Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:59
Static task
static1
Behavioral task
behavioral1
Sample
rev inv07014.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
rev inv07014.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
zwgay.dll
Resource
win7-20240903-en
General
-
Target
rev inv07014.exe
-
Size
190KB
-
MD5
279122d3d89dab6a1b1a3a44931eb9a9
-
SHA1
df6f4453f8540c7a0f26a69c07907b3880ef7ffa
-
SHA256
758e43dcb865272b3fd6830e51e6875b9eeed7ad2734f0ceb4c5915c14fabb8a
-
SHA512
1e50c1a2d64adcde4dadc336e1e5de7c1ac030c9f7185f45e9021c914415e676a05c89de23563d401ef853129c7bc30ca2a6fa4d181ee0c277785ca40d8d8ae6
-
SSDEEP
3072:iBkfJpRXATwMdFCcGb/WfMwskKgw/01e7sm1QuQ1/oUsQSI4k0ZvSJlKVhrFz:iqjIKOfHsrD/01Esm1Q9nTSfbZvwKVdN
Malware Config
Extracted
xloader
2.3
ymri
cqmlhy.com
districtdisinfectant.com
canadohta.com
indipetals.com
zygjzz.com
bodybionixusa.com
myfoodiedoodie.com
littletinesonlinestore.com
zerofive100.com
odd-spaces.com
luxxnights.com
d-electric.com
fastkl.com
mywayinto.com
vitalpassion.com
usedmercedessprinters.net
caofeicao.com
emehciti.com
smartaider.com
ssgasika.com
onlyfansforyou.com
shamtudungrohani.com
imalovenative.com
precisionconsortium.com
757marketwatch.com
fanopt.com
boxagaorbis.com
qweqesdf.com
theburhanigroup.com
szbhsj.com
shriadventpharmaceuticals.com
jerseyzoom.com
salvitooriginalpizzakc.com
809swalnut.info
ay-danil.club
diyforhire.com
foamholding.com
grandpashaevo.com
proyectohuella.com
24runews.online
carvested.com
mirrorteam.com
josetreeexpert.com
fgtts.com
world2worldllc.com
xn--xkrv41icfi.com
ferncroftcronies.com
shamrocksec.com
sterilizair.info
xn--yukdunyas-3pb.com
solisdq.info
hahluxurywatches.com
xrg.xyz
qffweb.com
concrete-lubbock.com
gthb2u.com
fracik.com
123movies-official.com
nikevendor.com
communityhealth-mm.com
calimommaber.com
courtrptrs.com
themindofafunnygirl.com
mindyourtee.com
the7superpowers.com
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral2/memory/1684-5-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/1684-8-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/1684-11-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/4836-19-0x0000000000B50000-0x0000000000B78000-memory.dmp xloader -
Loads dropped DLL 1 IoCs
pid Process 3196 rev inv07014.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3196 set thread context of 1684 3196 rev inv07014.exe 84 PID 1684 set thread context of 3408 1684 rev inv07014.exe 56 PID 1684 set thread context of 3408 1684 rev inv07014.exe 56 PID 4836 set thread context of 3408 4836 mstsc.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rev inv07014.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 1684 rev inv07014.exe 1684 rev inv07014.exe 1684 rev inv07014.exe 1684 rev inv07014.exe 1684 rev inv07014.exe 1684 rev inv07014.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe 4836 mstsc.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 3196 rev inv07014.exe 1684 rev inv07014.exe 1684 rev inv07014.exe 1684 rev inv07014.exe 1684 rev inv07014.exe 4836 mstsc.exe 4836 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1684 rev inv07014.exe Token: SeDebugPrivilege 4836 mstsc.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3196 wrote to memory of 1684 3196 rev inv07014.exe 84 PID 3196 wrote to memory of 1684 3196 rev inv07014.exe 84 PID 3196 wrote to memory of 1684 3196 rev inv07014.exe 84 PID 3196 wrote to memory of 1684 3196 rev inv07014.exe 84 PID 3408 wrote to memory of 4836 3408 Explorer.EXE 89 PID 3408 wrote to memory of 4836 3408 Explorer.EXE 89 PID 3408 wrote to memory of 4836 3408 Explorer.EXE 89 PID 4836 wrote to memory of 720 4836 mstsc.exe 91 PID 4836 wrote to memory of 720 4836 mstsc.exe 91 PID 4836 wrote to memory of 720 4836 mstsc.exe 91
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\rev inv07014.exe"C:\Users\Admin\AppData\Local\Temp\rev inv07014.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\rev inv07014.exe"C:\Users\Admin\AppData\Local\Temp\rev inv07014.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\rev inv07014.exe"3⤵
- System Location Discovery: System Language Discovery
PID:720
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5dcc94fb3455b7726349f6b05f98a9f1e
SHA1ea2160715cddfde302043c8f69b63a3c03bc651d
SHA2563d3288ebb21a28f71417efa86b6a136cb37340f3542ce8e99b267c7b347f73ef
SHA512b3d6e8cae4d6e693b7b726120627a6815d7c5f29c51be26df041edb970727548bdb961b469ed74bc767ab2e27a6be5650122e2b968e81cca0571667277bd6305