Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:28
Static task
static1
Behavioral task
behavioral1
Sample
d27ea95cff227c46dfbe2cb9dfa6f746633ac5c6f548a0c18a3bb8af7c3017b8.exe
Resource
win7-20240903-en
General
-
Target
d27ea95cff227c46dfbe2cb9dfa6f746633ac5c6f548a0c18a3bb8af7c3017b8.exe
-
Size
527KB
-
MD5
829de14ff481bf90b296a2bb418daf81
-
SHA1
b7976a8fda3f0f27366cd0b0f487ae4de77e64f7
-
SHA256
d27ea95cff227c46dfbe2cb9dfa6f746633ac5c6f548a0c18a3bb8af7c3017b8
-
SHA512
ae402ef574a54fe15ef0bb437588f222dbaa90065fa1a0780e35d6e52809f4429ca2717f21d9cd7e81ab89b5d046691640bee2bcead0ef48e1f0d029eae1d15c
-
SSDEEP
6144:3iefhzZgSqsNo44jy/mP1ia/B/xZfp/FbOkYDMXVApBAdTt0WYnHeZ3Cfkq6fnKf:3icuS5z/QbpPeDMXVA3CaWjyfUOTC
Malware Config
Extracted
xloader
2.5
inga
21sq.xyz
aleimanpaper.com
soulworkerrush.com
lianxiwan.xyz
gorastionse.store
nuhuo333.xyz
greenft.xyz
upisout.com
mgav23.xyz
2day-recv.info
emdestak.com
generatorgmer.xyz
inmyhindi.com
meenubhosale.com
feinquebrantabledoc.com
valgtrizoma.quest
impqtantaou.com
nomorewarnow.com
gmcrjizppcx.mobi
eludice.net
allmoves.net
directionsettingpoint.xyz
gasandliquidcontrols.com
creativeportraitstudios.com
algurg-living.com
plotniska.net
njjbds.com
afromoorishfilms.com
fifihill.com
lamphuchai.xyz
j3ebx4thyf5h.biz
medicinalweed.lat
ankaraogrenciescort.xyz
vendasaprovadaonline.com
joinlegacyforge.com
onthemarket-smartboard.com
anatox-lab.fr
chouwakarunewssokuhou.com
lovawood.com
bethesdaclinicllc.com
sourcemycandles.com
losangelescapainters.com
powersforsupervillains.com
cumbrebomberos.com
mintnft.fund
sxuseon.com
scmce.com
nidoumenojinsei.online
qywyfeo8.xyz
ptmetaverse.com
geoplates.com
csfromsinai.com
xiraji21.com
r-souls.com
findinvest.xyz
stealthcarrier.com
d72gmj3bpdhc.biz
keepitng.com
hobe.agency
coach2college.com
thephilangies.com
adforalums.com
webwideoffers.com
seattlerealestateauction.com
seacoasttractor.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2720-14-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2692 set thread context of 2720 2692 d27ea95cff227c46dfbe2cb9dfa6f746633ac5c6f548a0c18a3bb8af7c3017b8.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d27ea95cff227c46dfbe2cb9dfa6f746633ac5c6f548a0c18a3bb8af7c3017b8.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2720 d27ea95cff227c46dfbe2cb9dfa6f746633ac5c6f548a0c18a3bb8af7c3017b8.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2692 wrote to memory of 2720 2692 d27ea95cff227c46dfbe2cb9dfa6f746633ac5c6f548a0c18a3bb8af7c3017b8.exe 31 PID 2692 wrote to memory of 2720 2692 d27ea95cff227c46dfbe2cb9dfa6f746633ac5c6f548a0c18a3bb8af7c3017b8.exe 31 PID 2692 wrote to memory of 2720 2692 d27ea95cff227c46dfbe2cb9dfa6f746633ac5c6f548a0c18a3bb8af7c3017b8.exe 31 PID 2692 wrote to memory of 2720 2692 d27ea95cff227c46dfbe2cb9dfa6f746633ac5c6f548a0c18a3bb8af7c3017b8.exe 31 PID 2692 wrote to memory of 2720 2692 d27ea95cff227c46dfbe2cb9dfa6f746633ac5c6f548a0c18a3bb8af7c3017b8.exe 31 PID 2692 wrote to memory of 2720 2692 d27ea95cff227c46dfbe2cb9dfa6f746633ac5c6f548a0c18a3bb8af7c3017b8.exe 31 PID 2692 wrote to memory of 2720 2692 d27ea95cff227c46dfbe2cb9dfa6f746633ac5c6f548a0c18a3bb8af7c3017b8.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\d27ea95cff227c46dfbe2cb9dfa6f746633ac5c6f548a0c18a3bb8af7c3017b8.exe"C:\Users\Admin\AppData\Local\Temp\d27ea95cff227c46dfbe2cb9dfa6f746633ac5c6f548a0c18a3bb8af7c3017b8.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\d27ea95cff227c46dfbe2cb9dfa6f746633ac5c6f548a0c18a3bb8af7c3017b8.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2720
-