Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:28
Static task
static1
Behavioral task
behavioral1
Sample
NEPTUNE M 17112021_xlxs.exe
Resource
win7-20240903-en
General
-
Target
NEPTUNE M 17112021_xlxs.exe
-
Size
820KB
-
MD5
c984a1c9d32ebb1ac91ae7aa8bfe997f
-
SHA1
382edbc64117b655df612ebd7d0342d8eac6e269
-
SHA256
220c05d85e6a90823ff827cf628564d36e1f8324bbb14b976b49525861ffc07b
-
SHA512
6148544ae224bbe8dc578d86104fa939d5a4b936e9db9ec98a5da7dcd5c9996235d1df979ad39f8e84d836baa2044ef037aec33331b6431e17b8dbe43083c78a
-
SSDEEP
12288:4nqPhCcfZ/2YpYPMn5WYoj/APEavp0mBXR+5RKUS4S2zG9+aw9cNq0p2W:ak/2YpX5W94PEaR0mBB+NS4jZqN
Malware Config
Extracted
xloader
2.5
cfb2
modafemme.store
adriankazer.com
littlerockgardens.com
peolinkbroker.com
gulfandinlandlimited.com
overseasentry.online
jen4x.com
saltysirenapparel.com
sprintfingers.com
obio-energi.com
auroralunaclothing.com
imafuckingretard.net
finalimpactoutdoors.com
haylcion.com
cybertice.com
nikaluda.com
juliana-nails.online
karbalacanning.com
candouventures.net
solarpanelscapegirardeaumo.com
freeflowinspiration.com
jesuspass.com
primafiel.com
woodpallettreasure.com
8i0ogn.biz
hellowordshop.com
fiveparkonmiamibeach.com
familylawmich.com
g20work.com
primelinemarketing.net
tremblaycormier.com
omexomnimesla.com
drunkenbrainfarts.com
incrediblevacations.online
greatcorvus.com
lkdgd.com
ancorasoftwareinc.com
metaversealive.com
lespiecesmp.com
lucasandemma.net
saftcos.com
godiswithus.online
zjdancheng.com
shinkobe-sr.com
ss9854.com
statisticsacademy.com
jdtractorworksllc.com
ajhstudios.com
skylahav.xyz
blackfarma.com
abbelectronique.com
mooredataentry.com
greencow.agency
csgroupag.com
elektrischeautosndlnet.com
somewhereat11pm.com
thestable.art
doleword.com
jpmhomes.net
beelineschooldoc.com
cabenomeubolso.com
kylelandrum.com
secure01bchslogin.com
lukelawless.net
naskitchen.online
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/680-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/680-17-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3836-22-0x0000000000910000-0x0000000000939000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1148 set thread context of 680 1148 NEPTUNE M 17112021_xlxs.exe 99 PID 680 set thread context of 3512 680 NEPTUNE M 17112021_xlxs.exe 56 PID 3836 set thread context of 3512 3836 help.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NEPTUNE M 17112021_xlxs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 1148 NEPTUNE M 17112021_xlxs.exe 1148 NEPTUNE M 17112021_xlxs.exe 1148 NEPTUNE M 17112021_xlxs.exe 1148 NEPTUNE M 17112021_xlxs.exe 1148 NEPTUNE M 17112021_xlxs.exe 1148 NEPTUNE M 17112021_xlxs.exe 680 NEPTUNE M 17112021_xlxs.exe 680 NEPTUNE M 17112021_xlxs.exe 680 NEPTUNE M 17112021_xlxs.exe 680 NEPTUNE M 17112021_xlxs.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe 3836 help.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 680 NEPTUNE M 17112021_xlxs.exe 680 NEPTUNE M 17112021_xlxs.exe 680 NEPTUNE M 17112021_xlxs.exe 3836 help.exe 3836 help.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1148 NEPTUNE M 17112021_xlxs.exe Token: SeDebugPrivilege 680 NEPTUNE M 17112021_xlxs.exe Token: SeDebugPrivilege 3836 help.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1148 wrote to memory of 680 1148 NEPTUNE M 17112021_xlxs.exe 99 PID 1148 wrote to memory of 680 1148 NEPTUNE M 17112021_xlxs.exe 99 PID 1148 wrote to memory of 680 1148 NEPTUNE M 17112021_xlxs.exe 99 PID 1148 wrote to memory of 680 1148 NEPTUNE M 17112021_xlxs.exe 99 PID 1148 wrote to memory of 680 1148 NEPTUNE M 17112021_xlxs.exe 99 PID 1148 wrote to memory of 680 1148 NEPTUNE M 17112021_xlxs.exe 99 PID 3512 wrote to memory of 3836 3512 Explorer.EXE 100 PID 3512 wrote to memory of 3836 3512 Explorer.EXE 100 PID 3512 wrote to memory of 3836 3512 Explorer.EXE 100 PID 3836 wrote to memory of 3700 3836 help.exe 101 PID 3836 wrote to memory of 3700 3836 help.exe 101 PID 3836 wrote to memory of 3700 3836 help.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\NEPTUNE M 17112021_xlxs.exe"C:\Users\Admin\AppData\Local\Temp\NEPTUNE M 17112021_xlxs.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\NEPTUNE M 17112021_xlxs.exe"C:\Users\Admin\AppData\Local\Temp\NEPTUNE M 17112021_xlxs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:680
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\NEPTUNE M 17112021_xlxs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3700
-
-