Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 19:59
Static task
static1
Behavioral task
behavioral1
Sample
10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe
Resource
win7-20241010-en
General
-
Target
10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe
-
Size
994KB
-
MD5
38785c25692d2ab8910fdb3bce8c10a8
-
SHA1
3a2bb4728537cf67f8f59dfdf55e1787fa42e79d
-
SHA256
10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602
-
SHA512
52889645ed472eed638b24d9ef43d7efb92d3c4ed85456147b70cc9b063d2eadefaa5b87c385fd9267402eecb8285b16ad00269ac24f9826fcd545887d9b296e
-
SSDEEP
12288:+4o472Nawuo3yf/Yw9PHGLPcJjTjUHD+1NV0qcDGhP6/T9fRRhkfwhuV4:+p472N0/L9UPHi1n0APCjrkYT
Malware Config
Extracted
xloader
2.3
owws
asahizushi.info
691jxy.com
richelitesingles.com
traditionalmehandi.com
germinatebio.com
568215.com
yds-inc.com
whirlpool-repair.site
alwaysincerely.com
themallvideo.com
hzzamy.com
merchasylum.net
weknownorthgower.com
zseasyfishin.com
corporaterecruitertraining.com
pheki.com
kaqitoy.com
pbzb94.com
cortopepperfest.com
texas956.com
yangpaair.com
jamaicanrestate.com
alizamcandrew.com
highspnhxm.trade
recreationanddevelopment.com
machinerycomfortable.com
cunerier.com
doratemizlikurunleri.com
dinemuch.com
ihsangazisiyez.com
securenetflixapp.com
heartoflofall.com
laurabarstowart.com
stallionsilver.com
macusix.com
desertcamelhq.com
electrumsystem.network
leetranscreations.com
sdyuancang.com
lcpcap.com
67657780.com
shipbuildersforgolden.com
bermudefcrasettlement.com
koladintechnologies.com
tennisopenit.com
chrispricellc.com
x-izm.net
theopendata.exchange
copinginfula.trade
gksfhzuhi.icu
radansaisortagim.com
fsjcfrozenfood.com
cdpp.net
xn--anibalderedao-7eb3d.com
ycshop.net
mescopro.com
gp4458.com
xn--2z1bq6efxj2gp2o9xd.com
sagesse-courtage-credit.com
ligaeuropea.com
kieler-hof.com
lessismorebeautiful.com
fundwise.pro
mymathstest.com
kalptarucentrino.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2796-15-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 564 set thread context of 2796 564 10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 564 10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe 564 10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe 2796 10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 564 10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 564 wrote to memory of 2752 564 10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe 30 PID 564 wrote to memory of 2752 564 10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe 30 PID 564 wrote to memory of 2752 564 10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe 30 PID 564 wrote to memory of 2752 564 10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe 30 PID 564 wrote to memory of 2796 564 10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe 31 PID 564 wrote to memory of 2796 564 10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe 31 PID 564 wrote to memory of 2796 564 10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe 31 PID 564 wrote to memory of 2796 564 10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe 31 PID 564 wrote to memory of 2796 564 10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe 31 PID 564 wrote to memory of 2796 564 10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe 31 PID 564 wrote to memory of 2796 564 10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe"C:\Users\Admin\AppData\Local\Temp\10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\AppData\Local\Temp\10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe"C:\Users\Admin\AppData\Local\Temp\10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe"2⤵PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe"C:\Users\Admin\AppData\Local\Temp\10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2796
-