Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 19:56
Static task
static1
Behavioral task
behavioral1
Sample
1d5c07529a9cdade02b015da19bd31a5065e6173155a7dc90504fb752f8fcc6e.exe
Resource
win7-20240903-en
General
-
Target
1d5c07529a9cdade02b015da19bd31a5065e6173155a7dc90504fb752f8fcc6e.exe
-
Size
344KB
-
MD5
ef53aac1d971c1953d4ce233b3fe15ef
-
SHA1
13b89c63fb940ffd9aae566b45271685e904109a
-
SHA256
1d5c07529a9cdade02b015da19bd31a5065e6173155a7dc90504fb752f8fcc6e
-
SHA512
d2f3a58bceb5380f0a12b3a1718d1536315a6835019abf8dd6f7db8a31667fa627d921120961c34310788a35cbc6781ec39fafa89797746bef4e5261c7ef6380
-
SSDEEP
6144:58LEcoSsu5aXS7XN6GL/xl+HstePVss9i:5+oN6N6G7x4stePVHi
Malware Config
Extracted
xloader
2.3
spj6
kdelchev.com
myriamward.com
megaconsulting.pro
sunglassesmu.com
hispanavisionct.com
bodaciousbuffy.com
chuhuu.com
jerexcursion.com
merkabahindustries.com
shaktiroommontreal.com
violet-moon-interior-design.com
pyrosunited.com
89xs.xyz
bestchatonline.com
cubiscoin.com
ianzu.com
playersresearch.com
digitalvl.com
baans-barw.com
yuria-rain.com
littletonautoparts.com
maxstratosband.com
landmarkshoes.com
windhowls.com
boonbang.com
ladylacewig.com
football-highlights.online
ampbetting.com
zuerich-orthopaedics.com
divorcequiz.com
idahooutsiders.com
adindia.online
arsenismiaris.com
cougarjack.net
dtbjx.com
streetfoodaroundtheglobe.com
laosredwood.net
northparkcampground.com
fundacjacd.com
3thaiph.com
devavara.com
artworldmag.com
filans.xyz
kuppers.info
abogusz.art
vesivietnam.com
ourforms.net
qmglg.com
unhackabledream.com
inesatwall.info
my-watch-strap.com
nedafarm.com
myonlinesericing.com
shopjrock.com
altac.pro
hodongfarm.com
alienmisttree.net
miamipopcello.com
normiecat.com
beautybar.sucks
myandroidhead.com
edevlet-giris-hizmetler.com
mamamiafoodies.com
pandagsm.com
preciousvessel.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2624-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2872 set thread context of 2624 2872 1d5c07529a9cdade02b015da19bd31a5065e6173155a7dc90504fb752f8fcc6e.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1d5c07529a9cdade02b015da19bd31a5065e6173155a7dc90504fb752f8fcc6e.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2872 1d5c07529a9cdade02b015da19bd31a5065e6173155a7dc90504fb752f8fcc6e.exe 2872 1d5c07529a9cdade02b015da19bd31a5065e6173155a7dc90504fb752f8fcc6e.exe 2624 1d5c07529a9cdade02b015da19bd31a5065e6173155a7dc90504fb752f8fcc6e.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2872 1d5c07529a9cdade02b015da19bd31a5065e6173155a7dc90504fb752f8fcc6e.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2624 2872 1d5c07529a9cdade02b015da19bd31a5065e6173155a7dc90504fb752f8fcc6e.exe 30 PID 2872 wrote to memory of 2624 2872 1d5c07529a9cdade02b015da19bd31a5065e6173155a7dc90504fb752f8fcc6e.exe 30 PID 2872 wrote to memory of 2624 2872 1d5c07529a9cdade02b015da19bd31a5065e6173155a7dc90504fb752f8fcc6e.exe 30 PID 2872 wrote to memory of 2624 2872 1d5c07529a9cdade02b015da19bd31a5065e6173155a7dc90504fb752f8fcc6e.exe 30 PID 2872 wrote to memory of 2624 2872 1d5c07529a9cdade02b015da19bd31a5065e6173155a7dc90504fb752f8fcc6e.exe 30 PID 2872 wrote to memory of 2624 2872 1d5c07529a9cdade02b015da19bd31a5065e6173155a7dc90504fb752f8fcc6e.exe 30 PID 2872 wrote to memory of 2624 2872 1d5c07529a9cdade02b015da19bd31a5065e6173155a7dc90504fb752f8fcc6e.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d5c07529a9cdade02b015da19bd31a5065e6173155a7dc90504fb752f8fcc6e.exe"C:\Users\Admin\AppData\Local\Temp\1d5c07529a9cdade02b015da19bd31a5065e6173155a7dc90504fb752f8fcc6e.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\1d5c07529a9cdade02b015da19bd31a5065e6173155a7dc90504fb752f8fcc6e.exeC:\Users\Admin\AppData\Local\Temp\1d5c07529a9cdade02b015da19bd31a5065e6173155a7dc90504fb752f8fcc6e.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2624
-