
mtxs8.com
quickskiplondon.com
sltplanner.com
generatedate.com
amsinspections.com
tomrings.com
109friends.com
freelovereading.com
avalapartners.com
nordiqueluxury.com
inmbex.com
everybankatm.com
bo1899.com
ashymeadow.com
pubgm-chickendinner.com
takudolunch.com
carlagremiao.com
actonetheatre.com
wemhealth.com
khasomat.net
lartiqueusa.com
singularity.institute
ashsgx567d.com
sequoiaparts.net
ujriksalead.com
ag99.xyz
isabeltimon.com
bijyo-topic.site
homefuels.energy
2ofakinddesigns.com
iggglobal.com
ravenlightproductions.com
magicaltransform.com
2936vaquero.com
essentialme.network
thebrathouse.info
tecstrong.net
ayulaksmi.com
maximebazerque.com
bankdj.com
pizzaoff.com
eastcohemp.com
acordolimpo.com
mediacpstreamchile.com
wholesalefleuerdelis.com
chuangyuanfz.com
getcenteredwithclay.com
retaboo.com
ikonicboatcharters.com
parakhonskiy.com
tropical-therapy.com
metropitstop.com
municipiodeanton.net
valorplanodesaudemaranhao.info
alibabakanaat.com
creditsoptionsnow.com
arabgerman.digital
webspazio.com
sunsyncindia.com
jlsolutionspty.com
almightyamerican.com
nadirshirts.com
gdxinmu.com
postcaremedical.com
lifewithbriana.com
Signatures
-
Xloader family
-
Xloader payload 2 IoCs
resource yara_rule behavioral2/memory/4508-2-0x0000000000D40000-0x0000000000D68000-memory.dmp xloader behavioral2/memory/4508-5-0x0000000000D40000-0x0000000000D68000-memory.dmp xloader -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4508 set thread context of 3412 4508 dump.exe 56 PID 4508 set thread context of 3412 4508 dump.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dump.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4508 dump.exe 4508 dump.exe 4508 dump.exe 4508 dump.exe 4508 dump.exe 4508 dump.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 4508 dump.exe 4508 dump.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4508 dump.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\dump.exe"C:\Users\Admin\AppData\Local\Temp\dump.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4508
-