Analysis
-
max time kernel
96s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:24
Static task
static1
Behavioral task
behavioral1
Sample
5aa2c01a644cd991b9cc0056f03a0a5462ea4ce6f241d1ad78f9e0b6e042c183.exe
Resource
win7-20240903-en
General
-
Target
5aa2c01a644cd991b9cc0056f03a0a5462ea4ce6f241d1ad78f9e0b6e042c183.exe
-
Size
222KB
-
MD5
0235e629abad14322f70eadc59394bba
-
SHA1
6fa7ccf3bf7bd29e61f2a43a6ce453520a0c65bd
-
SHA256
5aa2c01a644cd991b9cc0056f03a0a5462ea4ce6f241d1ad78f9e0b6e042c183
-
SHA512
dbb1b0bb8bcd0d87bc2d122b4d90e522fe26fc9901ec564e5a03793be220efce812fab868011a8ac67d7e2172fa8bcfbdae59bff6b7f1b1a3b53f3b958b9ed9a
-
SSDEEP
6144:qNVs7YrLmcv5r3177kM4QoqmQAMMMiVJyx4c6:qNGYrHtZToRQAGY5c6
Malware Config
Extracted
xloader
2.3
vc6e
123lejeu.com
services-ti.com
iseekwithin.com
linkdbs.com
bibproductions.com
chaybo247.com
bondiblond.com
amandawilsonfamilylawyers.com
kbihualhamdaniyah.com
littletykesonline.com
circleofrepair.com
kingcartermusic.com
axqal2.com
dscfpro.xyz
cooltoysshop.com
enzocatering.com
skertyl.club
precommgateway.com
maddie-blake.com
malvinasargentina.com
moiraventura.info
finefavours.com
redlinebyrae.com
theroseapproach.com
blacktravelalliances.com
innovadigitalmkt.net
palomaerafa.com
nearbuyhomes.com
liga-gtvp.com
provenance.site
dawdwad005.com
5mdj.com
winstonewindows.com
nibbleos.com
ruiligouwu.com
rinkerusa.com
blendthatup.com
airtelbhopal.xyz
clubbarberpro.com
saltairboardshorts.com
mysafebaby.club
fixwpress.com
pbzb91.com
distrito1saludpublica.com
j5-h.com
makeupniranjana.com
supportamericanfreight.com
cruiseyourlifeaway.com
ouradvise.com
metkeltech.com
twentymillionfornoreason.com
top-dex2.com
softantmedia.com
mindlabinvestments.com
mituser.com
bikinisarabais.com
drmanojortho.com
cosydrinks.com
drinking-games-ideas.com
elfemocomputers.com
jerishbradly.com
gbenterprisesindia.com
gratis77.com
turkosgb.com
evi2020.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/3932-2-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3380 set thread context of 3932 3380 5aa2c01a644cd991b9cc0056f03a0a5462ea4ce6f241d1ad78f9e0b6e042c183.exe 85 -
Program crash 1 IoCs
pid pid_target Process procid_target 2828 3380 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5aa2c01a644cd991b9cc0056f03a0a5462ea4ce6f241d1ad78f9e0b6e042c183.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3932 5aa2c01a644cd991b9cc0056f03a0a5462ea4ce6f241d1ad78f9e0b6e042c183.exe 3932 5aa2c01a644cd991b9cc0056f03a0a5462ea4ce6f241d1ad78f9e0b6e042c183.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3380 5aa2c01a644cd991b9cc0056f03a0a5462ea4ce6f241d1ad78f9e0b6e042c183.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3380 wrote to memory of 3932 3380 5aa2c01a644cd991b9cc0056f03a0a5462ea4ce6f241d1ad78f9e0b6e042c183.exe 85 PID 3380 wrote to memory of 3932 3380 5aa2c01a644cd991b9cc0056f03a0a5462ea4ce6f241d1ad78f9e0b6e042c183.exe 85 PID 3380 wrote to memory of 3932 3380 5aa2c01a644cd991b9cc0056f03a0a5462ea4ce6f241d1ad78f9e0b6e042c183.exe 85 PID 3380 wrote to memory of 3932 3380 5aa2c01a644cd991b9cc0056f03a0a5462ea4ce6f241d1ad78f9e0b6e042c183.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\5aa2c01a644cd991b9cc0056f03a0a5462ea4ce6f241d1ad78f9e0b6e042c183.exe"C:\Users\Admin\AppData\Local\Temp\5aa2c01a644cd991b9cc0056f03a0a5462ea4ce6f241d1ad78f9e0b6e042c183.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\5aa2c01a644cd991b9cc0056f03a0a5462ea4ce6f241d1ad78f9e0b6e042c183.exe"C:\Users\Admin\AppData\Local\Temp\5aa2c01a644cd991b9cc0056f03a0a5462ea4ce6f241d1ad78f9e0b6e042c183.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3932
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3380 -s 3162⤵
- Program crash
PID:2828
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 3380 -ip 33801⤵PID:756