Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:27
Static task
static1
Behavioral task
behavioral1
Sample
dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe
Resource
win7-20240903-en
General
-
Target
dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe
-
Size
1.6MB
-
MD5
ba840e7358bb4e302e1fb21af1e3c77a
-
SHA1
6d3b9505425e00c404216b853ff6dcea40f286d0
-
SHA256
dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77
-
SHA512
0e9b0ca9340d37aed1207cd4f1886584e61a8eee38aeb3c0f4c41d2dc7cf8c5b280d1abfb4086d23441e1a2a33baa80d47b782f2e2cb79026bbd5adeeb3c2c60
-
SSDEEP
24576:7Bvct+W5oaXpcB7mVSaccPuvcd5OGQT/1/0nS+7n4SYwqK4zf3RTsAHWAgqChJ+N:p6iecPBGj2IpqpFNQuiNB/e
Malware Config
Extracted
xloader
2.3
c8bs
wdreparaciones.com
cateac.com
thenaturalattar.com
maebaelife.com
yh28r.com
ethiopiantravelguru.com
creative-artworks.net
palominomobilenotary.com
thelaundrymate.site
sgacraft.online
starbleach.com
nhansacvietnam.net
menab2b.net
xn--2osw87cr3a47lw2o.com
ztxwnqe.icu
zbzs02.com
vikkstarswazoneshowdown.com
beijingjin6.icu
sawingtechnologies.com
szzycb.com
mspu8-01.com
phoenixnewhomesales.com
vfmkyvroztfiuym.com
scottsdaleheatingrepair.com
buyatauction.net
obscuresupply.com
trendspets.com
photoonedit.com
palmiyebaca.com
voudebalde.com
dos2file.com
kayeducates.com
ongpoint.com
robux.onl
ipjingjiquan.net
linkedinmassivetraffic.com
lamartraders.com
callatmos.com
ahssascreations.com
recoba.net
aqsaas.com
hattonluxurykids.com
jalantoolcentre.com
gigahigh.com
xn--elektrikdkkan-4ob31f.com
barondevelopers.com
gddelivered.com
aglimmerofhopefoundation.info
primepatent.com
productoramag.com
casearchive.net
smilepleaseweb.com
mindfulstartkids.com
tlula252.com
mesarecordingstudio.com
anniuenart.com
frontlineofthemovement.com
bainrix.com
makeit.agency
nukecompositingtutorials.com
wallstreetrunoff.com
piperstructural.com
earthmaster.online
myreti.com
nedalzone.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/464-18-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4588 set thread context of 464 4588 dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1732 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 4588 dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe 464 dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe 464 dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4588 dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4588 wrote to memory of 1732 4588 dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe 91 PID 4588 wrote to memory of 1732 4588 dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe 91 PID 4588 wrote to memory of 1732 4588 dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe 91 PID 4588 wrote to memory of 464 4588 dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe 93 PID 4588 wrote to memory of 464 4588 dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe 93 PID 4588 wrote to memory of 464 4588 dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe 93 PID 4588 wrote to memory of 464 4588 dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe 93 PID 4588 wrote to memory of 464 4588 dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe 93 PID 4588 wrote to memory of 464 4588 dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe"C:\Users\Admin\AppData\Local\Temp\dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wiWdfAno" /XML "C:\Users\Admin\AppData\Local\Temp\tmp56A7.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe"C:\Users\Admin\AppData\Local\Temp\dc8cd94e547cd182eb96ea6d3af0b25bcf11827d6a0f8fcd4d340358e1f9bc77.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58489e43abc8a2e943f1f6116493c9675
SHA11f6f180422bbae47c79c4ef8c50cd48e6dfeae91
SHA256b6ff11326a6fcbef45efa507fbd4d5f97e8eb82edc3da468fa35dae3e1e83cc6
SHA5127ee25a1432e186c16ee283055dddcee7ccb2730a5eff7fa7b7cb6d793d1805272a327a941885af6f7200aa190316246316f2428c8c2a03513ad1c034c012cc78