Analysis
-
max time kernel
135s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:29
Static task
static1
Behavioral task
behavioral1
Sample
f65dccca258ad9ea722aa7a66188f55f5f80a274bb9090a02f4c3b6d7ef9fe5e.exe
Resource
win7-20240903-en
General
-
Target
f65dccca258ad9ea722aa7a66188f55f5f80a274bb9090a02f4c3b6d7ef9fe5e.exe
-
Size
533KB
-
MD5
74dcc6e092f153a156440a45476dd3d9
-
SHA1
9c625f5c2bde5235f406fe6d08e52d5c39d627ed
-
SHA256
f65dccca258ad9ea722aa7a66188f55f5f80a274bb9090a02f4c3b6d7ef9fe5e
-
SHA512
c33a3a6f59666c90947967520b82d8a77abd07bcfc13b9aadf5cedf641e3b337d68f21c93345a887371a06641ad88ece7074af146cd4fba021c68fce95363ab3
-
SSDEEP
12288:IgOUT6enUemHO2OxwYcosOmRm+meGbbp2:IFNu2O/uQdN2
Malware Config
Extracted
xloader
2.5
seqa
alstartnpasumo5.xyz
jarvisbranding.com
kyiv-bdsm.club
hunttools.info
bantaleautomotiveengineers.com
comercioexpresschilpancingo.com
smallbusinessalliancegroup.com
swlawfirmok.com
marketciphermerch.com
gxmmvcn.icu
betwonsikayet.com
bise.tech
minismi2.com
bucklestylez.com
hereford-cattle.com
yufude.com
tangerineinit.com
destinyforfreedom.com
team-rwby-project.com
richardkmartinez.store
aazmok.com
omgaan.xyz
homeadditon.com
bmsafetyconsulting.com
one-wayyhvsdi.online
newviewannarbor.com
nourishtothrive.online
simplyhoodclothing.com
sylverrepair.com
mogyog.com
evitarestafas.online
insurgo.group
scienceworldapub.com
supeusps.com
schtefo.net
fashiononriverwalk.com
aaronlala.store
boggbages.com
pebinfraprojects.com
sm4885.com
cijie.quest
neuhausimmobilien.com
apsdigital.online
clocksimplyforest.xyz
abtransportes.com
nuvy.digital
jeewancoco.com
tr-forexcoin.com
aimenssushi.com
agenciavectores.com
webmakers.xyz
rooms-1247163.com
selangyihao3.xyz
doulaiba.net
sxuseon.com
doquro.com
nbbb2.com
mariaconsultores.com
javsite.xyz
reclaimingeurope.com
albertaint.com
sattaking-delhiborder14.xyz
cardealsukorg.com
homeschoolreading.academy
hybridsea.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/2904-9-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4832 set thread context of 2904 4832 f65dccca258ad9ea722aa7a66188f55f5f80a274bb9090a02f4c3b6d7ef9fe5e.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f65dccca258ad9ea722aa7a66188f55f5f80a274bb9090a02f4c3b6d7ef9fe5e.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2904 f65dccca258ad9ea722aa7a66188f55f5f80a274bb9090a02f4c3b6d7ef9fe5e.exe 2904 f65dccca258ad9ea722aa7a66188f55f5f80a274bb9090a02f4c3b6d7ef9fe5e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4832 f65dccca258ad9ea722aa7a66188f55f5f80a274bb9090a02f4c3b6d7ef9fe5e.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4832 wrote to memory of 2904 4832 f65dccca258ad9ea722aa7a66188f55f5f80a274bb9090a02f4c3b6d7ef9fe5e.exe 90 PID 4832 wrote to memory of 2904 4832 f65dccca258ad9ea722aa7a66188f55f5f80a274bb9090a02f4c3b6d7ef9fe5e.exe 90 PID 4832 wrote to memory of 2904 4832 f65dccca258ad9ea722aa7a66188f55f5f80a274bb9090a02f4c3b6d7ef9fe5e.exe 90 PID 4832 wrote to memory of 2904 4832 f65dccca258ad9ea722aa7a66188f55f5f80a274bb9090a02f4c3b6d7ef9fe5e.exe 90 PID 4832 wrote to memory of 2904 4832 f65dccca258ad9ea722aa7a66188f55f5f80a274bb9090a02f4c3b6d7ef9fe5e.exe 90 PID 4832 wrote to memory of 2904 4832 f65dccca258ad9ea722aa7a66188f55f5f80a274bb9090a02f4c3b6d7ef9fe5e.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\f65dccca258ad9ea722aa7a66188f55f5f80a274bb9090a02f4c3b6d7ef9fe5e.exe"C:\Users\Admin\AppData\Local\Temp\f65dccca258ad9ea722aa7a66188f55f5f80a274bb9090a02f4c3b6d7ef9fe5e.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Users\Admin\AppData\Local\Temp\f65dccca258ad9ea722aa7a66188f55f5f80a274bb9090a02f4c3b6d7ef9fe5e.exe"C:\Users\Admin\AppData\Local\Temp\f65dccca258ad9ea722aa7a66188f55f5f80a274bb9090a02f4c3b6d7ef9fe5e.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2904
-