Analysis
-
max time kernel
149s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:27
Static task
static1
Behavioral task
behavioral1
Sample
f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe
Resource
win7-20241010-en
General
-
Target
f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe
-
Size
1.0MB
-
MD5
5e65687e6dfe0d3b02757fecea0b130a
-
SHA1
27fef89564b277da09f18bbdc9215c65b1ee729e
-
SHA256
f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f
-
SHA512
4388eba08207189a816c5eb2b09776186c48aa02ba1407c4108a6548d29f1562184beca49c6d2de65510af89f831bec23465f189f336d6bbadc3ff5addd194a0
-
SSDEEP
12288:DGwxGil6fbZkSIl7ganNp5EjMLFIUSr17nyNcWp1SG/23FGva5nlFhZ/Mv4I8PQf:DlNktkSm7ganNp5S0ps3par7LOvlWp
Malware Config
Extracted
xloader
2.5
i9ng
guiadesfralde.online
asjcjm.com
peacefmradio.com
pastasteakandpancake.online
imas-millionlive.com
ori-key.com
emissiontestrepair.com
education-mentor.online
axieinfinity-airdrop.club
iphone13pro.photos
grjeht033.store
plainfiles.com
texasinjurytriallawyers.com
votebrenthagenbuch.com
xn--crahome-cya.com
lquzd.com
anwoguoji.com
tacdating.com
shop-mr.com
pandrwatch.store
horai-chr.com
crowddust.com
contemporarywritings.com
elenahervecaro.com
fjpinrui.com
lesswax.com
sibtest.online
degitalcrime.com
inputflair.com
folge-meinempaket-de.com
mancaoxijing.com
poojafuels.com
seeandbeyourfuture.com
myarhaus.com
samas.store
burntheshipre.com
theherdsherpa.com
timesmarketing360.com
jochenhendrich.net
erisearch.com
mathewdartbassoon.com
xiaolt.top
984561.com
thevegie.com
wrtink.com
khazafna.com
gacor-terus-tiap-hari.xyz
bestconejohomes.com
goldentigre.online
cesiesis.com
credits-suiisse.com
texasmotorcycletransport.com
ascensionsresumes.com
zelestialcosmetics.com
corporativogrupomg.com
ovth-cksu.com
coronarycoach.com
vvv-btk.info
precisionsfittings.com
7890156.com
themidnightgospel.com
algurg-living.com
flores3x1.net
fanshu.space
tprs.club
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral1/memory/2840-10-0x0000000000400000-0x000000000042A000-memory.dmp xloader behavioral1/memory/2840-7-0x0000000000400000-0x000000000042A000-memory.dmp xloader behavioral1/memory/2840-13-0x0000000000400000-0x000000000042A000-memory.dmp xloader behavioral1/memory/2856-21-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2344 set thread context of 2840 2344 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 30 PID 2840 set thread context of 1204 2840 TCPSVCS.EXE 21 PID 2856 set thread context of 1204 2856 cmmon32.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TCPSVCS.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmmon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 39 IoCs
pid Process 2344 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 2344 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 2344 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 2344 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 2344 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 2344 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 2840 TCPSVCS.EXE 2840 TCPSVCS.EXE 2344 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 2344 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe 2856 cmmon32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2840 TCPSVCS.EXE 2840 TCPSVCS.EXE 2840 TCPSVCS.EXE 2856 cmmon32.exe 2856 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2344 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe Token: SeDebugPrivilege 2840 TCPSVCS.EXE Token: SeDebugPrivilege 2856 cmmon32.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2840 2344 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 30 PID 2344 wrote to memory of 2840 2344 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 30 PID 2344 wrote to memory of 2840 2344 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 30 PID 2344 wrote to memory of 2840 2344 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 30 PID 2344 wrote to memory of 2840 2344 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 30 PID 2344 wrote to memory of 2840 2344 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 30 PID 2344 wrote to memory of 2840 2344 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 30 PID 2344 wrote to memory of 2840 2344 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 30 PID 1204 wrote to memory of 2856 1204 Explorer.EXE 31 PID 1204 wrote to memory of 2856 1204 Explorer.EXE 31 PID 1204 wrote to memory of 2856 1204 Explorer.EXE 31 PID 1204 wrote to memory of 2856 1204 Explorer.EXE 31 PID 2856 wrote to memory of 2988 2856 cmmon32.exe 32 PID 2856 wrote to memory of 2988 2856 cmmon32.exe 32 PID 2856 wrote to memory of 2988 2856 cmmon32.exe 32 PID 2856 wrote to memory of 2988 2856 cmmon32.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe"C:\Users\Admin\AppData\Local\Temp\f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\TCPSVCS.EXE"C:\Windows\SysWOW64\TCPSVCS.EXE"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\TCPSVCS.EXE"3⤵
- System Location Discovery: System Language Discovery
PID:2988
-
-