Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:30
Static task
static1
Behavioral task
behavioral1
Sample
3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c.exe
Resource
win7-20240903-en
General
-
Target
3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c.exe
-
Size
463KB
-
MD5
9c670b350585c15094b92dbbbd46d456
-
SHA1
9a63f9d2f3a91cc1bf6376ad9293d99e331ac1f1
-
SHA256
3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c
-
SHA512
b0ac0275523b633419c0dbca35cb53aabbb9143d7906ae00c2a5b29437dda8ba07176b0d20eede4fc50337c1e53f04fb1aaee3f4076add83d7de4c7744f57c44
-
SSDEEP
6144:jC7IkOPgc6xiNFAZGOmEyDqOaZjjsFf1San4TIn3f:+jnVgNFAZGYX2F9Sa3
Malware Config
Extracted
xloader
2.3
nu8e
joansmoviereviews.com
tronicsbuyer.com
test-amqatest-27-08-2020.com
localwebsurvey.email
toptierschools.com
exoticfilipina.com
iregentos.info
ic500500.com
z3255vsrwqstudio.club
dacabionline.com
innov-learners.com
redwardenstudios.com
payprscn.com
hannahmadeya.com
acandenizhukuk.com
alhaddarnewse.com
aestheticsbrazil.com
amandamcmahon.net
naughtykittyllc.com
germantoolbox.com
thelittlesunshinestore.com
successclickmg.com
lfmanyan.com
huzurmermer.net
megami-online.com
putrc.com
yourbackstagepasses.com
trinityhousegoa.com
gproweb.com
transformationretreat.com
positivemotion.art
busmanholiday.com
feerosedeco.com
cerritosphilosophy.club
shelter911.com
oxcontracting.com
talesontwowheels.com
sandbarbargrille.com
electrumtech.support
uaenrb.com
kictexpo.com
ofertascenturfit.com
tiantianhanju.com
coollivinghawaii.com
savitridevi.net
sekaimeshi.com
magicmindsetacademy.com
themoonbulb.com
amplifythecross.com
chuangyibianxian.com
chou18.com
kenoshariot.com
labraxpk.com
allurecbd.store
nde.bet
yjdave.com
judyflanaganart.com
amazonunion.com
gattisicecream.com
naturalselfheal.com
tol-con.com
jinanlanwo.com
hp516.com
findingyourbranch.com
firstbirthdayphotoshoot.com
Signatures
-
Xloader family
-
Xloader payload 2 IoCs
resource yara_rule behavioral1/memory/2532-3-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2532-2-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2132 set thread context of 2532 2132 3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2532 3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2132 3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2132 wrote to memory of 2532 2132 3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c.exe 31 PID 2132 wrote to memory of 2532 2132 3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c.exe 31 PID 2132 wrote to memory of 2532 2132 3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c.exe 31 PID 2132 wrote to memory of 2532 2132 3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c.exe 31 PID 2132 wrote to memory of 2532 2132 3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c.exe"C:\Users\Admin\AppData\Local\Temp\3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c.exe"C:\Users\Admin\AppData\Local\Temp\3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2532
-