Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:22
Static task
static1
Behavioral task
behavioral1
Sample
6d2e62731127aba56d1cf091bdc923b8c0dfb6594fdbfbda160548fea9f64dfc.exe
Resource
win7-20241010-en
General
-
Target
6d2e62731127aba56d1cf091bdc923b8c0dfb6594fdbfbda160548fea9f64dfc.exe
-
Size
990KB
-
MD5
f6fb2f464d46e2f9a458e7bad7623c1e
-
SHA1
e53c7b7c302125f21b57ec935eba418b171a524a
-
SHA256
6d2e62731127aba56d1cf091bdc923b8c0dfb6594fdbfbda160548fea9f64dfc
-
SHA512
cd83198844109650a32bb92adc476a37e8f9c250eef3b484624ce6db52513460fa75539003bf0a9c2d3db932331aa3dca56d99b19d752e37f428a2492fb247cb
-
SSDEEP
24576:b9Ql9Zo4ir7ntRjygTPTstY2ukMUw+aERZjLsKXL9Cd2dnS:b9OZo4wlTTsNMUz3V74OS
Malware Config
Extracted
xloader
2.5
qbkr
myestiebesties.com
woodwormapothecary.com
titleholdingsllc.com
corpcepa.com
kudjujuudz.xyz
palaciomonsalud.com
jombida.com
appcast-72.com
1ane337.com
azdrainwork.com
cicinstalaciones.com
absolutenuisance.com
hovereb.com
asiapartnerspoint.com
infinite-waves.com
shafara.com
champpoint.com
luxuryhomesandwellness.com
youugou.com
templetongreenfinch.net
hleonardoms-testing.online
gorillamininginc.com
gpscollarreviews.com
vridelhersk.quest
arches2.com
olis-beauty.com
surpio.com
doddoors.com
shiningstarskennel.com
zentouchwithsage.com
unusualdogs.com
timelessranch.com
gedutrends.com
extravagantdecor.com
upposeidonmax.net
exit-10-exodus.com
18gjm.xyz
mmtv8m.com
mayer4governor.info
miaagro.com
yerdn.com
sickapps.com
mvtchnologies.com
naviodeideias.com
schedulejordanair.com
iontd.net
dichvulikefollowgiare.com
hustlerbros.com
allureseniorliving.online
boardwalksnj.com
alphafinanceinvestment.com
hupantech.com
innagalitsky.com
abalobrand.com
frommourning2morning.com
lifescreativeflow.com
sun-bleach.com
medicosconnect.ltd
gottagetcrypto.com
webdevizy.com
dizzylive.club
revivesurgicals.xyz
aewxp.com
ecogestiononline.com
graphene-elec.tech
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/4240-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2204 set thread context of 4240 2204 6d2e62731127aba56d1cf091bdc923b8c0dfb6594fdbfbda160548fea9f64dfc.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6d2e62731127aba56d1cf091bdc923b8c0dfb6594fdbfbda160548fea9f64dfc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4240 6d2e62731127aba56d1cf091bdc923b8c0dfb6594fdbfbda160548fea9f64dfc.exe 4240 6d2e62731127aba56d1cf091bdc923b8c0dfb6594fdbfbda160548fea9f64dfc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2204 wrote to memory of 4240 2204 6d2e62731127aba56d1cf091bdc923b8c0dfb6594fdbfbda160548fea9f64dfc.exe 91 PID 2204 wrote to memory of 4240 2204 6d2e62731127aba56d1cf091bdc923b8c0dfb6594fdbfbda160548fea9f64dfc.exe 91 PID 2204 wrote to memory of 4240 2204 6d2e62731127aba56d1cf091bdc923b8c0dfb6594fdbfbda160548fea9f64dfc.exe 91 PID 2204 wrote to memory of 4240 2204 6d2e62731127aba56d1cf091bdc923b8c0dfb6594fdbfbda160548fea9f64dfc.exe 91 PID 2204 wrote to memory of 4240 2204 6d2e62731127aba56d1cf091bdc923b8c0dfb6594fdbfbda160548fea9f64dfc.exe 91 PID 2204 wrote to memory of 4240 2204 6d2e62731127aba56d1cf091bdc923b8c0dfb6594fdbfbda160548fea9f64dfc.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\6d2e62731127aba56d1cf091bdc923b8c0dfb6594fdbfbda160548fea9f64dfc.exe"C:\Users\Admin\AppData\Local\Temp\6d2e62731127aba56d1cf091bdc923b8c0dfb6594fdbfbda160548fea9f64dfc.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\6d2e62731127aba56d1cf091bdc923b8c0dfb6594fdbfbda160548fea9f64dfc.exe"C:\Users\Admin\AppData\Local\Temp\6d2e62731127aba56d1cf091bdc923b8c0dfb6594fdbfbda160548fea9f64dfc.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4240
-