Analysis
-
max time kernel
95s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:23
Static task
static1
Behavioral task
behavioral1
Sample
16165e33ccd1feacc75d3bbb5e85bc304c566eaa45719aeca7e3d737f84fc641.exe
Resource
win7-20240729-en
General
-
Target
16165e33ccd1feacc75d3bbb5e85bc304c566eaa45719aeca7e3d737f84fc641.exe
-
Size
399KB
-
MD5
c0acc3b21bf2b1447b6990f85a0612a6
-
SHA1
dffac7b811cb9441e1c20ac15233514c4fade396
-
SHA256
16165e33ccd1feacc75d3bbb5e85bc304c566eaa45719aeca7e3d737f84fc641
-
SHA512
2f1888ef3be9ac8fbc298d5496e15efe299dc129e43f7f4d02bf2988ad920c703d801eb0ad21b546918bd1df0d50aebcbcdb80d360d40a53e855b5244acd4e22
-
SSDEEP
6144:ONtGpBRIZbEIZscMEC0iy+ma7dQvk4JrV2wqCDpVOxIbEBRwWY:OrSRliLG0s7qvk4JrNquVOxIoe
Malware Config
Extracted
xloader
2.5
bec2
ipelard.com
26gjm.xyz
frontiermotorspaintandbody.net
sunslide.club
blue-chipwordtoscan-today.info
stephanieandjoseph.com
city-show.com
chosen-novels.com
unfinitsoluciones.com
eventsidevibe.com
kingsferryshipping.com
cfostco.com
terrafirmanft.com
ultra-dvd-player.com
networkaccesskey.com
masoncable.net
blazed.tel
herbalmedication.xyz
whistlecapital.com
brasbux.com
cxz6.com
desiredbnuxbu.xyz
4sansquatre.com
marellemarelle.com
4dysp.com
42housing.com
whbllp.com
algurgtyre.com
7blogger.com
salesupcamp.com
dcaelectrical.com
ciosaer.com
gzdzdbj.com
sahabeterisim.com
tailongwan.com
virtuallyrhonda.com
cqaswh.com
truleafdispensary.com
wataameclub.net
areyoufuckingnuts.com
ipaibei.com
homeschintai.com
cainor.com
chocolatetrufflefactory.com
worldcoachesnetwork.com
groupem6-tvdistribution.com
tisgudfurniture.com
qq2038.com
medlexity.com
phoenixdata.solutions
corporacioncgs.com
drbadeeb.com
nervedamagefilms.net
williamkjohnson.store
docmartensargentina.com
marthaoneil.com
prionb.xyz
aisomatix.com
xgcexwchfux.mobi
getmuvao.com
legacyexecutives.com
myinsuranceguide.pro
jupfest.net
vizipark.com
gpklogistech.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/4736-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3660 set thread context of 4736 3660 16165e33ccd1feacc75d3bbb5e85bc304c566eaa45719aeca7e3d737f84fc641.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 16165e33ccd1feacc75d3bbb5e85bc304c566eaa45719aeca7e3d737f84fc641.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4736 16165e33ccd1feacc75d3bbb5e85bc304c566eaa45719aeca7e3d737f84fc641.exe 4736 16165e33ccd1feacc75d3bbb5e85bc304c566eaa45719aeca7e3d737f84fc641.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3660 wrote to memory of 4736 3660 16165e33ccd1feacc75d3bbb5e85bc304c566eaa45719aeca7e3d737f84fc641.exe 100 PID 3660 wrote to memory of 4736 3660 16165e33ccd1feacc75d3bbb5e85bc304c566eaa45719aeca7e3d737f84fc641.exe 100 PID 3660 wrote to memory of 4736 3660 16165e33ccd1feacc75d3bbb5e85bc304c566eaa45719aeca7e3d737f84fc641.exe 100 PID 3660 wrote to memory of 4736 3660 16165e33ccd1feacc75d3bbb5e85bc304c566eaa45719aeca7e3d737f84fc641.exe 100 PID 3660 wrote to memory of 4736 3660 16165e33ccd1feacc75d3bbb5e85bc304c566eaa45719aeca7e3d737f84fc641.exe 100 PID 3660 wrote to memory of 4736 3660 16165e33ccd1feacc75d3bbb5e85bc304c566eaa45719aeca7e3d737f84fc641.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\16165e33ccd1feacc75d3bbb5e85bc304c566eaa45719aeca7e3d737f84fc641.exe"C:\Users\Admin\AppData\Local\Temp\16165e33ccd1feacc75d3bbb5e85bc304c566eaa45719aeca7e3d737f84fc641.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\16165e33ccd1feacc75d3bbb5e85bc304c566eaa45719aeca7e3d737f84fc641.exe"C:\Users\Admin\AppData\Local\Temp\16165e33ccd1feacc75d3bbb5e85bc304c566eaa45719aeca7e3d737f84fc641.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4736
-