Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:59
Static task
static1
Behavioral task
behavioral1
Sample
30ecbf4099805c165a5b658b5e38437981eb2b8ce0b6b8939864ed68bed8c067.exe
Resource
win7-20241023-en
General
-
Target
30ecbf4099805c165a5b658b5e38437981eb2b8ce0b6b8939864ed68bed8c067.exe
-
Size
491KB
-
MD5
38ceab9fa00f14db5b001bf1cdaa6f47
-
SHA1
9831dd267b5f5c5fbd79b9505f3ce6d13c65871e
-
SHA256
30ecbf4099805c165a5b658b5e38437981eb2b8ce0b6b8939864ed68bed8c067
-
SHA512
4a7a974da627ba3792e25b4f1d9a41a7eb32935b284254456da451b6c81a68505d867d93c08b86d978695bd73fc36337763c034dd54a7bde29a4a589611a0550
-
SSDEEP
12288:hX7DTteAIWWPaV47XuUcps+RR4hvLqdlRL3FpRbg3cMoJrxo:NrteA7D3ps/cm
Malware Config
Extracted
xloader
2.5
m3ci
424964.com
ocean-breath-retreat.com
icidedansdehors.art
wrochtthurl.quest
6455gfg.top
dgfipmailservice.online
banjofarmenica.com
dkcazin.com
jobs-fp.com
karens-kornerr.com
parmaesq.com
nuevochile.net
inputsquad.com
consultacedula-sep.digital
taogoubao.net
gimmesolar.com
bluelacedefense.com
grandagent.club
warqatalzawaj.com
getvirbelanow.com
omnifichub.com
rjtherealest.com
hqpzchmo.xyz
pearl-street-art.com
dudukrumah.com
resetmybutton.info
dinodao.xyz
payment-securecard.com
gorjessbyjessicaservice.website
edayispeove.com
glorian34.com
moviezwaphd.red
bxqiche.com
associate-cien.com
coparivan.quest
buyseneca.com
del-directory.xyz
thedarkhuntressexperience.com
trevaleaf.com
kwsi.online
2552111.com
highpacts.com
queenslandspirits.com
magazinhaberlerim.com
radialodge.com
packgames.store
sterre.one
tkspoboys.com
datashen.com
xn--4gqyn781iuoq.xyz
breadnbutterflies.com
intotheground.net
tenlog043.xyz
bendingwillowbirth.com
lavellwesley.com
aumpatho.com
fdklflkdioerklfdke.store
nxscrapbook.com
dan-is-a-ghey-retard.com
retailzoohub.com
pause-beautystore.com
accentpavementmaintenance.com
brittsballers.com
indev-mobility.info
bravobug.net
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral2/memory/824-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/824-17-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/824-21-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3492-27-0x0000000000D80000-0x0000000000DA9000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1176 set thread context of 824 1176 30ecbf4099805c165a5b658b5e38437981eb2b8ce0b6b8939864ed68bed8c067.exe 89 PID 824 set thread context of 3500 824 RegSvcs.exe 55 PID 824 set thread context of 3500 824 RegSvcs.exe 55 PID 3492 set thread context of 3500 3492 NETSTAT.EXE 55 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30ecbf4099805c165a5b658b5e38437981eb2b8ce0b6b8939864ed68bed8c067.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 3492 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 824 RegSvcs.exe 824 RegSvcs.exe 824 RegSvcs.exe 824 RegSvcs.exe 824 RegSvcs.exe 824 RegSvcs.exe 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE 3492 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 824 RegSvcs.exe 824 RegSvcs.exe 824 RegSvcs.exe 824 RegSvcs.exe 3492 NETSTAT.EXE 3492 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 824 RegSvcs.exe Token: SeDebugPrivilege 3492 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1176 wrote to memory of 824 1176 30ecbf4099805c165a5b658b5e38437981eb2b8ce0b6b8939864ed68bed8c067.exe 89 PID 1176 wrote to memory of 824 1176 30ecbf4099805c165a5b658b5e38437981eb2b8ce0b6b8939864ed68bed8c067.exe 89 PID 1176 wrote to memory of 824 1176 30ecbf4099805c165a5b658b5e38437981eb2b8ce0b6b8939864ed68bed8c067.exe 89 PID 1176 wrote to memory of 824 1176 30ecbf4099805c165a5b658b5e38437981eb2b8ce0b6b8939864ed68bed8c067.exe 89 PID 1176 wrote to memory of 824 1176 30ecbf4099805c165a5b658b5e38437981eb2b8ce0b6b8939864ed68bed8c067.exe 89 PID 1176 wrote to memory of 824 1176 30ecbf4099805c165a5b658b5e38437981eb2b8ce0b6b8939864ed68bed8c067.exe 89 PID 3500 wrote to memory of 3492 3500 Explorer.EXE 92 PID 3500 wrote to memory of 3492 3500 Explorer.EXE 92 PID 3500 wrote to memory of 3492 3500 Explorer.EXE 92 PID 3492 wrote to memory of 2696 3492 NETSTAT.EXE 93 PID 3492 wrote to memory of 2696 3492 NETSTAT.EXE 93 PID 3492 wrote to memory of 2696 3492 NETSTAT.EXE 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\30ecbf4099805c165a5b658b5e38437981eb2b8ce0b6b8939864ed68bed8c067.exe"C:\Users\Admin\AppData\Local\Temp\30ecbf4099805c165a5b658b5e38437981eb2b8ce0b6b8939864ed68bed8c067.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:824
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2696
-
-