Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:27
Static task
static1
Behavioral task
behavioral1
Sample
0aaa73b1b2b951f7a10dc7a4c8e77b2f659ca543f6b650894f92976342bad792.exe
Resource
win7-20240903-en
General
-
Target
0aaa73b1b2b951f7a10dc7a4c8e77b2f659ca543f6b650894f92976342bad792.exe
-
Size
851KB
-
MD5
49bcec7debb3c44746deae7f46e81a53
-
SHA1
f9b97e9f1de7fb216236f11f376bb27d722290fd
-
SHA256
0aaa73b1b2b951f7a10dc7a4c8e77b2f659ca543f6b650894f92976342bad792
-
SHA512
307bff05d4b863e8f8d32730571cf8e6819f254665eb695b9f22aaba1d8656bad924299b981aae2899917a71f4792caf3759007cd2bad566fcf1da54558a1d28
-
SSDEEP
12288:jMpPHPrZ0O0eUsj93S/aOZM0SoUzHRsegL8Y1PsJ7H0MI0AvCtYJ9jRz1JEJOiM9:wPrpiyOZM0YHfqk7HnI0AvCtYn1/
Malware Config
Extracted
xloader
2.5
qize
mamyscare.com
fasttogrowbusiness.com
smtrbrnd.com
nifties.ink
armorbit.net
self-mastery.academy
race-event.info
tomreagan.com
buybitcoin20.com
legittradersfx.com
masonpaintingandcontracting.com
puregarment.com
m33933.com
360metaverse.biz
altsiona.com
egdevils.online
waygao.com
ikmbc-b01.com
share138.com
1sa.online
ammarus.com
kkd477.xyz
leanbellyofficial-sites.online
restosku.net
hieunmph17303.xyz
mauritiuslandesbank.net
scoodemys.com
seatacmidcentury.com
uprgoad.com
e50-c1.com
outgenerallytap.xyz
wieisdebaas.info
inthelex.net
were.store
x2donline.com
consofreight.com
warwithyourself.com
thebracecasecompany.com
beezflybynyt.com
jecivandonutricionista.online
harmonyvmkohn.online
elitefenders.com
ktnspace.xyz
cvetyzhizni.com
solanimal.com
nhancuoidiamond.online
logosreader.com
stephaniejohnsoninc.com
pknox.net
healthylifegoddess.com
jillianvansice.com
dunnshighcountry.com
jessicanutrition.com
melanievanderleenen.com
lentilsslonhw.xyz
jlisalang.website
yesicart.store
designssavelives.com
corporateballin.com
parkrapidslodgingcompany.com
flitsbezorgers.com
grandstrandcleaningservices.com
featvrda.com
huakshar.com
leadsmaster.xyz
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2728-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2576 set thread context of 2728 2576 0aaa73b1b2b951f7a10dc7a4c8e77b2f659ca543f6b650894f92976342bad792.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0aaa73b1b2b951f7a10dc7a4c8e77b2f659ca543f6b650894f92976342bad792.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2576 0aaa73b1b2b951f7a10dc7a4c8e77b2f659ca543f6b650894f92976342bad792.exe 2576 0aaa73b1b2b951f7a10dc7a4c8e77b2f659ca543f6b650894f92976342bad792.exe 2576 0aaa73b1b2b951f7a10dc7a4c8e77b2f659ca543f6b650894f92976342bad792.exe 2576 0aaa73b1b2b951f7a10dc7a4c8e77b2f659ca543f6b650894f92976342bad792.exe 2576 0aaa73b1b2b951f7a10dc7a4c8e77b2f659ca543f6b650894f92976342bad792.exe 2576 0aaa73b1b2b951f7a10dc7a4c8e77b2f659ca543f6b650894f92976342bad792.exe 2728 0aaa73b1b2b951f7a10dc7a4c8e77b2f659ca543f6b650894f92976342bad792.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2576 0aaa73b1b2b951f7a10dc7a4c8e77b2f659ca543f6b650894f92976342bad792.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2576 wrote to memory of 2728 2576 0aaa73b1b2b951f7a10dc7a4c8e77b2f659ca543f6b650894f92976342bad792.exe 31 PID 2576 wrote to memory of 2728 2576 0aaa73b1b2b951f7a10dc7a4c8e77b2f659ca543f6b650894f92976342bad792.exe 31 PID 2576 wrote to memory of 2728 2576 0aaa73b1b2b951f7a10dc7a4c8e77b2f659ca543f6b650894f92976342bad792.exe 31 PID 2576 wrote to memory of 2728 2576 0aaa73b1b2b951f7a10dc7a4c8e77b2f659ca543f6b650894f92976342bad792.exe 31 PID 2576 wrote to memory of 2728 2576 0aaa73b1b2b951f7a10dc7a4c8e77b2f659ca543f6b650894f92976342bad792.exe 31 PID 2576 wrote to memory of 2728 2576 0aaa73b1b2b951f7a10dc7a4c8e77b2f659ca543f6b650894f92976342bad792.exe 31 PID 2576 wrote to memory of 2728 2576 0aaa73b1b2b951f7a10dc7a4c8e77b2f659ca543f6b650894f92976342bad792.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0aaa73b1b2b951f7a10dc7a4c8e77b2f659ca543f6b650894f92976342bad792.exe"C:\Users\Admin\AppData\Local\Temp\0aaa73b1b2b951f7a10dc7a4c8e77b2f659ca543f6b650894f92976342bad792.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\0aaa73b1b2b951f7a10dc7a4c8e77b2f659ca543f6b650894f92976342bad792.exe"C:\Users\Admin\AppData\Local\Temp\0aaa73b1b2b951f7a10dc7a4c8e77b2f659ca543f6b650894f92976342bad792.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2728
-