Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:27
Static task
static1
Behavioral task
behavioral1
Sample
f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe
Resource
win7-20241010-en
General
-
Target
f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe
-
Size
1.0MB
-
MD5
5e65687e6dfe0d3b02757fecea0b130a
-
SHA1
27fef89564b277da09f18bbdc9215c65b1ee729e
-
SHA256
f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f
-
SHA512
4388eba08207189a816c5eb2b09776186c48aa02ba1407c4108a6548d29f1562184beca49c6d2de65510af89f831bec23465f189f336d6bbadc3ff5addd194a0
-
SSDEEP
12288:DGwxGil6fbZkSIl7ganNp5EjMLFIUSr17nyNcWp1SG/23FGva5nlFhZ/Mv4I8PQf:DlNktkSm7ganNp5S0ps3par7LOvlWp
Malware Config
Extracted
xloader
2.5
i9ng
guiadesfralde.online
asjcjm.com
peacefmradio.com
pastasteakandpancake.online
imas-millionlive.com
ori-key.com
emissiontestrepair.com
education-mentor.online
axieinfinity-airdrop.club
iphone13pro.photos
grjeht033.store
plainfiles.com
texasinjurytriallawyers.com
votebrenthagenbuch.com
xn--crahome-cya.com
lquzd.com
anwoguoji.com
tacdating.com
shop-mr.com
pandrwatch.store
horai-chr.com
crowddust.com
contemporarywritings.com
elenahervecaro.com
fjpinrui.com
lesswax.com
sibtest.online
degitalcrime.com
inputflair.com
folge-meinempaket-de.com
mancaoxijing.com
poojafuels.com
seeandbeyourfuture.com
myarhaus.com
samas.store
burntheshipre.com
theherdsherpa.com
timesmarketing360.com
jochenhendrich.net
erisearch.com
mathewdartbassoon.com
xiaolt.top
984561.com
thevegie.com
wrtink.com
khazafna.com
gacor-terus-tiap-hari.xyz
bestconejohomes.com
goldentigre.online
cesiesis.com
credits-suiisse.com
texasmotorcycletransport.com
ascensionsresumes.com
zelestialcosmetics.com
corporativogrupomg.com
ovth-cksu.com
coronarycoach.com
vvv-btk.info
precisionsfittings.com
7890156.com
themidnightgospel.com
algurg-living.com
flores3x1.net
fanshu.space
tprs.club
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral2/memory/3184-6-0x0000000000400000-0x000000000042A000-memory.dmp xloader behavioral2/memory/3184-9-0x0000000000400000-0x000000000042A000-memory.dmp xloader behavioral2/memory/3184-16-0x0000000000400000-0x000000000042A000-memory.dmp xloader behavioral2/memory/3172-23-0x0000000000560000-0x0000000000589000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2488 set thread context of 3184 2488 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 83 PID 3184 set thread context of 3476 3184 icsunattend.exe 56 PID 3184 set thread context of 3476 3184 icsunattend.exe 56 PID 3172 set thread context of 3476 3172 netsh.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language icsunattend.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2488 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 2488 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 2488 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 2488 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 2488 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 2488 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 2488 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 2488 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 3184 icsunattend.exe 3184 icsunattend.exe 3184 icsunattend.exe 3184 icsunattend.exe 2488 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 2488 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 3184 icsunattend.exe 3184 icsunattend.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe 3172 netsh.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 3184 icsunattend.exe 3184 icsunattend.exe 3184 icsunattend.exe 3184 icsunattend.exe 3172 netsh.exe 3172 netsh.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2488 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe Token: SeDebugPrivilege 3184 icsunattend.exe Token: SeDebugPrivilege 3172 netsh.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2488 wrote to memory of 3184 2488 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 83 PID 2488 wrote to memory of 3184 2488 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 83 PID 2488 wrote to memory of 3184 2488 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 83 PID 2488 wrote to memory of 3184 2488 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 83 PID 2488 wrote to memory of 3184 2488 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 83 PID 2488 wrote to memory of 3184 2488 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 83 PID 2488 wrote to memory of 3184 2488 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 83 PID 3476 wrote to memory of 3172 3476 Explorer.EXE 85 PID 3476 wrote to memory of 3172 3476 Explorer.EXE 85 PID 3476 wrote to memory of 3172 3476 Explorer.EXE 85 PID 3172 wrote to memory of 3000 3172 netsh.exe 86 PID 3172 wrote to memory of 3000 3172 netsh.exe 86 PID 3172 wrote to memory of 3000 3172 netsh.exe 86
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe"C:\Users\Admin\AppData\Local\Temp\f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\icsunattend.exe"C:\Windows\SysWOW64\icsunattend.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3184
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\icsunattend.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3000
-
-