Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:28
Behavioral task
behavioral1
Sample
968e6728a9e909dbcce429b21731f83a.exe
Resource
win7-20240708-en
General
-
Target
968e6728a9e909dbcce429b21731f83a.exe
-
Size
574KB
-
MD5
968e6728a9e909dbcce429b21731f83a
-
SHA1
231a29a43cbb83bf714634efdcfc6076f820bcc2
-
SHA256
9589e2ffa7b1e7adb7b29587e34acc76b49e4613c6ef7297447dd7a0c9cb4183
-
SHA512
62969b3ecee6eff2c80963f3c1ee43d1e4ae7f9af171bd48a5b0fe0e1fd7567f7f449916226c205a14b091fb81758bd18fc573fbfc87174a84056e2d8df7c18b
-
SSDEEP
12288:VXe9PPlowWX0t6mOQwg1Qd15CcYk0We1YR2P1b2U48+woOO:chloDX0XOf4/YUbhLO
Malware Config
Extracted
xloader
2.3
ojmi
kamdhenugreens.com
lunairlifetsyle.com
dawahmotivation.com
trangsangtunhien.com
lunarrosecrafts.com
metrobyte-mobil.com
clanpms.com
sreeprayagtravels.com
37sdsd.com
asimcompany.com
jiachangcai100.com
easternmktg.com
baolixi.net
huameiai.com
glossyskinco.com
signupforhuntington.com
flatner.com
jadi.express
westinsiraybay-th.com
robsoncabral.com
consultancytravel.com
contemptny.com
4600forbes.com
birthbabiessummit.com
delightsearthly.com
builtwarranty.com
pornoblood.com
mauriciocoppola.com
chroniccreators.com
builtabasket.net
design-55.com
nazi.win
kahbenefits.com
brateix.info
freedomworksconstruction.com
zennode051s.ovh
kynangpro.com
allthingshomeblog.com
infobeasiswaluarnegeri.com
pbcdad.com
ctcentralhomecare.com
udc-taiwan.com
leftcoastviews.com
prbczebulon.com
southwestacademyofsport.net
weedanynous.com
boutiquemiamor.com
candcconstructionllc.net
rshopee.com
cobotsautomation.com
aubowansupertravels.com
bestforthehouse.com
octobenches.com
dancewell-academy.com
greenterraalchemy.com
janugifts.com
kiwi889988.club
whelanvirtual.com
masonhospitalitygroup.com
yyfyjs.com
mustits.com
grantavto.com
meteorarms.com
boartlongyear.sucks
huanglaobo.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2104-10-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1952-11-0x0000000000400000-0x000000000054A000-memory.dmp autoit_exe -
resource yara_rule behavioral1/memory/1952-0-0x0000000000400000-0x000000000054A000-memory.dmp upx behavioral1/memory/1952-9-0x0000000003AF0000-0x0000000003C3A000-memory.dmp upx behavioral1/memory/1952-11-0x0000000000400000-0x000000000054A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 968e6728a9e909dbcce429b21731f83a.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1952 968e6728a9e909dbcce429b21731f83a.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1952 wrote to memory of 2104 1952 968e6728a9e909dbcce429b21731f83a.exe 30 PID 1952 wrote to memory of 2104 1952 968e6728a9e909dbcce429b21731f83a.exe 30 PID 1952 wrote to memory of 2104 1952 968e6728a9e909dbcce429b21731f83a.exe 30 PID 1952 wrote to memory of 2104 1952 968e6728a9e909dbcce429b21731f83a.exe 30 PID 1952 wrote to memory of 2104 1952 968e6728a9e909dbcce429b21731f83a.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\968e6728a9e909dbcce429b21731f83a.exe"C:\Users\Admin\AppData\Local\Temp\968e6728a9e909dbcce429b21731f83a.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\968e6728a9e909dbcce429b21731f83a.exe"C:\Users\Admin\AppData\Local\Temp\968e6728a9e909dbcce429b21731f83a.exe"2⤵PID:2104
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD5a2a86d4f02c8419169dcab682b20f931
SHA132f103dde1f0d0a4da19623b242d3ded1cecc25d
SHA256cf2dd031acf1a3669c773a7603bba51560ec2df2033d04018a33d9dba3592255
SHA51264d3be8902468cf9e8ef25b9af3640a31926e9f67e03a79e150d17dc6c96ba4c68ea46f1e8258654599e24771d9f292b5f70cfbbaf50dab8e97e6b19e5d537ed