Analysis
-
max time kernel
146s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 19:50
Behavioral task
behavioral1
Sample
bin.exe
Resource
win7-20241010-en
General
-
Target
bin.exe
-
Size
160KB
-
MD5
fd5beee3f5bc16a77925f249ccb74436
-
SHA1
c2e45775aee31244abec4ebd5ae14b5b091c5fe1
-
SHA256
0b350577e82bb333a55a1ee5977a04b14ad3c274c3f8ee374c0329c309df0e2a
-
SHA512
0734d6f262ca92191da6f6275e3ed07696b3ec75c7e95ae7409c4962881a121588a6475e797731e3a297b35c0b957aaac685267f180f7551ee0c7ca70b86ec00
-
SSDEEP
3072:RaB426jIqOi0aostcjgAbLtdfO+dbMdMl2npiduLK3NpqegZluI+:Rxe6zosC8GL/O+dod0djGfln+
Malware Config
Extracted
xloader
2.3
cvrn
nxwatson.com
thegoodskart.com
jamiewaack.com
starvideoproduction.com
htwengenharia.com
shqipria.info
mybeauty.education
pphemr.net
relaxmorning.com
cunix88.com
bhartiyabrand.com
sofiedeneef.com
chabakaton.com
qianyanwanfu.com
testamentvorlage.club
gm321.com
dataxamarin.com
guktree.com
castroarchitects.com
prize-ad.com
chicrenegade.com
mondaymindsets.com
gzjkbio.com
theseventhgateway.com
sjj-1688.com
jesusgonzalezrebollo.com
kismetkatie.com
hondausedcarswestpalm.com
airfitstudio.com
decherry.com
sexynbald.com
escortbd.com
saniyahair.com
test-atti.com
artemadness.net
mikeg.productions
mycovidindustry.com
phomepee.com
yadouganggou.com
viruslow.com
fantastichamburgers.com
geekdigi.com
leadershipprojectpac.com
kimsrnrlife.com
ecalamar.com
sukheylr.com
thefamilysmatter.com
valleyislemaui.com
rikascake.com
andrealbson.com
thehue-gc.com
politica.group
yiangosa.com
digitalstratagies.online
newbeesgroup.com
rtstsllc.com
konstanceberkyterza.site
pavimentosligerosbarcelona.net
xn--80aesloagtd.xn--p1acf
the-lost-company.com
buyrightwater.com
futeboplayhd.com
thehardhats.com
edmcleaningservice.com
shoppinkksugar.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2884-2-0x0000000000F70000-0x0000000000F98000-memory.dmp xloader behavioral1/memory/2884-6-0x0000000000F70000-0x0000000000F98000-memory.dmp xloader behavioral1/memory/2784-12-0x0000000000080000-0x00000000000A8000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 3064 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
bin.execmd.exedescription pid Process procid_target PID 2884 set thread context of 1188 2884 bin.exe 21 PID 2884 set thread context of 1188 2884 bin.exe 21 PID 2784 set thread context of 1188 2784 cmd.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
bin.execmd.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
bin.execmd.exepid Process 2884 bin.exe 2884 bin.exe 2884 bin.exe 2784 cmd.exe 2784 cmd.exe 2784 cmd.exe 2784 cmd.exe 2784 cmd.exe 2784 cmd.exe 2784 cmd.exe 2784 cmd.exe 2784 cmd.exe 2784 cmd.exe 2784 cmd.exe 2784 cmd.exe 2784 cmd.exe 2784 cmd.exe 2784 cmd.exe 2784 cmd.exe 2784 cmd.exe 2784 cmd.exe 2784 cmd.exe 2784 cmd.exe 2784 cmd.exe 2784 cmd.exe 2784 cmd.exe 2784 cmd.exe 2784 cmd.exe 2784 cmd.exe 2784 cmd.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
bin.execmd.exepid Process 2884 bin.exe 2884 bin.exe 2884 bin.exe 2884 bin.exe 2784 cmd.exe 2784 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
bin.execmd.exedescription pid Process Token: SeDebugPrivilege 2884 bin.exe Token: SeDebugPrivilege 2784 cmd.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
bin.execmd.exedescription pid Process procid_target PID 2884 wrote to memory of 2784 2884 bin.exe 31 PID 2884 wrote to memory of 2784 2884 bin.exe 31 PID 2884 wrote to memory of 2784 2884 bin.exe 31 PID 2884 wrote to memory of 2784 2884 bin.exe 31 PID 2784 wrote to memory of 3064 2784 cmd.exe 32 PID 2784 wrote to memory of 3064 2784 cmd.exe 32 PID 2784 wrote to memory of 3064 2784 cmd.exe 32 PID 2784 wrote to memory of 3064 2784 cmd.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\bin.exe"C:\Users\Admin\AppData\Local\Temp\bin.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"3⤵PID:1484
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\bin.exe"4⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3064
-
-
-