Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:24
Static task
static1
Behavioral task
behavioral1
Sample
2df4db23209402b9d083df517cdc797b19e66342875bc8de4988f86bea9f094b.exe
Resource
win7-20240708-en
General
-
Target
2df4db23209402b9d083df517cdc797b19e66342875bc8de4988f86bea9f094b.exe
-
Size
1.1MB
-
MD5
f8fe00034e28601cb4b2c7895e3f7d9e
-
SHA1
c3494176756cb90f6036478a54de07a73a8359a4
-
SHA256
2df4db23209402b9d083df517cdc797b19e66342875bc8de4988f86bea9f094b
-
SHA512
5c4a1ffb8da40045c12a3758c8e50fcd472627eb0209c6d61fed494f61aa5bd1a348657ca2594af741852e65929a00ff36e73904faf20a1608fef8d74dd75a23
-
SSDEEP
24576:dVSRwf9Kutco0FkgKQWR3+TgMZAb4mhMkGG:dVSOVKutyFkgKQWR3+Tg//GG
Malware Config
Extracted
xloader
2.5
te4s
atlantahousingsolutions.com
loharukaurbanvistas.com
30northcoffee.com
978611.com
aflawlesshealth.com
cannabisreef.store
natureswrathbeatsapperal.com
a6moto.com
1kingbet.com
cabinetfuid.com
0le2rwczg.com
horkinator.online
financecost.net
mailers411.com
arkdecs.com
moretraffic.online
inthekitchenshakinandbakin.com
998451.com
bonuschoices.com
astraherb.com
rubenclassics.com
newweedorder.com
rojaspass.com
sunsetridge.group
mmasafaris.com
dantalia-clinic.com
amigasconesencia.com
christiancoachingforkids.com
clean-roots.com
shulimarketing.com
umkhelfa.space
billigalarm.com
smartfresh-air.com
lightskingames.com
how2makearing.online
sollectibles.com
697871.com
kolekonieczka.com
fcv99.com
ginasellshomes2.com
ecomotoadventures.com
interwovenpoint.com
globeems.com
duqxid.icu
tender.guru
zambia-info.com
orixonrealty.com
hiranilawfirm.com
phasmatoidea.com
sgames.space
gimbases.com
laminaparfum.com
seniorlivingsearchusaweb.com
efficientmother.com
movingruznsk.com
losigkas.com
legacytailors.com
tulsadrumschool.com
spendingmedicalsurvive.xyz
anysitetoday.xyz
bodysjourney.com
co-z.energy
ks-med.store
iphone13pro.review
dmosups.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2756-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2668 set thread context of 2756 2668 2df4db23209402b9d083df517cdc797b19e66342875bc8de4988f86bea9f094b.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2df4db23209402b9d083df517cdc797b19e66342875bc8de4988f86bea9f094b.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2756 2df4db23209402b9d083df517cdc797b19e66342875bc8de4988f86bea9f094b.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2756 2668 2df4db23209402b9d083df517cdc797b19e66342875bc8de4988f86bea9f094b.exe 30 PID 2668 wrote to memory of 2756 2668 2df4db23209402b9d083df517cdc797b19e66342875bc8de4988f86bea9f094b.exe 30 PID 2668 wrote to memory of 2756 2668 2df4db23209402b9d083df517cdc797b19e66342875bc8de4988f86bea9f094b.exe 30 PID 2668 wrote to memory of 2756 2668 2df4db23209402b9d083df517cdc797b19e66342875bc8de4988f86bea9f094b.exe 30 PID 2668 wrote to memory of 2756 2668 2df4db23209402b9d083df517cdc797b19e66342875bc8de4988f86bea9f094b.exe 30 PID 2668 wrote to memory of 2756 2668 2df4db23209402b9d083df517cdc797b19e66342875bc8de4988f86bea9f094b.exe 30 PID 2668 wrote to memory of 2756 2668 2df4db23209402b9d083df517cdc797b19e66342875bc8de4988f86bea9f094b.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\2df4db23209402b9d083df517cdc797b19e66342875bc8de4988f86bea9f094b.exe"C:\Users\Admin\AppData\Local\Temp\2df4db23209402b9d083df517cdc797b19e66342875bc8de4988f86bea9f094b.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\2df4db23209402b9d083df517cdc797b19e66342875bc8de4988f86bea9f094b.exe"C:\Users\Admin\AppData\Local\Temp\2df4db23209402b9d083df517cdc797b19e66342875bc8de4988f86bea9f094b.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2756
-