Analysis
-
max time kernel
146s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:21
Static task
static1
Behavioral task
behavioral1
Sample
PO#11112100012.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
PO#11112100012.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/jdzq.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/jdzq.dll
Resource
win10v2004-20241007-en
General
-
Target
PO#11112100012.exe
-
Size
259KB
-
MD5
7c29d861a4278a75167c4b6823441e25
-
SHA1
80fa2a19eed6387b5e20b025dc9d3bf062170582
-
SHA256
956c96cbe30f2740b410c770bfe2ef855154c129afd48bbf34568ab872eb8988
-
SHA512
117fda8fafef9dc7eed8b644d1c13ccadab8b5f451df0639e13b2b6877444ab6bbbe26e24ef3afa269bd946ae581be9bdd5639834866f0da2293d1b393175df7
-
SSDEEP
6144:rGiXAwgdaEpnfKqEuENir0EWaIxkGnrmr:j0aERfw2wa04
Malware Config
Extracted
xloader
2.5
rgv6
goodluck-shop.com
bra866.com
act2design.com
highclear.xyz
luneeatery.com
northeasttexasperio.com
lowresvideo.com
xn--gmqxk523cur2c.com
64382.online
duiqx.icu
successsuitsu.com
monarchscaffolding.com
bodybybetsy.com
bambooquotes.com
maktabeahlesunnat.com
francetempspartage.com
ivcleanse.care
vessel-wave.com
perranormalidad.com
inkhacks.com
ruggedimperial.com
acupuncturespeciallongevity.com
quick-tempered.com
inmobiliariapuertalavilla.com
ypqmmi.biz
tokyo-kyokuoukai.com
myclassify.club
pinkdragonflyfarms.com
lyceecondorcet.info
flipperfornrz.xyz
fmhra.online
exclusiveescortsmelbourne.com
freedomofmovement.digital
agrestemotors.com
improvizy.com
347391.com
brewsandreview.com
vpixar77.com
carlsbadandco.com
clauders.club
flushfreshz.info
haiwanghuyu.com
thealanhotel.com
haojiangbei.com
inv111.com
matajigroup.com
visaractivesprepaidscard.com
miukyshop.online
qipaiqx.com
soulshine.today
gtamgcqyxc.com
roganprybars.com
villanovas.com
summergreenarea.com
bjhwky.com
libell-provence.store
dgyijiabz.com
dicasdomentor.com
024atk.xyz
kokeguchisetsubi.com
portraitsbypaul.com
maschinenkrieger.com
kurtlee.club
xn--pgb3df.com
decorationnews.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2944-9-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2944-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2320-17-0x00000000000C0000-0x00000000000E9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2832 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2324 PO#11112100012.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2324 set thread context of 2944 2324 PO#11112100012.exe 29 PID 2944 set thread context of 1252 2944 PO#11112100012.exe 20 PID 2320 set thread context of 1252 2320 mstsc.exe 20 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO#11112100012.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2944 PO#11112100012.exe 2944 PO#11112100012.exe 2320 mstsc.exe 2320 mstsc.exe 2320 mstsc.exe 2320 mstsc.exe 2320 mstsc.exe 2320 mstsc.exe 2320 mstsc.exe 2320 mstsc.exe 2320 mstsc.exe 2320 mstsc.exe 2320 mstsc.exe 2320 mstsc.exe 2320 mstsc.exe 2320 mstsc.exe 2320 mstsc.exe 2320 mstsc.exe 2320 mstsc.exe 2320 mstsc.exe 2320 mstsc.exe 2320 mstsc.exe 2320 mstsc.exe 2320 mstsc.exe 2320 mstsc.exe 2320 mstsc.exe 2320 mstsc.exe 2320 mstsc.exe 2320 mstsc.exe 2320 mstsc.exe 2320 mstsc.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2944 PO#11112100012.exe 2944 PO#11112100012.exe 2944 PO#11112100012.exe 2320 mstsc.exe 2320 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2944 PO#11112100012.exe Token: SeDebugPrivilege 2320 mstsc.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2324 wrote to memory of 2944 2324 PO#11112100012.exe 29 PID 2324 wrote to memory of 2944 2324 PO#11112100012.exe 29 PID 2324 wrote to memory of 2944 2324 PO#11112100012.exe 29 PID 2324 wrote to memory of 2944 2324 PO#11112100012.exe 29 PID 2324 wrote to memory of 2944 2324 PO#11112100012.exe 29 PID 2324 wrote to memory of 2944 2324 PO#11112100012.exe 29 PID 2324 wrote to memory of 2944 2324 PO#11112100012.exe 29 PID 1252 wrote to memory of 2320 1252 Explorer.EXE 30 PID 1252 wrote to memory of 2320 1252 Explorer.EXE 30 PID 1252 wrote to memory of 2320 1252 Explorer.EXE 30 PID 1252 wrote to memory of 2320 1252 Explorer.EXE 30 PID 2320 wrote to memory of 2832 2320 mstsc.exe 31 PID 2320 wrote to memory of 2832 2320 mstsc.exe 31 PID 2320 wrote to memory of 2832 2320 mstsc.exe 31 PID 2320 wrote to memory of 2832 2320 mstsc.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\PO#11112100012.exe"C:\Users\Admin\AppData\Local\Temp\PO#11112100012.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\PO#11112100012.exe"C:\Users\Admin\AppData\Local\Temp\PO#11112100012.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2944
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PO#11112100012.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2832
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD53cbfaabed5bfdf7ba91b2239ff4f54ae
SHA1f135231f2966ef23161b8744cf5c4d321234d1e0
SHA256369665e2448df9c8a1dce71ca14a508f4767ee7b4a141a39d662fff5a523a1a3
SHA512a4a9bddc5d0c805f15974dc5b975196f9af26fdf8285c6d7ffbdcb22f3529d44863e8616cb33167f0b3a456e07cbd71fae3916b1c0c792317f36b90565e6184d