Analysis
-
max time kernel
146s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 19:59
Static task
static1
Behavioral task
behavioral1
Sample
rev inv07014.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
rev inv07014.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
zwgay.dll
Resource
win7-20240903-en
General
-
Target
rev inv07014.exe
-
Size
190KB
-
MD5
279122d3d89dab6a1b1a3a44931eb9a9
-
SHA1
df6f4453f8540c7a0f26a69c07907b3880ef7ffa
-
SHA256
758e43dcb865272b3fd6830e51e6875b9eeed7ad2734f0ceb4c5915c14fabb8a
-
SHA512
1e50c1a2d64adcde4dadc336e1e5de7c1ac030c9f7185f45e9021c914415e676a05c89de23563d401ef853129c7bc30ca2a6fa4d181ee0c277785ca40d8d8ae6
-
SSDEEP
3072:iBkfJpRXATwMdFCcGb/WfMwskKgw/01e7sm1QuQ1/oUsQSI4k0ZvSJlKVhrFz:iqjIKOfHsrD/01Esm1Q9nTSfbZvwKVdN
Malware Config
Extracted
xloader
2.3
ymri
cqmlhy.com
districtdisinfectant.com
canadohta.com
indipetals.com
zygjzz.com
bodybionixusa.com
myfoodiedoodie.com
littletinesonlinestore.com
zerofive100.com
odd-spaces.com
luxxnights.com
d-electric.com
fastkl.com
mywayinto.com
vitalpassion.com
usedmercedessprinters.net
caofeicao.com
emehciti.com
smartaider.com
ssgasika.com
onlyfansforyou.com
shamtudungrohani.com
imalovenative.com
precisionconsortium.com
757marketwatch.com
fanopt.com
boxagaorbis.com
qweqesdf.com
theburhanigroup.com
szbhsj.com
shriadventpharmaceuticals.com
jerseyzoom.com
salvitooriginalpizzakc.com
809swalnut.info
ay-danil.club
diyforhire.com
foamholding.com
grandpashaevo.com
proyectohuella.com
24runews.online
carvested.com
mirrorteam.com
josetreeexpert.com
fgtts.com
world2worldllc.com
xn--xkrv41icfi.com
ferncroftcronies.com
shamrocksec.com
sterilizair.info
xn--yukdunyas-3pb.com
solisdq.info
hahluxurywatches.com
xrg.xyz
qffweb.com
concrete-lubbock.com
gthb2u.com
fracik.com
123movies-official.com
nikevendor.com
communityhealth-mm.com
calimommaber.com
courtrptrs.com
themindofafunnygirl.com
mindyourtee.com
the7superpowers.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2052-5-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2052-8-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/1040-15-0x0000000000190000-0x00000000001B8000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2508 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2236 rev inv07014.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2236 set thread context of 2052 2236 rev inv07014.exe 29 PID 2052 set thread context of 1220 2052 rev inv07014.exe 21 PID 1040 set thread context of 1220 1040 mstsc.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rev inv07014.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2052 rev inv07014.exe 2052 rev inv07014.exe 1040 mstsc.exe 1040 mstsc.exe 1040 mstsc.exe 1040 mstsc.exe 1040 mstsc.exe 1040 mstsc.exe 1040 mstsc.exe 1040 mstsc.exe 1040 mstsc.exe 1040 mstsc.exe 1040 mstsc.exe 1040 mstsc.exe 1040 mstsc.exe 1040 mstsc.exe 1040 mstsc.exe 1040 mstsc.exe 1040 mstsc.exe 1040 mstsc.exe 1040 mstsc.exe 1040 mstsc.exe 1040 mstsc.exe 1040 mstsc.exe 1040 mstsc.exe 1040 mstsc.exe 1040 mstsc.exe 1040 mstsc.exe 1040 mstsc.exe 1040 mstsc.exe 1040 mstsc.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2236 rev inv07014.exe 2052 rev inv07014.exe 2052 rev inv07014.exe 2052 rev inv07014.exe 1040 mstsc.exe 1040 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2052 rev inv07014.exe Token: SeDebugPrivilege 1040 mstsc.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2236 wrote to memory of 2052 2236 rev inv07014.exe 29 PID 2236 wrote to memory of 2052 2236 rev inv07014.exe 29 PID 2236 wrote to memory of 2052 2236 rev inv07014.exe 29 PID 2236 wrote to memory of 2052 2236 rev inv07014.exe 29 PID 2236 wrote to memory of 2052 2236 rev inv07014.exe 29 PID 1220 wrote to memory of 1040 1220 Explorer.EXE 30 PID 1220 wrote to memory of 1040 1220 Explorer.EXE 30 PID 1220 wrote to memory of 1040 1220 Explorer.EXE 30 PID 1220 wrote to memory of 1040 1220 Explorer.EXE 30 PID 1040 wrote to memory of 2508 1040 mstsc.exe 31 PID 1040 wrote to memory of 2508 1040 mstsc.exe 31 PID 1040 wrote to memory of 2508 1040 mstsc.exe 31 PID 1040 wrote to memory of 2508 1040 mstsc.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\rev inv07014.exe"C:\Users\Admin\AppData\Local\Temp\rev inv07014.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\rev inv07014.exe"C:\Users\Admin\AppData\Local\Temp\rev inv07014.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2052
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\rev inv07014.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2508
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5dcc94fb3455b7726349f6b05f98a9f1e
SHA1ea2160715cddfde302043c8f69b63a3c03bc651d
SHA2563d3288ebb21a28f71417efa86b6a136cb37340f3542ce8e99b267c7b347f73ef
SHA512b3d6e8cae4d6e693b7b726120627a6815d7c5f29c51be26df041edb970727548bdb961b469ed74bc767ab2e27a6be5650122e2b968e81cca0571667277bd6305