Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:20
Static task
static1
Behavioral task
behavioral1
Sample
363305b8f80486deb3f6adf30d0a1222a3bafd5206af6464bb79c865cf036a0e.exe
Resource
win7-20240903-en
General
-
Target
363305b8f80486deb3f6adf30d0a1222a3bafd5206af6464bb79c865cf036a0e.exe
-
Size
1.3MB
-
MD5
c192b7fb3ae63a02b73945b859c81f09
-
SHA1
a164f5a15d1ade8139dfcb1ae70e8f4a55a24a1e
-
SHA256
363305b8f80486deb3f6adf30d0a1222a3bafd5206af6464bb79c865cf036a0e
-
SHA512
d82936a57910b1426018d3ecd0282b2f7d7c7c2942df666103724b8dbf4378d5750c5512d38c0f8db6afd3bd4b7386d80155d92100d452a6cf5dbc6b57e7e209
-
SSDEEP
12288:tvdDddDYvvKUcrZasvXR/S9mK8tKkgaJ8X3Z2g2fmS45Uy7how4X24IEiEmU4Mul:bxGvvKUPKR/ImKn7wqaUkwJ4+uYC/Z
Malware Config
Extracted
xloader
2.5
i9ng
guiadesfralde.online
asjcjm.com
peacefmradio.com
pastasteakandpancake.online
imas-millionlive.com
ori-key.com
emissiontestrepair.com
education-mentor.online
axieinfinity-airdrop.club
iphone13pro.photos
grjeht033.store
plainfiles.com
texasinjurytriallawyers.com
votebrenthagenbuch.com
xn--crahome-cya.com
lquzd.com
anwoguoji.com
tacdating.com
shop-mr.com
pandrwatch.store
horai-chr.com
crowddust.com
contemporarywritings.com
elenahervecaro.com
fjpinrui.com
lesswax.com
sibtest.online
degitalcrime.com
inputflair.com
folge-meinempaket-de.com
mancaoxijing.com
poojafuels.com
seeandbeyourfuture.com
myarhaus.com
samas.store
burntheshipre.com
theherdsherpa.com
timesmarketing360.com
jochenhendrich.net
erisearch.com
mathewdartbassoon.com
xiaolt.top
984561.com
thevegie.com
wrtink.com
khazafna.com
gacor-terus-tiap-hari.xyz
bestconejohomes.com
goldentigre.online
cesiesis.com
credits-suiisse.com
texasmotorcycletransport.com
ascensionsresumes.com
zelestialcosmetics.com
corporativogrupomg.com
ovth-cksu.com
coronarycoach.com
vvv-btk.info
precisionsfittings.com
7890156.com
themidnightgospel.com
algurg-living.com
flores3x1.net
fanshu.space
tprs.club
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/4676-6-0x0000000000400000-0x000000000042A000-memory.dmp xloader behavioral2/memory/4676-9-0x0000000000400000-0x000000000042A000-memory.dmp xloader behavioral2/memory/2544-17-0x0000000000160000-0x0000000000189000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4940 set thread context of 4676 4940 363305b8f80486deb3f6adf30d0a1222a3bafd5206af6464bb79c865cf036a0e.exe 83 PID 4676 set thread context of 3480 4676 where.exe 54 PID 2544 set thread context of 3480 2544 cmmon32.exe 54 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 363305b8f80486deb3f6adf30d0a1222a3bafd5206af6464bb79c865cf036a0e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language where.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmmon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4940 363305b8f80486deb3f6adf30d0a1222a3bafd5206af6464bb79c865cf036a0e.exe 4940 363305b8f80486deb3f6adf30d0a1222a3bafd5206af6464bb79c865cf036a0e.exe 4940 363305b8f80486deb3f6adf30d0a1222a3bafd5206af6464bb79c865cf036a0e.exe 4940 363305b8f80486deb3f6adf30d0a1222a3bafd5206af6464bb79c865cf036a0e.exe 4940 363305b8f80486deb3f6adf30d0a1222a3bafd5206af6464bb79c865cf036a0e.exe 4940 363305b8f80486deb3f6adf30d0a1222a3bafd5206af6464bb79c865cf036a0e.exe 4940 363305b8f80486deb3f6adf30d0a1222a3bafd5206af6464bb79c865cf036a0e.exe 4940 363305b8f80486deb3f6adf30d0a1222a3bafd5206af6464bb79c865cf036a0e.exe 4676 where.exe 4676 where.exe 4676 where.exe 4676 where.exe 4940 363305b8f80486deb3f6adf30d0a1222a3bafd5206af6464bb79c865cf036a0e.exe 4940 363305b8f80486deb3f6adf30d0a1222a3bafd5206af6464bb79c865cf036a0e.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe 2544 cmmon32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4676 where.exe 4676 where.exe 4676 where.exe 2544 cmmon32.exe 2544 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4940 363305b8f80486deb3f6adf30d0a1222a3bafd5206af6464bb79c865cf036a0e.exe Token: SeDebugPrivilege 4676 where.exe Token: SeDebugPrivilege 2544 cmmon32.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4940 wrote to memory of 4676 4940 363305b8f80486deb3f6adf30d0a1222a3bafd5206af6464bb79c865cf036a0e.exe 83 PID 4940 wrote to memory of 4676 4940 363305b8f80486deb3f6adf30d0a1222a3bafd5206af6464bb79c865cf036a0e.exe 83 PID 4940 wrote to memory of 4676 4940 363305b8f80486deb3f6adf30d0a1222a3bafd5206af6464bb79c865cf036a0e.exe 83 PID 4940 wrote to memory of 4676 4940 363305b8f80486deb3f6adf30d0a1222a3bafd5206af6464bb79c865cf036a0e.exe 83 PID 4940 wrote to memory of 4676 4940 363305b8f80486deb3f6adf30d0a1222a3bafd5206af6464bb79c865cf036a0e.exe 83 PID 4940 wrote to memory of 4676 4940 363305b8f80486deb3f6adf30d0a1222a3bafd5206af6464bb79c865cf036a0e.exe 83 PID 4940 wrote to memory of 4676 4940 363305b8f80486deb3f6adf30d0a1222a3bafd5206af6464bb79c865cf036a0e.exe 83 PID 3480 wrote to memory of 2544 3480 Explorer.EXE 84 PID 3480 wrote to memory of 2544 3480 Explorer.EXE 84 PID 3480 wrote to memory of 2544 3480 Explorer.EXE 84 PID 2544 wrote to memory of 1292 2544 cmmon32.exe 88 PID 2544 wrote to memory of 1292 2544 cmmon32.exe 88 PID 2544 wrote to memory of 1292 2544 cmmon32.exe 88
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\363305b8f80486deb3f6adf30d0a1222a3bafd5206af6464bb79c865cf036a0e.exe"C:\Users\Admin\AppData\Local\Temp\363305b8f80486deb3f6adf30d0a1222a3bafd5206af6464bb79c865cf036a0e.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\where.exe"C:\Windows\SysWOW64\where.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4676
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\where.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1292
-
-