Analysis
-
max time kernel
146s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 19:54
Static task
static1
Behavioral task
behavioral1
Sample
05169db7f1ffd49e6ed73d6d55db576bcd1a89615588f1a2713af98e8f860456.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
05169db7f1ffd49e6ed73d6d55db576bcd1a89615588f1a2713af98e8f860456.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
mlkdtrqkv.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
mlkdtrqkv.exe
Resource
win10v2004-20241007-en
General
-
Target
05169db7f1ffd49e6ed73d6d55db576bcd1a89615588f1a2713af98e8f860456.exe
-
Size
307KB
-
MD5
edf52574766332cf4090475c1c76a913
-
SHA1
26c73c7d963cc95d1b25fc37f0a1c898887971b3
-
SHA256
05169db7f1ffd49e6ed73d6d55db576bcd1a89615588f1a2713af98e8f860456
-
SHA512
34235fb3ee5f5ad249dcdb8efde878a758c0fc7581ca93723028a432f33dda87bcbc27d064d37ec153ca91ce1ec8a8457fad9e224020f167fccbdd79a493a3ae
-
SSDEEP
6144:rGiGYU1PwJbC2i499oTnPAcX9fEdMdKS5ZgLhX7WOQ5yTt:6YmPwJbC74cPt9sdNIqLhXIox
Malware Config
Extracted
xloader
2.5
nv0a
creativehomesrealty.com
hairshopamity.com
karunahotyoga.com
indialowfare.com
abdulnazar.com
art-handmade.com
videofx.store
onboard-alt-digital-avg.rest
lipe-engineering.com
arthurchatfield.com
keencloset.com
jsyonghui.com
hangwei.tech
price-hype.com
rlandislnteriors.com
junewilderwrites.com
dazhongwenzhai.com
tsnefise17.xyz
2ndmobi.com
natemerritt.com
votewhitesellforjudge.com
retrodoo.com
whimpervmkqsi.online
witlyfta.com
travelsci.com
fruitsmarkting.com
victoriouschamp.com
slotsobserver.press
strateficrupee.com
secondave.online
abcrefreshments.com
agonizepor.xyz
carsboard.pro
workanaonline.com
narutture.quest
musiquespoetry.com
inmobeale.com
windmillbusiness.com
banquanku.ink
hemutech.info
xn--poyrazgda-1pb.com
officiall.space
aabfreightbrokers.com
flitsbezorgers.com
sailmoraira.online
spgbr9be8xzz.biz
junglefeverpresents.com
morecreate.com
chrisngosingle.com
nailsestetic.space
suzhaobiao.com
globaltraveltouragency.com
4nvig.info
buffstaff.com
absellgroup.com
ahlsen.store
motosestrada.com
ymg77.com
totallightningactivity.net
fansveres.pro
kapdome.com
lurpak.promo
may999.com
pulselava.com
smartag2.xyz
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/3028-17-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/3028-20-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2812-26-0x0000000000070000-0x0000000000099000-memory.dmp xloader -
Executes dropped EXE 2 IoCs
pid Process 2528 mlkdtrqkv.exe 3028 mlkdtrqkv.exe -
Loads dropped DLL 3 IoCs
pid Process 2236 05169db7f1ffd49e6ed73d6d55db576bcd1a89615588f1a2713af98e8f860456.exe 2236 05169db7f1ffd49e6ed73d6d55db576bcd1a89615588f1a2713af98e8f860456.exe 2528 mlkdtrqkv.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2528 set thread context of 3028 2528 mlkdtrqkv.exe 31 PID 3028 set thread context of 1236 3028 mlkdtrqkv.exe 21 PID 2812 set thread context of 1236 2812 wscript.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 05169db7f1ffd49e6ed73d6d55db576bcd1a89615588f1a2713af98e8f860456.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mlkdtrqkv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 3028 mlkdtrqkv.exe 3028 mlkdtrqkv.exe 2812 wscript.exe 2812 wscript.exe 2812 wscript.exe 2812 wscript.exe 2812 wscript.exe 2812 wscript.exe 2812 wscript.exe 2812 wscript.exe 2812 wscript.exe 2812 wscript.exe 2812 wscript.exe 2812 wscript.exe 2812 wscript.exe 2812 wscript.exe 2812 wscript.exe 2812 wscript.exe 2812 wscript.exe 2812 wscript.exe 2812 wscript.exe 2812 wscript.exe 2812 wscript.exe 2812 wscript.exe 2812 wscript.exe 2812 wscript.exe 2812 wscript.exe 2812 wscript.exe 2812 wscript.exe 2812 wscript.exe 2812 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3028 mlkdtrqkv.exe 3028 mlkdtrqkv.exe 3028 mlkdtrqkv.exe 2812 wscript.exe 2812 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3028 mlkdtrqkv.exe Token: SeDebugPrivilege 2812 wscript.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2528 2236 05169db7f1ffd49e6ed73d6d55db576bcd1a89615588f1a2713af98e8f860456.exe 30 PID 2236 wrote to memory of 2528 2236 05169db7f1ffd49e6ed73d6d55db576bcd1a89615588f1a2713af98e8f860456.exe 30 PID 2236 wrote to memory of 2528 2236 05169db7f1ffd49e6ed73d6d55db576bcd1a89615588f1a2713af98e8f860456.exe 30 PID 2236 wrote to memory of 2528 2236 05169db7f1ffd49e6ed73d6d55db576bcd1a89615588f1a2713af98e8f860456.exe 30 PID 2528 wrote to memory of 3028 2528 mlkdtrqkv.exe 31 PID 2528 wrote to memory of 3028 2528 mlkdtrqkv.exe 31 PID 2528 wrote to memory of 3028 2528 mlkdtrqkv.exe 31 PID 2528 wrote to memory of 3028 2528 mlkdtrqkv.exe 31 PID 2528 wrote to memory of 3028 2528 mlkdtrqkv.exe 31 PID 2528 wrote to memory of 3028 2528 mlkdtrqkv.exe 31 PID 2528 wrote to memory of 3028 2528 mlkdtrqkv.exe 31 PID 1236 wrote to memory of 2812 1236 Explorer.EXE 32 PID 1236 wrote to memory of 2812 1236 Explorer.EXE 32 PID 1236 wrote to memory of 2812 1236 Explorer.EXE 32 PID 1236 wrote to memory of 2812 1236 Explorer.EXE 32 PID 2812 wrote to memory of 2816 2812 wscript.exe 34 PID 2812 wrote to memory of 2816 2812 wscript.exe 34 PID 2812 wrote to memory of 2816 2812 wscript.exe 34 PID 2812 wrote to memory of 2816 2812 wscript.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\05169db7f1ffd49e6ed73d6d55db576bcd1a89615588f1a2713af98e8f860456.exe"C:\Users\Admin\AppData\Local\Temp\05169db7f1ffd49e6ed73d6d55db576bcd1a89615588f1a2713af98e8f860456.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\mlkdtrqkv.exeC:\Users\Admin\AppData\Local\Temp\mlkdtrqkv.exe C:\Users\Admin\AppData\Local\Temp\mfrjwepj3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\mlkdtrqkv.exeC:\Users\Admin\AppData\Local\Temp\mlkdtrqkv.exe C:\Users\Admin\AppData\Local\Temp\mfrjwepj4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\mlkdtrqkv.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2816
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD57052401489ba7912ed76f2e0f43777d9
SHA14322fa68b4a3386c59fc208e2778f48ee83f36c6
SHA25672091bdfa98d545c75711f12bf11f0698e9a9e1f3c2f96df0610f406a5a92b11
SHA512d74755e3cf0701b409aef97398c2375b2b6e46ef4a00c6e9e3862fbf6329003d9ab77fd2d3dd2815a247247888d79b32dee8d65f7e6f30009c0aca8b02b58c2a
-
Filesize
213KB
MD52c8c190e5c29f45f28416f10ef07acda
SHA13d1878b3ffe81f240816b312c9a4960705628741
SHA25677a83d77ef4cea93d3375dceca0e734d478ab7bd24411595c1dde9212d7d0a94
SHA5123ca64785f6397767831f0b9a921807c633b2850164cd3a51a931092615f77f7455a589bf8181d0cbe5ec38bad508b686428889b06341afa7a3b88a0e44221a91
-
Filesize
117KB
MD5d189de48d249626410e9f76ca430ebd8
SHA16a7ab73710c2d2f3a927ef58b16477c634b3fe46
SHA256b12d7fb5370439771f33b99428d12979d59c1d2aff56eb572294e7fd2a7c05d5
SHA5126ca5da001917ac5adceb933a1af72bd08ab0aa63fabf7de0d1d35528e40bb4aa45f65cf55bd4f867e040228b6a18cdda76741bf327687ad0245e3961c40d1a26