Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:27
Static task
static1
Behavioral task
behavioral1
Sample
aa9db27b2063f5aee9f97d7d86b883686f51bd030d0b38d6daaed3629a230a7d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
aa9db27b2063f5aee9f97d7d86b883686f51bd030d0b38d6daaed3629a230a7d.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
vvywdeos.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
vvywdeos.exe
Resource
win10v2004-20241007-en
General
-
Target
aa9db27b2063f5aee9f97d7d86b883686f51bd030d0b38d6daaed3629a230a7d.exe
-
Size
271KB
-
MD5
f9a20cce97d6efd9e8d071420a8858b7
-
SHA1
17680094e9bdefe2f5205729f2b55be2ffca81fa
-
SHA256
aa9db27b2063f5aee9f97d7d86b883686f51bd030d0b38d6daaed3629a230a7d
-
SHA512
fb9055d9f19788e0c2d25f3f400165b630ef6f62604d6ee6a764c7a57f5f115737db4187be30641bca16af11d84d3afdde73b0790f5d43f682e10439ed7a1026
-
SSDEEP
6144:zjg3mLX/fN+E4YQaTjiqyYUhOFjuYCN+E+2H:o3mD3N+E4/m4/SCNr
Malware Config
Extracted
xloader
2.5
p00n
beaniemart.com
sugarlaces.online
kinesio-leman.com
gasfreenft.com
ateneaespai.com
askyourhr.com
recruitloft.com
carolinasbestroofingcompany.com
coacher.online
freshmind.today
help-it.online
nicelink17.com
islandtimeoperations.com
agricurve.net
rizkhr.com
innovatorsincommerce.com
grownwings.com
learningout.store
miaglam.com
tengfeijd8.com
cxhz.xyz
papayaflorida.com
bellanotteclub.online
nudeteenpornvideos.com
uowmnsds.icu
neighbourjoy-5.xyz
parkingparcel.com
yfly627.xyz
dooms.one
crushedvmkdla.online
24video-net.com
general-technologies.net
leadgenteambyec4.online
adorango.com
harborfundingconsultants.com
genetest.store
mapa-beograda.net
ppeglovesmasks.com
gleadss.com
mqzkk.com
siterrenos.com
letsmakeyourchoice.com
doseofyouth.com
shoppersgate.online
cdrb028.com
lojamariaml.com
customcabinetshoppaysonut.com
pow4u.com
einfach-mario.com
brasbux.com
indoor-lamps.com
ribblevalleyfairs.com
limonsite.com
cinreyyy.com
mobileinternetpackages.com
cazaclean.com
awaytraveltnpasumo6.xyz
roboskullks.com
sudnettrapline.com
360metaverse.tech
iphone13promax.repair
ichaogupiao.com
kathyrowe.com
it-brainpool.com
greensunergy.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/3016-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/3016-16-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/3016-21-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Executes dropped EXE 2 IoCs
pid Process 2792 vvywdeos.exe 3016 vvywdeos.exe -
Loads dropped DLL 2 IoCs
pid Process 2880 aa9db27b2063f5aee9f97d7d86b883686f51bd030d0b38d6daaed3629a230a7d.exe 2792 vvywdeos.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2792 set thread context of 3016 2792 vvywdeos.exe 32 PID 3016 set thread context of 1352 3016 vvywdeos.exe 21 PID 3016 set thread context of 1352 3016 vvywdeos.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa9db27b2063f5aee9f97d7d86b883686f51bd030d0b38d6daaed3629a230a7d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvywdeos.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3016 vvywdeos.exe 3016 vvywdeos.exe 3016 vvywdeos.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 3016 vvywdeos.exe 3016 vvywdeos.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3016 vvywdeos.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2792 2880 aa9db27b2063f5aee9f97d7d86b883686f51bd030d0b38d6daaed3629a230a7d.exe 30 PID 2880 wrote to memory of 2792 2880 aa9db27b2063f5aee9f97d7d86b883686f51bd030d0b38d6daaed3629a230a7d.exe 30 PID 2880 wrote to memory of 2792 2880 aa9db27b2063f5aee9f97d7d86b883686f51bd030d0b38d6daaed3629a230a7d.exe 30 PID 2880 wrote to memory of 2792 2880 aa9db27b2063f5aee9f97d7d86b883686f51bd030d0b38d6daaed3629a230a7d.exe 30 PID 2792 wrote to memory of 3016 2792 vvywdeos.exe 32 PID 2792 wrote to memory of 3016 2792 vvywdeos.exe 32 PID 2792 wrote to memory of 3016 2792 vvywdeos.exe 32 PID 2792 wrote to memory of 3016 2792 vvywdeos.exe 32 PID 2792 wrote to memory of 3016 2792 vvywdeos.exe 32 PID 2792 wrote to memory of 3016 2792 vvywdeos.exe 32 PID 2792 wrote to memory of 3016 2792 vvywdeos.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\aa9db27b2063f5aee9f97d7d86b883686f51bd030d0b38d6daaed3629a230a7d.exe"C:\Users\Admin\AppData\Local\Temp\aa9db27b2063f5aee9f97d7d86b883686f51bd030d0b38d6daaed3629a230a7d.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\vvywdeos.exeC:\Users\Admin\AppData\Local\Temp\vvywdeos.exe C:\Users\Admin\AppData\Local\Temp\pkjant3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\vvywdeos.exeC:\Users\Admin\AppData\Local\Temp\vvywdeos.exe C:\Users\Admin\AppData\Local\Temp\pkjant4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3016
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD5024f5eb96b56308cfb64fe436e8de447
SHA1307585696be6985d5b7a3289dd4845f534868483
SHA256926d2ab16139435d5fda9b2badafb9d5eefb606faf59cd1c7b44a282a22feefb
SHA512e9754c234a15449ccc1e0d2f72c6a7cc63ef4887c2a5c8a93ab83905e42f3d85e77a1efe6b3e032e8b7d531a722c3b7da62349faf7921539947dd8e117bc650d
-
Filesize
4KB
MD535ba5cfdc4921d469e0f0959c2827785
SHA17295bd83ae1c581099495ec9d8fd9f9b62a97657
SHA256c3a8511a37564f699ee8c9ec8340f73790bf81e55f3327f4d787b13dc333e013
SHA51228be15b241179899df176541c469d49cd555e73871ee515bd2d931370fe416b8ad9b3464cfcb741156af126bcc1cdb9f5b5320671c16ffb1a25876d14952d4dd
-
Filesize
70KB
MD5f357de702f7b08ff1b60c2ca5bbdafa2
SHA1bc9e18bfbb4a9ce14351dfdffc3f57d22b40831a
SHA2569b4b5b5048151f723ca57f67e9107e24c844f1be62b977efaeabedb5d620eaf5
SHA5129b096e239c01f7bf7c946719deb3cadaf206ebd29530cf425a885e7351286b5f010b3fb66a3d55cef5200f2504ef76648789ec95a4935a6ea59a8f51280484d8