Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:58
Static task
static1
Behavioral task
behavioral1
Sample
po.exe
Resource
win7-20240903-en
General
-
Target
po.exe
-
Size
799KB
-
MD5
fdb126e87df87515f8a22c716e15e262
-
SHA1
539b8cbcfea5f7366b7fb8653b3ff2421b7fd7d7
-
SHA256
c76ee82571b23b768691e4bf77332d125d2f9478055ead98278580a11a448e35
-
SHA512
82fbe9f215ebb32b53479baef3e0543acf31a7cdbe2d270e17549316a748b772227f3d39c47ed3f38a8ad62da47b4ec55783f17017c02cfb8af7ee1d706748ef
-
SSDEEP
12288:fjmagjIftv66WzGWSE5D1kIpNSDVtprqndi8axQ0SRKEGO84bOxBwpuUXYwrmktp:D5RhEp1orIajSR1QGqwp3j1s
Malware Config
Extracted
xloader
2.3
sgs8
epptexportools.com
theweddingofshadiandmike.com
588movie.com
deannahayko.com
smithkenney.com
mogurin-blog.com
heffner.host
nflflex.com
tshirtcustomdesign.com
livingwithinstinct.com
hanbangvu.com
5starsct.com
jystainlesscoil.com
lechazosdeliebana.com
northeastcampervans.com
halloweeneventsinmiami.com
wellnesswithshami.net
mklaboratories.com
oilepp.club
ravexim3.com
loanez3.com
smootied.com
jenarie.com
itescorts.com
lualmodasmg.com
soicauchuannhat.club
aandjwedding.com
dcoflywheel.com
backstorymagazine.online
armorsolo.icu
sameday.one
contemporaryartmuseum2020.com
pankeys.com
mablemitchell.com
3261laurelcanyon.com
haniyaghani.com
modacimiz.com
recodive.com
nogetincrease.com
xwf.xyz
9jinbo.com
agriktechnical.com
ameri.loans
5522n.xyz
icimprovement.com
mangalyampano2vr.online
holakozf.net
creditsuisweb.com
torvick.space
latournette.com
rahbaranrealty.com
xn--cckb9dwfpeue0736a0i9c.xyz
leftytorighty.com
ugurcoruh.com
bestforreaders.com
renegadeetc.net
ucakbiletle.com
mesynthes.com
thelawnbowlingmanager.com
whiteanglepod.com
shuangli56.com
janerowenlester.com
lightningbike.com
helpfulproduction.com
byfarruco.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/3964-13-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/3964-18-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/4780-24-0x00000000007D0000-0x00000000007F8000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3940 set thread context of 3964 3940 po.exe 98 PID 3964 set thread context of 3520 3964 po.exe 56 PID 4780 set thread context of 3520 4780 explorer.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language po.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 3964 po.exe 3964 po.exe 3964 po.exe 3964 po.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe 4780 explorer.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3964 po.exe 3964 po.exe 3964 po.exe 4780 explorer.exe 4780 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3964 po.exe Token: SeDebugPrivilege 4780 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3940 wrote to memory of 3964 3940 po.exe 98 PID 3940 wrote to memory of 3964 3940 po.exe 98 PID 3940 wrote to memory of 3964 3940 po.exe 98 PID 3940 wrote to memory of 3964 3940 po.exe 98 PID 3940 wrote to memory of 3964 3940 po.exe 98 PID 3940 wrote to memory of 3964 3940 po.exe 98 PID 3520 wrote to memory of 4780 3520 Explorer.EXE 99 PID 3520 wrote to memory of 4780 3520 Explorer.EXE 99 PID 3520 wrote to memory of 4780 3520 Explorer.EXE 99 PID 4780 wrote to memory of 620 4780 explorer.exe 100 PID 4780 wrote to memory of 620 4780 explorer.exe 100 PID 4780 wrote to memory of 620 4780 explorer.exe 100
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\po.exe"C:\Users\Admin\AppData\Local\Temp\po.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\po.exe"C:\Users\Admin\AppData\Local\Temp\po.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3964
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\po.exe"3⤵
- System Location Discovery: System Language Discovery
PID:620
-
-