Analysis
-
max time kernel
102s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:55
Static task
static1
Behavioral task
behavioral1
Sample
e3840b075daf6dc551b27af25e1f267859424be0383df415e554c1630f47f06d.exe
Resource
win7-20241023-en
General
-
Target
e3840b075daf6dc551b27af25e1f267859424be0383df415e554c1630f47f06d.exe
-
Size
1.0MB
-
MD5
2a18e326c67bc62fadf1b897e2653c47
-
SHA1
67b5e4920118d62f37b15c0746d691a00e457309
-
SHA256
e3840b075daf6dc551b27af25e1f267859424be0383df415e554c1630f47f06d
-
SHA512
018fb7459624a6707a26471ec0b8450ced219d4b7abd5ffcfff36c60455809de393eb204a427be6a91b134bc33d4baf12e6baf707f2218e250f5b80b69285ec7
-
SSDEEP
24576:wAEhaozWd4qjKlwrb7ddYVvgebPkAZv5nPW3Ry2Z:wrzK82fhOVNb8AZv5nPw82Z
Malware Config
Extracted
xloader
2.3
a8si
mosquitocontrolpro.com
omfgphil.com
qqkit.net
compusolutionsac.com
skynetaccess.com
helmetmoto.com
webdomoupravitel.com
thepocket-onlinelesson.xyz
stefaniehirsch.space
goalsandballs.com
xn--bro-ba-3ya.com
tomrings.com
4520oceanviewavenue.com
mamaebemorientada.com
shopwreathrails.com
restaurantestancia.com
annaquatics.info
mnarchitect.design
best-cleaner.com
jobhuizhan.com
check-info-bank.network
boostcoachingonline.com
basimogroup.com
076fb5.com
conansr.icu
numbereightturquoise.com
southernbrushworks.com
home-inland.com
irrpa.com
ethereumdailypay.com
betsysellsswfl.com
cutebyconstance.website
modelsnt.com
medifilt.com
tracisolomon.xyz
dchaulingdisposal.com
minchenhy.com
smart4earth.com
rackembilliards.com
benschiller-coaching.com
virtualroasters.com
applewholesales.com
thesidspot.com
grechenblogs.com
marshlandlogisticsservices.net
covidokotoks.com
mirabilla.com
hunab.tech
foreverjsdesigns.com
heipacc.info
simon-schilling.com
shirleyeluiz.com
juguetibicicollectors.com
70shousemanchester.com
tranthaolinh.net
urbanpokebar.com
madras-spice.com
fulmardelta.net
drisu-goalkeeping.com
jiotest.com
vitatiensa.com
melbournebusinesslawyers.net
rajehomes.com
company-for-you.com
rogegalmish.com
Signatures
-
Xloader family
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral2/memory/2384-8-0x00000000050B0000-0x00000000050BC000-memory.dmp CustAttr -
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/1020-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2384 set thread context of 1020 2384 e3840b075daf6dc551b27af25e1f267859424be0383df415e554c1630f47f06d.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3840b075daf6dc551b27af25e1f267859424be0383df415e554c1630f47f06d.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1020 e3840b075daf6dc551b27af25e1f267859424be0383df415e554c1630f47f06d.exe 1020 e3840b075daf6dc551b27af25e1f267859424be0383df415e554c1630f47f06d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2384 wrote to memory of 1020 2384 e3840b075daf6dc551b27af25e1f267859424be0383df415e554c1630f47f06d.exe 99 PID 2384 wrote to memory of 1020 2384 e3840b075daf6dc551b27af25e1f267859424be0383df415e554c1630f47f06d.exe 99 PID 2384 wrote to memory of 1020 2384 e3840b075daf6dc551b27af25e1f267859424be0383df415e554c1630f47f06d.exe 99 PID 2384 wrote to memory of 1020 2384 e3840b075daf6dc551b27af25e1f267859424be0383df415e554c1630f47f06d.exe 99 PID 2384 wrote to memory of 1020 2384 e3840b075daf6dc551b27af25e1f267859424be0383df415e554c1630f47f06d.exe 99 PID 2384 wrote to memory of 1020 2384 e3840b075daf6dc551b27af25e1f267859424be0383df415e554c1630f47f06d.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\e3840b075daf6dc551b27af25e1f267859424be0383df415e554c1630f47f06d.exe"C:\Users\Admin\AppData\Local\Temp\e3840b075daf6dc551b27af25e1f267859424be0383df415e554c1630f47f06d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\e3840b075daf6dc551b27af25e1f267859424be0383df415e554c1630f47f06d.exe"C:\Users\Admin\AppData\Local\Temp\e3840b075daf6dc551b27af25e1f267859424be0383df415e554c1630f47f06d.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1020
-