Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 19:58
Static task
static1
Behavioral task
behavioral1
Sample
Scanned Enquires.exe
Resource
win7-20241023-en
General
-
Target
Scanned Enquires.exe
-
Size
1.1MB
-
MD5
9abd9b9521e406af49f9fb0e565d213f
-
SHA1
aea9b4c2dec2895be98fd9f4e10aac40df711879
-
SHA256
6771c3c843a0128509585cf697d7c466ae15c3c586789fdd3d7928328e0236c0
-
SHA512
f0a8255cdd0ae4ec56ea2bb5cb48736e6935a2761ccb98d30bb5cb9db5bf931c4f93e9f79b7321eaf899e5b3cf4507a8febba8a953b4ccd91ab4b06087386b90
-
SSDEEP
12288:F8/tsfA+hiNmT0tBBWX/BVhu1cDb9AgNP+bKWTAivJrYjM5XxmCyW+F3fJJCFuZC:FitqA+hi86zep0kOa+HlOjmmCyzBJC
Malware Config
Extracted
xloader
2.3
meub
ebookcu.com
sherwooddaydesigns.com
healthcarebb.com
pixelflydesigns.com
youtegou.net
audiokeychin.com
rioranchoeventscenter.com
nickofolas.com
comicstattoosnguns.com
ally.tech
paperplaneexplorer.com
janetkk.com
sun1981.com
pocopage.com
shortagegoal.com
tbluelinux.com
servantsheartvalet.com
jkhushal.com
91huangyu.com
portlandconservatory.net
crazyasskaren.com
gr8.photos
silviabiasiolipatisserie.com
goeseo.com
shellyluther.com
salvemosalsuroeste.com
technologies.email
xn--80aasvjfhla.xn--p1acf
dmowang.com
mylifeusaaatworkportal.com
electronicszap.com
thefrankversion.com
patricksparber.com
m-kenterprises.com
goodcreditcardshome.info
shegotit.club
nutinbutter.com
bridgestreetresources.com
tjanyancha.com
qqstoneandcabinet.com
topstitch.info
shadyshainarae.com
meucamarimoficial.com
gatedless.net
aal888.com
tstcongo.com
luckyladybugnailswithlisa.com
usapersonalshopper.com
893645tuerigjo.com
pbjengineering.com
katbumydbnjk.mobi
bostonm.info
amesshop.com
k-9homefinders.com
philbaileyrealestate.com
ahxinnuojie.com
ardougne.com
pasteleriaruth.com
vauvakuumettapodcast.com
aryamakoran.com
digitalspacepod.com
clarkstrain.com
plantbasedranch.com
therapylightclub.com
uuoouu-90.store
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/568-15-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/568-19-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/568-23-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2604 set thread context of 568 2604 Scanned Enquires.exe 31 PID 568 set thread context of 1232 568 Scanned Enquires.exe 21 PID 568 set thread context of 1232 568 Scanned Enquires.exe 21 -
Program crash 1 IoCs
pid pid_target Process procid_target 2736 772 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Scanned Enquires.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 568 Scanned Enquires.exe 568 Scanned Enquires.exe 568 Scanned Enquires.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 568 Scanned Enquires.exe 568 Scanned Enquires.exe 568 Scanned Enquires.exe 568 Scanned Enquires.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 568 Scanned Enquires.exe Token: SeShutdownPrivilege 1232 Explorer.EXE Token: SeShutdownPrivilege 1232 Explorer.EXE Token: SeShutdownPrivilege 1232 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2604 wrote to memory of 568 2604 Scanned Enquires.exe 31 PID 2604 wrote to memory of 568 2604 Scanned Enquires.exe 31 PID 2604 wrote to memory of 568 2604 Scanned Enquires.exe 31 PID 2604 wrote to memory of 568 2604 Scanned Enquires.exe 31 PID 2604 wrote to memory of 568 2604 Scanned Enquires.exe 31 PID 2604 wrote to memory of 568 2604 Scanned Enquires.exe 31 PID 2604 wrote to memory of 568 2604 Scanned Enquires.exe 31 PID 1232 wrote to memory of 772 1232 Explorer.EXE 32 PID 1232 wrote to memory of 772 1232 Explorer.EXE 32 PID 1232 wrote to memory of 772 1232 Explorer.EXE 32 PID 1232 wrote to memory of 772 1232 Explorer.EXE 32 PID 1232 wrote to memory of 772 1232 Explorer.EXE 32 PID 1232 wrote to memory of 772 1232 Explorer.EXE 32 PID 1232 wrote to memory of 772 1232 Explorer.EXE 32 PID 772 wrote to memory of 2736 772 msiexec.exe 33 PID 772 wrote to memory of 2736 772 msiexec.exe 33 PID 772 wrote to memory of 2736 772 msiexec.exe 33 PID 772 wrote to memory of 2736 772 msiexec.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\Scanned Enquires.exe"C:\Users\Admin\AppData\Local\Temp\Scanned Enquires.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\Scanned Enquires.exe"C:\Users\Admin\AppData\Local\Temp\Scanned Enquires.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:568
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 772 -s 2683⤵
- Program crash
PID:2736
-
-