Analysis
-
max time kernel
93s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:53
Static task
static1
Behavioral task
behavioral1
Sample
832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121.exe
Resource
win7-20240903-en
General
-
Target
832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121.exe
-
Size
328KB
-
MD5
586bdb5f4c93be7c1eda0a4aaad6b829
-
SHA1
96c7fac9812247cad8152be5206d8ceee7ac9247
-
SHA256
832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121
-
SHA512
29e54c4dfa45851a36255716c2eca90754bb14997e12fd058edaa655e8bf8b8fb932067f407e43b9e5bf35d1136d74658b32319e52277d28d88a2157332dbf12
-
SSDEEP
6144:qfNEub3DnLw24d5+L+WpZeH8hwNUBizYvZWzqWUYxO:qmubD8L5c+WpZeH82Nv0vQyY
Malware Config
Extracted
xloader
2.3
goei
bet365o2.com
gulf-landlord.info
foodsystemsjusticeproject.com
ronwongart.com
fwgkdhg.icu
armanrugservice.com
mapadequito.com
vbkulkarni.com
ltsbinge.com
creativem2.com
mindflexlab.com
ushealthvisa.com
247carkeyslondon.com
addthat.xyz
zanzan8.com
legendsalliance.net
shopflyonline.com
csgo-roll.net
reutbergcapital.com
mediaworkhouse.com
office-tourism-tirana.com
evecrude.xyz
sportwillwin.com
cluskmusk.com
her2mymeme.com
rsw3313.com
digitalmarketingmoves.com
seaworldminecraft.com
onlinecollegetherapy.com
ourmonaca.com
generalflix.com
limonproduce.com
casalomasymphonyorchestra.com
karyapertama.com
massaponaxhighschool.com
covidtracksb.com
breathharbour.net
italianrealestateagents.com
xn--ga-c9a.com
libreo.club
leverhump.store
kevinrsamuels.network
pimpmyrecipe.com
win-back.online
kelasipo.com
caross-china.com
ly-iot.com
nolimitsynthetics.net
epicfriend.club
19come.com
lcjzjt.com
lxpvccard.com
distributorfocuson.com
looneytunesrun.com
mariebiernacki.com
maquinaclub.com
randalldavisauthor.com
niggeruprising.com
theexpatweightcoach.com
mex33.info
imbravura.com
baldosasanjose.com
akindousa.com
ourmunera.net
batiktintaemas.com
Signatures
-
Xloader family
-
Xloader payload 2 IoCs
resource yara_rule behavioral2/memory/4180-2-0x00000000018A0000-0x00000000018CA000-memory.dmp xloader behavioral2/memory/2396-3-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4180 set thread context of 2396 4180 832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2396 832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121.exe 2396 832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4180 wrote to memory of 2396 4180 832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121.exe 84 PID 4180 wrote to memory of 2396 4180 832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121.exe 84 PID 4180 wrote to memory of 2396 4180 832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121.exe 84 PID 4180 wrote to memory of 2396 4180 832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121.exe 84 PID 4180 wrote to memory of 2396 4180 832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121.exe 84 PID 4180 wrote to memory of 2396 4180 832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121.exe"C:\Users\Admin\AppData\Local\Temp\832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121.exe"C:\Users\Admin\AppData\Local\Temp\832cd29741e78c65e4df47581cddeb7459e6db0bf178ed55c48b21719c849121.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2396
-