Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:20
Static task
static1
Behavioral task
behavioral1
Sample
55bcf26a637c6331d509550c43cfcf66adcd29146db0f901f12c7639f69fab75.exe
Resource
win7-20240903-en
General
-
Target
55bcf26a637c6331d509550c43cfcf66adcd29146db0f901f12c7639f69fab75.exe
-
Size
780KB
-
MD5
62bbb998a6516eb7756f9651f7926057
-
SHA1
6c55a0321b069000de946d77cf36e9915a047567
-
SHA256
55bcf26a637c6331d509550c43cfcf66adcd29146db0f901f12c7639f69fab75
-
SHA512
f563c5af3f0bd54658573a9f35bc26f019e633ee237d01e8959e8b5f6dbe65f633b5275644b4edc70be96791ecdf918dc692b2db45a0e17fda54aa6dda423e6a
-
SSDEEP
12288:lZ8SxrEJgYYz0R2iNmQQoHjSqo9TVYxy0MIZsvIYr8Xa47pIOrgEw7UB4unbRoyw:wSxr9C1oQQ4wjaZsvIC8XDtxw7DGGy1
Malware Config
Extracted
xloader
2.5
rzwo
1metroband.com
erobal.com
zzyykx.com
chamallino.com
ehrlichforjustice.com
fzshangmao.net
bulkprices.info
schlafen.xyz
footspan.com
jano5tau.xyz
ukrainianwriters.com
clf010.com
kgvf.email
matura-natural.com
life23.club
yuanxuhuafu.com
autism-101.com
lithiumhexafluorophosphate.net
ducer.info
tender.guru
ooaz2.xyz
dinabrose.com
companysoop.com
lemesdev.com
trantuankts.com
hopeitivity.com
shance.ltd
melissadomjan.com
mydxza.com
jshxbi.com
ultrasmileteeth.com
app-alg.com
tunneltalk.biz
jyh8881.com
donottag.store
48hoursdesigns.com
vipdld.com
jeveux.net
mare.cruises
minecraftmemes.com
freevolttech.com
ch34k-3yfb124.club
standunitedforamerica.us
easilyconstitutionalfifty.xyz
quotexromania.com
jolantru.com
mhdastmaltchi.com
vistos.online
mahajanimaginglab.com
petalicious.online
cbdmp1.online
iberiaventure.com
fastoptica.com
gmoviapp.com
dwaloofr295-so-net.xyz
loridroesslerraupp.com
greenvle.com
citycash.company
umdasch-rackingsystems.com
secret-society.club
threadrounds.com
1670398.win
mayer4governor.info
whf5.xyz
infiniteinvesting.net
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2640-15-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1800 set thread context of 2640 1800 55bcf26a637c6331d509550c43cfcf66adcd29146db0f901f12c7639f69fab75.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 55bcf26a637c6331d509550c43cfcf66adcd29146db0f901f12c7639f69fab75.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2640 55bcf26a637c6331d509550c43cfcf66adcd29146db0f901f12c7639f69fab75.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1800 wrote to memory of 2640 1800 55bcf26a637c6331d509550c43cfcf66adcd29146db0f901f12c7639f69fab75.exe 31 PID 1800 wrote to memory of 2640 1800 55bcf26a637c6331d509550c43cfcf66adcd29146db0f901f12c7639f69fab75.exe 31 PID 1800 wrote to memory of 2640 1800 55bcf26a637c6331d509550c43cfcf66adcd29146db0f901f12c7639f69fab75.exe 31 PID 1800 wrote to memory of 2640 1800 55bcf26a637c6331d509550c43cfcf66adcd29146db0f901f12c7639f69fab75.exe 31 PID 1800 wrote to memory of 2640 1800 55bcf26a637c6331d509550c43cfcf66adcd29146db0f901f12c7639f69fab75.exe 31 PID 1800 wrote to memory of 2640 1800 55bcf26a637c6331d509550c43cfcf66adcd29146db0f901f12c7639f69fab75.exe 31 PID 1800 wrote to memory of 2640 1800 55bcf26a637c6331d509550c43cfcf66adcd29146db0f901f12c7639f69fab75.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\55bcf26a637c6331d509550c43cfcf66adcd29146db0f901f12c7639f69fab75.exe"C:\Users\Admin\AppData\Local\Temp\55bcf26a637c6331d509550c43cfcf66adcd29146db0f901f12c7639f69fab75.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\55bcf26a637c6331d509550c43cfcf66adcd29146db0f901f12c7639f69fab75.exe"C:\Users\Admin\AppData\Local\Temp\55bcf26a637c6331d509550c43cfcf66adcd29146db0f901f12c7639f69fab75.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2640
-