Analysis
-
max time kernel
94s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 20:30
Static task
static1
Behavioral task
behavioral1
Sample
3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c.exe
Resource
win7-20240903-en
General
-
Target
3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c.exe
-
Size
463KB
-
MD5
9c670b350585c15094b92dbbbd46d456
-
SHA1
9a63f9d2f3a91cc1bf6376ad9293d99e331ac1f1
-
SHA256
3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c
-
SHA512
b0ac0275523b633419c0dbca35cb53aabbb9143d7906ae00c2a5b29437dda8ba07176b0d20eede4fc50337c1e53f04fb1aaee3f4076add83d7de4c7744f57c44
-
SSDEEP
6144:jC7IkOPgc6xiNFAZGOmEyDqOaZjjsFf1San4TIn3f:+jnVgNFAZGYX2F9Sa3
Malware Config
Extracted
xloader
2.3
nu8e
joansmoviereviews.com
tronicsbuyer.com
test-amqatest-27-08-2020.com
localwebsurvey.email
toptierschools.com
exoticfilipina.com
iregentos.info
ic500500.com
z3255vsrwqstudio.club
dacabionline.com
innov-learners.com
redwardenstudios.com
payprscn.com
hannahmadeya.com
acandenizhukuk.com
alhaddarnewse.com
aestheticsbrazil.com
amandamcmahon.net
naughtykittyllc.com
germantoolbox.com
thelittlesunshinestore.com
successclickmg.com
lfmanyan.com
huzurmermer.net
megami-online.com
putrc.com
yourbackstagepasses.com
trinityhousegoa.com
gproweb.com
transformationretreat.com
positivemotion.art
busmanholiday.com
feerosedeco.com
cerritosphilosophy.club
shelter911.com
oxcontracting.com
talesontwowheels.com
sandbarbargrille.com
electrumtech.support
uaenrb.com
kictexpo.com
ofertascenturfit.com
tiantianhanju.com
coollivinghawaii.com
savitridevi.net
sekaimeshi.com
magicmindsetacademy.com
themoonbulb.com
amplifythecross.com
chuangyibianxian.com
chou18.com
kenoshariot.com
labraxpk.com
allurecbd.store
nde.bet
yjdave.com
judyflanaganart.com
amazonunion.com
gattisicecream.com
naturalselfheal.com
tol-con.com
jinanlanwo.com
hp516.com
findingyourbranch.com
firstbirthdayphotoshoot.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/4088-2-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4676 set thread context of 4088 4676 3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4088 3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c.exe 4088 3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4676 3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4676 wrote to memory of 4088 4676 3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c.exe 84 PID 4676 wrote to memory of 4088 4676 3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c.exe 84 PID 4676 wrote to memory of 4088 4676 3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c.exe 84 PID 4676 wrote to memory of 4088 4676 3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c.exe"C:\Users\Admin\AppData\Local\Temp\3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c.exe"C:\Users\Admin\AppData\Local\Temp\3dd09fd4260601900a344471ec20765518599ec29a36bd70ec820ec88ab6543c.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4088
-