Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:59
Static task
static1
Behavioral task
behavioral1
Sample
10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe
Resource
win7-20241010-en
General
-
Target
10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe
-
Size
994KB
-
MD5
38785c25692d2ab8910fdb3bce8c10a8
-
SHA1
3a2bb4728537cf67f8f59dfdf55e1787fa42e79d
-
SHA256
10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602
-
SHA512
52889645ed472eed638b24d9ef43d7efb92d3c4ed85456147b70cc9b063d2eadefaa5b87c385fd9267402eecb8285b16ad00269ac24f9826fcd545887d9b296e
-
SSDEEP
12288:+4o472Nawuo3yf/Yw9PHGLPcJjTjUHD+1NV0qcDGhP6/T9fRRhkfwhuV4:+p472N0/L9UPHi1n0APCjrkYT
Malware Config
Extracted
xloader
2.3
owws
asahizushi.info
691jxy.com
richelitesingles.com
traditionalmehandi.com
germinatebio.com
568215.com
yds-inc.com
whirlpool-repair.site
alwaysincerely.com
themallvideo.com
hzzamy.com
merchasylum.net
weknownorthgower.com
zseasyfishin.com
corporaterecruitertraining.com
pheki.com
kaqitoy.com
pbzb94.com
cortopepperfest.com
texas956.com
yangpaair.com
jamaicanrestate.com
alizamcandrew.com
highspnhxm.trade
recreationanddevelopment.com
machinerycomfortable.com
cunerier.com
doratemizlikurunleri.com
dinemuch.com
ihsangazisiyez.com
securenetflixapp.com
heartoflofall.com
laurabarstowart.com
stallionsilver.com
macusix.com
desertcamelhq.com
electrumsystem.network
leetranscreations.com
sdyuancang.com
lcpcap.com
67657780.com
shipbuildersforgolden.com
bermudefcrasettlement.com
koladintechnologies.com
tennisopenit.com
chrispricellc.com
x-izm.net
theopendata.exchange
copinginfula.trade
gksfhzuhi.icu
radansaisortagim.com
fsjcfrozenfood.com
cdpp.net
xn--anibalderedao-7eb3d.com
ycshop.net
mescopro.com
gp4458.com
xn--2z1bq6efxj2gp2o9xd.com
sagesse-courtage-credit.com
ligaeuropea.com
kieler-hof.com
lessismorebeautiful.com
fundwise.pro
mymathstest.com
kalptarucentrino.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/3624-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2260 set thread context of 3624 2260 10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe 101 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3624 10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe 3624 10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2260 wrote to memory of 3624 2260 10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe 101 PID 2260 wrote to memory of 3624 2260 10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe 101 PID 2260 wrote to memory of 3624 2260 10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe 101 PID 2260 wrote to memory of 3624 2260 10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe 101 PID 2260 wrote to memory of 3624 2260 10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe 101 PID 2260 wrote to memory of 3624 2260 10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe"C:\Users\Admin\AppData\Local\Temp\10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe"C:\Users\Admin\AppData\Local\Temp\10c2c32a5a6286c37c7812cf50927dac6d83c4c07c02f9ac0456a5fabb77b602.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3624
-