Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 19:55
Behavioral task
behavioral1
Sample
b5aa56b1df29b386fdc8ab5b37b5c9b6d82ce07ada2d7dfa72e032ed85bc4989.exe
Resource
win7-20241010-en
General
-
Target
b5aa56b1df29b386fdc8ab5b37b5c9b6d82ce07ada2d7dfa72e032ed85bc4989.exe
-
Size
585KB
-
MD5
dde77a728a1b702ff6a33abbae4355e7
-
SHA1
04787344a6c90238784e02ba7163c05d11a9b9be
-
SHA256
b5aa56b1df29b386fdc8ab5b37b5c9b6d82ce07ada2d7dfa72e032ed85bc4989
-
SHA512
0445494258b61c3f2235bd6bf0bf33dbd627f247eb27973c4b706385c952d8d718499c9aaad2899d11944e821bc45f64928ccb04ad18e9dbeee7b4f71243de76
-
SSDEEP
12288:rXe9PPlowWX0t6mOQwg1Qd15CcYk0We10p5WViXp0VFarPjvBf+rn+4:yhloDX0XOf48+Y6VFINmF
Malware Config
Extracted
xloader
2.3
cttb
annarbor-weeddelivery.com
capquangept.com
mind.srl
blazingboard.com
wecallnzhome.com
moritamorio.com
jyxq.net
dabanse.com
luma-dating.com
2020won.com
lucydemo63.com
misskarenenglisheacher.com
tuckersucks.com
northeastprivacy.com
whipitinventions.com
casino-r6.club
asmrempowerment.com
topkids.asia
mattressmonth.com
antivirus-zastita.com
pubgforumuc.com
viridienergy101.com
dulcivazquez.com
onlineprzelew.online
uberlike-appsolutions.com
hadekainsaat.com
messagebx.net
youfancyoptical.com
therugbyworldshop.store
xwspjx.com
homesteadtraditions.com
hxc52.com
cesarbobadillagutierrez.com
shoukuanji.net
cemeterm.com
topgameclub.com
bestasseater.com
nilbahis5.com
mvmvihirhgzmxve.com
thecannabisclass.com
citrongaming.com
txid.wtf
sherepix.com
fulmaruav.net
ag38ag.com
thesamword.com
internationalrelocator.com
service-wells.com
createdtobe.website
ecojango.com
royalvroom.com
ginaismyagent.com
hgcgolfcarts.com
crandlecastingco.com
breakthrue.com
0-mag.com
yes50book.com
musicthink.asia
wasfatsahla.com
nachhaltigkeitslotsen.com
fantasyweddingsnj.com
banjarafactory.com
tfnwcs.com
tri-starheat.com
defolu.net
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2356-9-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2344-10-0x0000000000400000-0x0000000000554000-memory.dmp autoit_exe -
resource yara_rule behavioral1/memory/2344-0-0x0000000000400000-0x0000000000554000-memory.dmp upx behavioral1/memory/2344-10-0x0000000000400000-0x0000000000554000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b5aa56b1df29b386fdc8ab5b37b5c9b6d82ce07ada2d7dfa72e032ed85bc4989.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2344 b5aa56b1df29b386fdc8ab5b37b5c9b6d82ce07ada2d7dfa72e032ed85bc4989.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2356 2344 b5aa56b1df29b386fdc8ab5b37b5c9b6d82ce07ada2d7dfa72e032ed85bc4989.exe 31 PID 2344 wrote to memory of 2356 2344 b5aa56b1df29b386fdc8ab5b37b5c9b6d82ce07ada2d7dfa72e032ed85bc4989.exe 31 PID 2344 wrote to memory of 2356 2344 b5aa56b1df29b386fdc8ab5b37b5c9b6d82ce07ada2d7dfa72e032ed85bc4989.exe 31 PID 2344 wrote to memory of 2356 2344 b5aa56b1df29b386fdc8ab5b37b5c9b6d82ce07ada2d7dfa72e032ed85bc4989.exe 31 PID 2344 wrote to memory of 2356 2344 b5aa56b1df29b386fdc8ab5b37b5c9b6d82ce07ada2d7dfa72e032ed85bc4989.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5aa56b1df29b386fdc8ab5b37b5c9b6d82ce07ada2d7dfa72e032ed85bc4989.exe"C:\Users\Admin\AppData\Local\Temp\b5aa56b1df29b386fdc8ab5b37b5c9b6d82ce07ada2d7dfa72e032ed85bc4989.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\b5aa56b1df29b386fdc8ab5b37b5c9b6d82ce07ada2d7dfa72e032ed85bc4989.exe"C:\Users\Admin\AppData\Local\Temp\b5aa56b1df29b386fdc8ab5b37b5c9b6d82ce07ada2d7dfa72e032ed85bc4989.exe"2⤵PID:2356
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
216KB
MD52ea229f3ca45ff7bc956cc5fccfa2a05
SHA1ab59a4d9c51fe82a597448d3bcf00032b70ca771
SHA25683dbc3a5ddac892e433d25b4789fb80a78619b07423fdce2b25d02312c4ae605
SHA512e8bfed7d85c44ba0224618a3db66be8d1bfa5a66fc35db0f8d485b3815df35245e32e167129d1d4317166e20f1f3beef9ac0c2f38745959033a4600a87992c27