Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 19:58
Static task
static1
Behavioral task
behavioral1
Sample
Scanned Enquires.exe
Resource
win7-20241023-en
General
-
Target
Scanned Enquires.exe
-
Size
1.1MB
-
MD5
9abd9b9521e406af49f9fb0e565d213f
-
SHA1
aea9b4c2dec2895be98fd9f4e10aac40df711879
-
SHA256
6771c3c843a0128509585cf697d7c466ae15c3c586789fdd3d7928328e0236c0
-
SHA512
f0a8255cdd0ae4ec56ea2bb5cb48736e6935a2761ccb98d30bb5cb9db5bf931c4f93e9f79b7321eaf899e5b3cf4507a8febba8a953b4ccd91ab4b06087386b90
-
SSDEEP
12288:F8/tsfA+hiNmT0tBBWX/BVhu1cDb9AgNP+bKWTAivJrYjM5XxmCyW+F3fJJCFuZC:FitqA+hi86zep0kOa+HlOjmmCyzBJC
Malware Config
Extracted
xloader
2.3
meub
ebookcu.com
sherwooddaydesigns.com
healthcarebb.com
pixelflydesigns.com
youtegou.net
audiokeychin.com
rioranchoeventscenter.com
nickofolas.com
comicstattoosnguns.com
ally.tech
paperplaneexplorer.com
janetkk.com
sun1981.com
pocopage.com
shortagegoal.com
tbluelinux.com
servantsheartvalet.com
jkhushal.com
91huangyu.com
portlandconservatory.net
crazyasskaren.com
gr8.photos
silviabiasiolipatisserie.com
goeseo.com
shellyluther.com
salvemosalsuroeste.com
technologies.email
xn--80aasvjfhla.xn--p1acf
dmowang.com
mylifeusaaatworkportal.com
electronicszap.com
thefrankversion.com
patricksparber.com
m-kenterprises.com
goodcreditcardshome.info
shegotit.club
nutinbutter.com
bridgestreetresources.com
tjanyancha.com
qqstoneandcabinet.com
topstitch.info
shadyshainarae.com
meucamarimoficial.com
gatedless.net
aal888.com
tstcongo.com
luckyladybugnailswithlisa.com
usapersonalshopper.com
893645tuerigjo.com
pbjengineering.com
katbumydbnjk.mobi
bostonm.info
amesshop.com
k-9homefinders.com
philbaileyrealestate.com
ahxinnuojie.com
ardougne.com
pasteleriaruth.com
vauvakuumettapodcast.com
aryamakoran.com
digitalspacepod.com
clarkstrain.com
plantbasedranch.com
therapylightclub.com
uuoouu-90.store
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral2/memory/1204-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1204-18-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1204-22-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2108-29-0x0000000000C10000-0x0000000000C39000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4724 set thread context of 1204 4724 Scanned Enquires.exe 99 PID 1204 set thread context of 3368 1204 Scanned Enquires.exe 56 PID 1204 set thread context of 3368 1204 Scanned Enquires.exe 56 PID 2108 set thread context of 3368 2108 svchost.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Scanned Enquires.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1204 Scanned Enquires.exe 1204 Scanned Enquires.exe 1204 Scanned Enquires.exe 1204 Scanned Enquires.exe 1204 Scanned Enquires.exe 1204 Scanned Enquires.exe 2108 svchost.exe 2108 svchost.exe 2108 svchost.exe 2108 svchost.exe 2108 svchost.exe 2108 svchost.exe 2108 svchost.exe 2108 svchost.exe 2108 svchost.exe 2108 svchost.exe 2108 svchost.exe 2108 svchost.exe 2108 svchost.exe 2108 svchost.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1204 Scanned Enquires.exe 1204 Scanned Enquires.exe 1204 Scanned Enquires.exe 1204 Scanned Enquires.exe 2108 svchost.exe 2108 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1204 Scanned Enquires.exe Token: SeDebugPrivilege 2108 svchost.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4724 wrote to memory of 1204 4724 Scanned Enquires.exe 99 PID 4724 wrote to memory of 1204 4724 Scanned Enquires.exe 99 PID 4724 wrote to memory of 1204 4724 Scanned Enquires.exe 99 PID 4724 wrote to memory of 1204 4724 Scanned Enquires.exe 99 PID 4724 wrote to memory of 1204 4724 Scanned Enquires.exe 99 PID 4724 wrote to memory of 1204 4724 Scanned Enquires.exe 99 PID 3368 wrote to memory of 2108 3368 Explorer.EXE 105 PID 3368 wrote to memory of 2108 3368 Explorer.EXE 105 PID 3368 wrote to memory of 2108 3368 Explorer.EXE 105 PID 2108 wrote to memory of 1740 2108 svchost.exe 106 PID 2108 wrote to memory of 1740 2108 svchost.exe 106 PID 2108 wrote to memory of 1740 2108 svchost.exe 106
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\Scanned Enquires.exe"C:\Users\Admin\AppData\Local\Temp\Scanned Enquires.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\Scanned Enquires.exe"C:\Users\Admin\AppData\Local\Temp\Scanned Enquires.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1204
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:4276
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:4292
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:3760
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:652
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:5092
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Scanned Enquires.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1740
-
-