Analysis
-
max time kernel
106s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:56
Static task
static1
Behavioral task
behavioral1
Sample
a3327c95da3017b7f9f87eeeef8ccba7373e363facad5024432b7aba20a9b832.exe
Resource
win7-20240903-en
General
-
Target
a3327c95da3017b7f9f87eeeef8ccba7373e363facad5024432b7aba20a9b832.exe
-
Size
455KB
-
MD5
ca35b660415defe96fe6af4eb3a45d86
-
SHA1
61345b9633b50081b63b65bbf95410d265ea6ce5
-
SHA256
a3327c95da3017b7f9f87eeeef8ccba7373e363facad5024432b7aba20a9b832
-
SHA512
62dada14561a3c53bfd26c0468cee8ae6f7172c4495f78273eaf7e541f54d90d61d1ec59b49f4ad24aabcb42d663391290d041da67edc0148f3f7de33ecc3535
-
SSDEEP
12288:lr3++81XB6UShhRodjvFfWMyYNkdEK+7Wiv60O:df81XBwEdjvVfo+CJ
Malware Config
Extracted
xloader
2.3
8zdn
yourherogarden.net
onlineharambee.net
cerrajeriaurgencias24horas.com
distritoforex.com
verifyclientserverssr.com
dandwg.com
co2-zero.global
joshssl.com
meckwt.com
theammf.com
rawclectic.com
gzgnetwork.com
richmondavenuecoc.com
nicolelyte.com
thetinyclosetboutique.com
llt-group.net
seven-sky-design.com
joganifinancialgrp.com
elementsvapes.com
bingent.info
quaichshop.net
unethicalsgsblaw.com
matts.digital
lexafit.com
covidwanderings.com
pk972.com
fanashaadivine.com
winharadesigns.com
adosignite.com
goldengatesimmigration.com
unazampanelcuore.com
gasexecutive.com
sdps365.net
worthingtonminnesota.com
ducatsupply.com
beijinghui1.icu
hn-bet.com
homeforsalesteamboat.com
tiaozaoxinlingshou.net
mrbils.net
depuitycollector.com
winningovereating.com
usedonlyrvs.com
verbinoz.com
threepocketmedia.com
lizbing.com
fivestardogfoods.com
edevercal.net
irisettelment.com
beautyphernalia.com
terrawindglobalprotection.net
floridaindian.com
kidzistore.com
kulisbet117.com
logingatech.info
ftdk.net
lawwise.legal
bruthawar.com
lemonpublishing.com
6781529.com
zfxsotc.com
shroomsdrop.com
ahm-app.com
finesilversmith.com
basiclablife.com
Signatures
-
Xloader family
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral2/memory/4116-7-0x00000000055F0000-0x00000000055F8000-memory.dmp CustAttr -
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/1144-11-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4116 set thread context of 1144 4116 a3327c95da3017b7f9f87eeeef8ccba7373e363facad5024432b7aba20a9b832.exe 100 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a3327c95da3017b7f9f87eeeef8ccba7373e363facad5024432b7aba20a9b832.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1144 a3327c95da3017b7f9f87eeeef8ccba7373e363facad5024432b7aba20a9b832.exe 1144 a3327c95da3017b7f9f87eeeef8ccba7373e363facad5024432b7aba20a9b832.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4116 wrote to memory of 1144 4116 a3327c95da3017b7f9f87eeeef8ccba7373e363facad5024432b7aba20a9b832.exe 100 PID 4116 wrote to memory of 1144 4116 a3327c95da3017b7f9f87eeeef8ccba7373e363facad5024432b7aba20a9b832.exe 100 PID 4116 wrote to memory of 1144 4116 a3327c95da3017b7f9f87eeeef8ccba7373e363facad5024432b7aba20a9b832.exe 100 PID 4116 wrote to memory of 1144 4116 a3327c95da3017b7f9f87eeeef8ccba7373e363facad5024432b7aba20a9b832.exe 100 PID 4116 wrote to memory of 1144 4116 a3327c95da3017b7f9f87eeeef8ccba7373e363facad5024432b7aba20a9b832.exe 100 PID 4116 wrote to memory of 1144 4116 a3327c95da3017b7f9f87eeeef8ccba7373e363facad5024432b7aba20a9b832.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3327c95da3017b7f9f87eeeef8ccba7373e363facad5024432b7aba20a9b832.exe"C:\Users\Admin\AppData\Local\Temp\a3327c95da3017b7f9f87eeeef8ccba7373e363facad5024432b7aba20a9b832.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\a3327c95da3017b7f9f87eeeef8ccba7373e363facad5024432b7aba20a9b832.exe"C:\Users\Admin\AppData\Local\Temp\a3327c95da3017b7f9f87eeeef8ccba7373e363facad5024432b7aba20a9b832.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1144
-