Analysis
-
max time kernel
93s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:28
Static task
static1
Behavioral task
behavioral1
Sample
a509c6fdeabc79d6672015fec0194be2ec231eab3e07aaf1eb0a51a02357f06c.exe
Resource
win7-20240903-en
General
-
Target
a509c6fdeabc79d6672015fec0194be2ec231eab3e07aaf1eb0a51a02357f06c.exe
-
Size
619KB
-
MD5
195ba9b47899890aa692102ce46fdf60
-
SHA1
6ec9de21caa418a57b71de73434fb1b1be2037e3
-
SHA256
a509c6fdeabc79d6672015fec0194be2ec231eab3e07aaf1eb0a51a02357f06c
-
SHA512
c01db4b34635b24a7d482acbbfd644eb0d79e662e996511455df69af34aedb74ef13632354ab53ecce525bfacdafa6a43d19344e3e6067073eeb3afb54cf43ae
-
SSDEEP
12288:NqvGzwkUwuxWzwD9lIXImq4HcwcM3ax69AZaPMC8Yg:NqvddW8DQQYqxT
Malware Config
Extracted
xloader
2.5
hf9j
afrifarmgroup.com
coffeeassiciation.com
unlimit-ed.com
guy.rest
dnemperor.com
ringstorule.com
reelnasty.com
travelgleam.com
sagestyleresale.com
jiaoyizhuan.club
fastred.biz
xn--fiqs8srv0ahj5a.xn--czru2d
eden-foundation.com
exquisite-epoxy-systems.com
luxurycaroffer.com
sdffzc.com
suvsdealsonlinesearchdusorg.com
weihaits.com
fetch-us-mtg-refi.zone
uterinevmkvhm.online
redcarpetwithrob.online
puertasautomaticassalceda.com
blockchainsupport.global
lalasushi.com
picaworks.online
airductcleaningindianapolis.net
maximumdouglas.com
bs2860.com
pharmaceuticalmarking.com
billionaireroyalties.com
libertarias.wiki
cupsnax.com
koutarouserver.com
crazydealeon.com
amoraprimeirajogada.com
fearlessfashionaccessories.biz
ella.tech
breackae.xyz
hostmatadvice.com
aestheticnursearie.com
henryzingo.com
folpro.com
kooles.com
rushingrofogg.xyz
377techan.com
sprookjesbosch.store
newsymphonie.net
lawswashington.com
homesandhorses.net
jacobalexandermusic.com
ll1ysq.biz
faceresurfacing.com
thekeappro.com
joycemalaysiaproperty.com
traexcel.com
subsoilcorp.com
thejoannaha.com
477karakabayrd.com
bfcmtld.com
kuratours.com
group-place.com
sixtreechina.com
rattansagar.com
ascenddronenews.com
dubaibiologicdentist.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/664-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1536 set thread context of 664 1536 a509c6fdeabc79d6672015fec0194be2ec231eab3e07aaf1eb0a51a02357f06c.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a509c6fdeabc79d6672015fec0194be2ec231eab3e07aaf1eb0a51a02357f06c.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 664 a509c6fdeabc79d6672015fec0194be2ec231eab3e07aaf1eb0a51a02357f06c.exe 664 a509c6fdeabc79d6672015fec0194be2ec231eab3e07aaf1eb0a51a02357f06c.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1536 wrote to memory of 664 1536 a509c6fdeabc79d6672015fec0194be2ec231eab3e07aaf1eb0a51a02357f06c.exe 95 PID 1536 wrote to memory of 664 1536 a509c6fdeabc79d6672015fec0194be2ec231eab3e07aaf1eb0a51a02357f06c.exe 95 PID 1536 wrote to memory of 664 1536 a509c6fdeabc79d6672015fec0194be2ec231eab3e07aaf1eb0a51a02357f06c.exe 95 PID 1536 wrote to memory of 664 1536 a509c6fdeabc79d6672015fec0194be2ec231eab3e07aaf1eb0a51a02357f06c.exe 95 PID 1536 wrote to memory of 664 1536 a509c6fdeabc79d6672015fec0194be2ec231eab3e07aaf1eb0a51a02357f06c.exe 95 PID 1536 wrote to memory of 664 1536 a509c6fdeabc79d6672015fec0194be2ec231eab3e07aaf1eb0a51a02357f06c.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\a509c6fdeabc79d6672015fec0194be2ec231eab3e07aaf1eb0a51a02357f06c.exe"C:\Users\Admin\AppData\Local\Temp\a509c6fdeabc79d6672015fec0194be2ec231eab3e07aaf1eb0a51a02357f06c.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\a509c6fdeabc79d6672015fec0194be2ec231eab3e07aaf1eb0a51a02357f06c.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:664
-