Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:27
Static task
static1
Behavioral task
behavioral1
Sample
dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe
Resource
win7-20240903-en
General
-
Target
dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe
-
Size
1.6MB
-
MD5
ba840e7358bb4e302e1fb21af1e3c77a
-
SHA1
6d3b9505425e00c404216b853ff6dcea40f286d0
-
SHA256
dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77
-
SHA512
0e9b0ca9340d37aed1207cd4f1886584e61a8eee38aeb3c0f4c41d2dc7cf8c5b280d1abfb4086d23441e1a2a33baa80d47b782f2e2cb79026bbd5adeeb3c2c60
-
SSDEEP
24576:7Bvct+W5oaXpcB7mVSaccPuvcd5OGQT/1/0nS+7n4SYwqK4zf3RTsAHWAgqChJ+N:p6iecPBGj2IpqpFNQuiNB/e
Malware Config
Extracted
xloader
2.3
c8bs
wdreparaciones.com
cateac.com
thenaturalattar.com
maebaelife.com
yh28r.com
ethiopiantravelguru.com
creative-artworks.net
palominomobilenotary.com
thelaundrymate.site
sgacraft.online
starbleach.com
nhansacvietnam.net
menab2b.net
xn--2osw87cr3a47lw2o.com
ztxwnqe.icu
zbzs02.com
vikkstarswazoneshowdown.com
beijingjin6.icu
sawingtechnologies.com
szzycb.com
mspu8-01.com
phoenixnewhomesales.com
vfmkyvroztfiuym.com
scottsdaleheatingrepair.com
buyatauction.net
obscuresupply.com
trendspets.com
photoonedit.com
palmiyebaca.com
voudebalde.com
dos2file.com
kayeducates.com
ongpoint.com
robux.onl
ipjingjiquan.net
linkedinmassivetraffic.com
lamartraders.com
callatmos.com
ahssascreations.com
recoba.net
aqsaas.com
hattonluxurykids.com
jalantoolcentre.com
gigahigh.com
xn--elektrikdkkan-4ob31f.com
barondevelopers.com
gddelivered.com
aglimmerofhopefoundation.info
primepatent.com
productoramag.com
casearchive.net
smilepleaseweb.com
mindfulstartkids.com
tlula252.com
mesarecordingstudio.com
anniuenart.com
frontlineofthemovement.com
bainrix.com
makeit.agency
nukecompositingtutorials.com
wallstreetrunoff.com
piperstructural.com
earthmaster.online
myreti.com
nedalzone.com
Signatures
-
Xloader family
-
Xloader payload 2 IoCs
resource yara_rule behavioral1/memory/2664-18-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2664-21-0x00000000008C0000-0x0000000000BC3000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1684 set thread context of 2664 1684 dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2772 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1684 dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe 2664 dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1684 dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1684 wrote to memory of 2772 1684 dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe 31 PID 1684 wrote to memory of 2772 1684 dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe 31 PID 1684 wrote to memory of 2772 1684 dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe 31 PID 1684 wrote to memory of 2772 1684 dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe 31 PID 1684 wrote to memory of 2664 1684 dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe 33 PID 1684 wrote to memory of 2664 1684 dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe 33 PID 1684 wrote to memory of 2664 1684 dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe 33 PID 1684 wrote to memory of 2664 1684 dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe 33 PID 1684 wrote to memory of 2664 1684 dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe 33 PID 1684 wrote to memory of 2664 1684 dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe 33 PID 1684 wrote to memory of 2664 1684 dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe"C:\Users\Admin\AppData\Local\Temp\dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wiWdfAno" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA100.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2772
-
-
C:\Users\Admin\AppData\Local\Temp\dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe"C:\Users\Admin\AppData\Local\Temp\dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57d983913cdc9203b020910449ab77d0d
SHA1b7493f910a74876ff9b7d48cce85f399f0f533e5
SHA25621013577c660241f3fae289d797cee52d87afe21929b0b99e0c13b8565629663
SHA51224689e42210c229ea2c2d17ee968eaa593f016c49610bebecd9b482710b7f598da66daa866c65c45b67507a69d5e96536833ee27ee2eff15b86e845e0c05dcb5