Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 19:56
Static task
static1
Behavioral task
behavioral1
Sample
52a3e7f0c298bd3fac67f953c5528ef41060e708a336c9f3c9c5e6e347ff3f00.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
52a3e7f0c298bd3fac67f953c5528ef41060e708a336c9f3c9c5e6e347ff3f00.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/tcjngvzun.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/tcjngvzun.dll
Resource
win10v2004-20241007-en
General
-
Target
52a3e7f0c298bd3fac67f953c5528ef41060e708a336c9f3c9c5e6e347ff3f00.exe
-
Size
304KB
-
MD5
4251d6e3ac2866a8087ca3f682cadbdf
-
SHA1
fc0c6d7b8f39b388ff64c0e15d35c136bef5a79b
-
SHA256
52a3e7f0c298bd3fac67f953c5528ef41060e708a336c9f3c9c5e6e347ff3f00
-
SHA512
e8936b50782ba9b6e50109f04b645049e33d978c77f39f45fcf3730d4f71b55b08bf777118a17c728b191f982d21ccbbb9ddc0b01c1ca96b58e0ce3df60d2e97
-
SSDEEP
6144:rGiCbmp18OIycnYCh22kriWLF0DJS/b4cAtTynWn206zambrBetaDX/1:1V/dChOcSTUtT3cagrMaDX/1
Malware Config
Extracted
xloader
2.5
xa9e
shellthatsells.com
ocelotsdigital.com
worldladder.com
florapac.com
midnight-express.biz
pantherproduct.com
cumits.com
dittamd.com
w388bet.store
muyuanshengshi.com
scrappedmovie.com
investordefence.com
coupdefoudres.com
sideralmkt.online
travwhizz.com
daniellestienstra.com
corbelladvocats.com
annocadans.quest
gabrycancio.com
petrocan.online
gvtklyraqyhb.mobi
ecoenviropost.com
ottosperformance.com
cantoparaelser.com
cdhbyhs.com
extol.design
actibasic.com
tymeesunlimited.com
motodevi.com
teamolemiss.club
d3uc3.com
freedomnofear.com
infiniteviu.com
dewirachma.com
foxstudent.com
henrywrench.com
ethercut.com
onlinetreedoctor.com
1980sy.com
gkynykj.com
airjetsprivate.com
reysbeautystore.com
arstic.com
vacation.works
vjmidias.com
passengerslocatorform.com
abreakradio.net
webworz.com
thebenlystastory.com
vcmetaverse.com
qtomdnwj.xyz
veronicamariefallago.com
portnoyenv.com
treeshirtsplus.com
budjonathon.com
manna17.com
wascowarriors.com
kreativame.com
mpengineeringsolar.com
xpj43234.com
jaimdecor.com
drillpresscenterfinder.com
palmoilalternative.com
woruke.online
byl788.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2604-10-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Loads dropped DLL 1 IoCs
pid Process 2556 52a3e7f0c298bd3fac67f953c5528ef41060e708a336c9f3c9c5e6e347ff3f00.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2556 set thread context of 2604 2556 52a3e7f0c298bd3fac67f953c5528ef41060e708a336c9f3c9c5e6e347ff3f00.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 52a3e7f0c298bd3fac67f953c5528ef41060e708a336c9f3c9c5e6e347ff3f00.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2604 52a3e7f0c298bd3fac67f953c5528ef41060e708a336c9f3c9c5e6e347ff3f00.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2604 2556 52a3e7f0c298bd3fac67f953c5528ef41060e708a336c9f3c9c5e6e347ff3f00.exe 30 PID 2556 wrote to memory of 2604 2556 52a3e7f0c298bd3fac67f953c5528ef41060e708a336c9f3c9c5e6e347ff3f00.exe 30 PID 2556 wrote to memory of 2604 2556 52a3e7f0c298bd3fac67f953c5528ef41060e708a336c9f3c9c5e6e347ff3f00.exe 30 PID 2556 wrote to memory of 2604 2556 52a3e7f0c298bd3fac67f953c5528ef41060e708a336c9f3c9c5e6e347ff3f00.exe 30 PID 2556 wrote to memory of 2604 2556 52a3e7f0c298bd3fac67f953c5528ef41060e708a336c9f3c9c5e6e347ff3f00.exe 30 PID 2556 wrote to memory of 2604 2556 52a3e7f0c298bd3fac67f953c5528ef41060e708a336c9f3c9c5e6e347ff3f00.exe 30 PID 2556 wrote to memory of 2604 2556 52a3e7f0c298bd3fac67f953c5528ef41060e708a336c9f3c9c5e6e347ff3f00.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\52a3e7f0c298bd3fac67f953c5528ef41060e708a336c9f3c9c5e6e347ff3f00.exe"C:\Users\Admin\AppData\Local\Temp\52a3e7f0c298bd3fac67f953c5528ef41060e708a336c9f3c9c5e6e347ff3f00.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\52a3e7f0c298bd3fac67f953c5528ef41060e708a336c9f3c9c5e6e347ff3f00.exe"C:\Users\Admin\AppData\Local\Temp\52a3e7f0c298bd3fac67f953c5528ef41060e708a336c9f3c9c5e6e347ff3f00.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD55b93103b861e156f69643e0c7ac84017
SHA15050ab7ffbf02899505ae533b8879d3db076d3d4
SHA256fe4ef7dd57a355df3cf0bf52fb3d0409e4370178a507639fc0ea179cc4ea6843
SHA51291484cbc4bcbff8e00ec20ce4fa54c1affc07c6889ad52246f7f1d7a2700c1a59b4c38cff2a16464b2403a610112f2ff488a6a52eb2756917d0bdbc96c5e664d