Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:50
Behavioral task
behavioral1
Sample
bin.exe
Resource
win7-20241010-en
General
-
Target
bin.exe
-
Size
160KB
-
MD5
fd5beee3f5bc16a77925f249ccb74436
-
SHA1
c2e45775aee31244abec4ebd5ae14b5b091c5fe1
-
SHA256
0b350577e82bb333a55a1ee5977a04b14ad3c274c3f8ee374c0329c309df0e2a
-
SHA512
0734d6f262ca92191da6f6275e3ed07696b3ec75c7e95ae7409c4962881a121588a6475e797731e3a297b35c0b957aaac685267f180f7551ee0c7ca70b86ec00
-
SSDEEP
3072:RaB426jIqOi0aostcjgAbLtdfO+dbMdMl2npiduLK3NpqegZluI+:Rxe6zosC8GL/O+dod0djGfln+
Malware Config
Extracted
xloader
2.3
cvrn
nxwatson.com
thegoodskart.com
jamiewaack.com
starvideoproduction.com
htwengenharia.com
shqipria.info
mybeauty.education
pphemr.net
relaxmorning.com
cunix88.com
bhartiyabrand.com
sofiedeneef.com
chabakaton.com
qianyanwanfu.com
testamentvorlage.club
gm321.com
dataxamarin.com
guktree.com
castroarchitects.com
prize-ad.com
chicrenegade.com
mondaymindsets.com
gzjkbio.com
theseventhgateway.com
sjj-1688.com
jesusgonzalezrebollo.com
kismetkatie.com
hondausedcarswestpalm.com
airfitstudio.com
decherry.com
sexynbald.com
escortbd.com
saniyahair.com
test-atti.com
artemadness.net
mikeg.productions
mycovidindustry.com
phomepee.com
yadouganggou.com
viruslow.com
fantastichamburgers.com
geekdigi.com
leadershipprojectpac.com
kimsrnrlife.com
ecalamar.com
sukheylr.com
thefamilysmatter.com
valleyislemaui.com
rikascake.com
andrealbson.com
thehue-gc.com
politica.group
yiangosa.com
digitalstratagies.online
newbeesgroup.com
rtstsllc.com
konstanceberkyterza.site
pavimentosligerosbarcelona.net
xn--80aesloagtd.xn--p1acf
the-lost-company.com
buyrightwater.com
futeboplayhd.com
thehardhats.com
edmcleaningservice.com
shoppinkksugar.com
Signatures
-
Xloader family
-
Xloader payload 2 IoCs
Processes:
resource yara_rule behavioral2/memory/3396-2-0x0000000000AB0000-0x0000000000AD8000-memory.dmp xloader behavioral2/memory/3064-7-0x0000000000390000-0x00000000003B8000-memory.dmp xloader -
Suspicious use of SetThreadContext 2 IoCs
Processes:
bin.exemstsc.exedescription pid Process procid_target PID 3396 set thread context of 3592 3396 bin.exe 56 PID 3064 set thread context of 3592 3064 mstsc.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
bin.exemstsc.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
Processes:
bin.exemstsc.exepid Process 3396 bin.exe 3396 bin.exe 3396 bin.exe 3396 bin.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe 3064 mstsc.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
bin.exemstsc.exepid Process 3396 bin.exe 3396 bin.exe 3396 bin.exe 3064 mstsc.exe 3064 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
bin.exemstsc.exedescription pid Process Token: SeDebugPrivilege 3396 bin.exe Token: SeDebugPrivilege 3064 mstsc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
Explorer.EXEmstsc.exedescription pid Process procid_target PID 3592 wrote to memory of 3064 3592 Explorer.EXE 83 PID 3592 wrote to memory of 3064 3592 Explorer.EXE 83 PID 3592 wrote to memory of 3064 3592 Explorer.EXE 83 PID 3064 wrote to memory of 2076 3064 mstsc.exe 86 PID 3064 wrote to memory of 2076 3064 mstsc.exe 86 PID 3064 wrote to memory of 2076 3064 mstsc.exe 86
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\bin.exe"C:\Users\Admin\AppData\Local\Temp\bin.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3396
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\bin.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2076
-
-