Analysis
-
max time kernel
148s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:28
Static task
static1
Behavioral task
behavioral1
Sample
NEPTUNE M 17112021_xlxs.exe
Resource
win7-20240903-en
General
-
Target
NEPTUNE M 17112021_xlxs.exe
-
Size
820KB
-
MD5
c984a1c9d32ebb1ac91ae7aa8bfe997f
-
SHA1
382edbc64117b655df612ebd7d0342d8eac6e269
-
SHA256
220c05d85e6a90823ff827cf628564d36e1f8324bbb14b976b49525861ffc07b
-
SHA512
6148544ae224bbe8dc578d86104fa939d5a4b936e9db9ec98a5da7dcd5c9996235d1df979ad39f8e84d836baa2044ef037aec33331b6431e17b8dbe43083c78a
-
SSDEEP
12288:4nqPhCcfZ/2YpYPMn5WYoj/APEavp0mBXR+5RKUS4S2zG9+aw9cNq0p2W:ak/2YpX5W94PEaR0mBB+NS4jZqN
Malware Config
Extracted
xloader
2.5
cfb2
modafemme.store
adriankazer.com
littlerockgardens.com
peolinkbroker.com
gulfandinlandlimited.com
overseasentry.online
jen4x.com
saltysirenapparel.com
sprintfingers.com
obio-energi.com
auroralunaclothing.com
imafuckingretard.net
finalimpactoutdoors.com
haylcion.com
cybertice.com
nikaluda.com
juliana-nails.online
karbalacanning.com
candouventures.net
solarpanelscapegirardeaumo.com
freeflowinspiration.com
jesuspass.com
primafiel.com
woodpallettreasure.com
8i0ogn.biz
hellowordshop.com
fiveparkonmiamibeach.com
familylawmich.com
g20work.com
primelinemarketing.net
tremblaycormier.com
omexomnimesla.com
drunkenbrainfarts.com
incrediblevacations.online
greatcorvus.com
lkdgd.com
ancorasoftwareinc.com
metaversealive.com
lespiecesmp.com
lucasandemma.net
saftcos.com
godiswithus.online
zjdancheng.com
shinkobe-sr.com
ss9854.com
statisticsacademy.com
jdtractorworksllc.com
ajhstudios.com
skylahav.xyz
blackfarma.com
abbelectronique.com
mooredataentry.com
greencow.agency
csgroupag.com
elektrischeautosndlnet.com
somewhereat11pm.com
thestable.art
doleword.com
jpmhomes.net
beelineschooldoc.com
cabenomeubolso.com
kylelandrum.com
secure01bchslogin.com
lukelawless.net
naskitchen.online
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2740-15-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2740-19-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2756-24-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2916 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1956 set thread context of 2740 1956 NEPTUNE M 17112021_xlxs.exe 31 PID 2740 set thread context of 1244 2740 NEPTUNE M 17112021_xlxs.exe 21 PID 2756 set thread context of 1244 2756 systray.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NEPTUNE M 17112021_xlxs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systray.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 1956 NEPTUNE M 17112021_xlxs.exe 1956 NEPTUNE M 17112021_xlxs.exe 1956 NEPTUNE M 17112021_xlxs.exe 1956 NEPTUNE M 17112021_xlxs.exe 1956 NEPTUNE M 17112021_xlxs.exe 1956 NEPTUNE M 17112021_xlxs.exe 2740 NEPTUNE M 17112021_xlxs.exe 2740 NEPTUNE M 17112021_xlxs.exe 2756 systray.exe 2756 systray.exe 2756 systray.exe 2756 systray.exe 2756 systray.exe 2756 systray.exe 2756 systray.exe 2756 systray.exe 2756 systray.exe 2756 systray.exe 2756 systray.exe 2756 systray.exe 2756 systray.exe 2756 systray.exe 2756 systray.exe 2756 systray.exe 2756 systray.exe 2756 systray.exe 2756 systray.exe 2756 systray.exe 2756 systray.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2740 NEPTUNE M 17112021_xlxs.exe 2740 NEPTUNE M 17112021_xlxs.exe 2740 NEPTUNE M 17112021_xlxs.exe 2756 systray.exe 2756 systray.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1956 NEPTUNE M 17112021_xlxs.exe Token: SeDebugPrivilege 2740 NEPTUNE M 17112021_xlxs.exe Token: SeDebugPrivilege 2756 systray.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2740 1956 NEPTUNE M 17112021_xlxs.exe 31 PID 1956 wrote to memory of 2740 1956 NEPTUNE M 17112021_xlxs.exe 31 PID 1956 wrote to memory of 2740 1956 NEPTUNE M 17112021_xlxs.exe 31 PID 1956 wrote to memory of 2740 1956 NEPTUNE M 17112021_xlxs.exe 31 PID 1956 wrote to memory of 2740 1956 NEPTUNE M 17112021_xlxs.exe 31 PID 1956 wrote to memory of 2740 1956 NEPTUNE M 17112021_xlxs.exe 31 PID 1956 wrote to memory of 2740 1956 NEPTUNE M 17112021_xlxs.exe 31 PID 1244 wrote to memory of 2756 1244 Explorer.EXE 32 PID 1244 wrote to memory of 2756 1244 Explorer.EXE 32 PID 1244 wrote to memory of 2756 1244 Explorer.EXE 32 PID 1244 wrote to memory of 2756 1244 Explorer.EXE 32 PID 2756 wrote to memory of 2916 2756 systray.exe 33 PID 2756 wrote to memory of 2916 2756 systray.exe 33 PID 2756 wrote to memory of 2916 2756 systray.exe 33 PID 2756 wrote to memory of 2916 2756 systray.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\NEPTUNE M 17112021_xlxs.exe"C:\Users\Admin\AppData\Local\Temp\NEPTUNE M 17112021_xlxs.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\NEPTUNE M 17112021_xlxs.exe"C:\Users\Admin\AppData\Local\Temp\NEPTUNE M 17112021_xlxs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\NEPTUNE M 17112021_xlxs.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2916
-
-