Analysis
-
max time kernel
15s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:01
Static task
static1
Behavioral task
behavioral1
Sample
b3b05407428f3bb90350615cd39a4e637a6fbc4e_1637341810240.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
b3b05407428f3bb90350615cd39a4e637a6fbc4e_1637341810240.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/fbban.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/fbban.dll
Resource
win10v2004-20241007-en
General
-
Target
b3b05407428f3bb90350615cd39a4e637a6fbc4e_1637341810240.exe
-
Size
372KB
-
MD5
c447eb1a63e1feaff9de0c7a6667f9e0
-
SHA1
b3b05407428f3bb90350615cd39a4e637a6fbc4e
-
SHA256
beb008bb29bd0fc62b33e2961e016be1677f9cb78334e211bd53b21837f250b2
-
SHA512
26b8916630e5a8dce5a6e1d2794a0e42dc144ed460458829d45bb5797b254f0dce1060b433d2c9b7085d6c4562ba3d1fca35a6c47b15e0972881d7c131f42317
-
SSDEEP
6144:dGiaE286EZe/iYO2+EmftF6QrrsZlzWVpMW0resQUb5nXSWb0OiAEWNI:oE286T/iYO2+Df3xEZlzspkHJXSZ4EQI
Malware Config
Extracted
xloader
2.5
ycgc
radharanipestcontrol.com
danye-wang.net
thgn3.xyz
clasdcharts.com
eighty20consults.com
rivian.email
paulapossetto.com
killwinesports.com
tgfwatches.com
help-sources.com
dazzlingbad.info
sgpropertymanagementllc.net
crokobos.info
pendekarherbshq.com
beheld3d.art
voipwallet.com
solideo.fail
cooperativecareitalia.com
sunlandstreet.com
carandmoore.com
mcdeliveryfast.xyz
rentalentrepreneurs.com
phoenixplumbingrepairs.com
foreverwaterproofing.com
communitcationsblockxchange.com
austindiamondandwatch.com
donuts-swap.com
citizensverify.online
coachmelscreativeclass.com
xn--fiq06j8rae5g686e.xn--czru2d
vilkrive.quest
489661.com
mnibnet.com
jtdroofing.com
lalaling.space
blazingfastcredit.com
tinampalermo.com
chitrokut.com
juicyyjuicebox.com
bharandassociates.com
umbrellaclub.xyz
qsense-motion.com
nutritionhealthyhouse.com
dpany1.com
dreamersportfishing.com
xbtiyu.com
directivasengestion.com
intital-petrochymia2021.com
fullbodymarketplace.com
bracunis.com
royallcases.com
farmaciacentral.online
platinumprinters.store
pingvideogaming.com
thebluebarnlodge.com
locusttowncenteroa.com
onee.host
zsfxfs.com
ourmaritimeheritage.net
hallomoritz.com
magotan100.com
flourish-adhd.com
bigkidcandies.com
globalcovidalliance.net
hazehassel.net
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/1476-9-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Loads dropped DLL 1 IoCs
pid Process 2548 b3b05407428f3bb90350615cd39a4e637a6fbc4e_1637341810240.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2548 set thread context of 1476 2548 b3b05407428f3bb90350615cd39a4e637a6fbc4e_1637341810240.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3b05407428f3bb90350615cd39a4e637a6fbc4e_1637341810240.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1476 b3b05407428f3bb90350615cd39a4e637a6fbc4e_1637341810240.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2548 wrote to memory of 1476 2548 b3b05407428f3bb90350615cd39a4e637a6fbc4e_1637341810240.exe 30 PID 2548 wrote to memory of 1476 2548 b3b05407428f3bb90350615cd39a4e637a6fbc4e_1637341810240.exe 30 PID 2548 wrote to memory of 1476 2548 b3b05407428f3bb90350615cd39a4e637a6fbc4e_1637341810240.exe 30 PID 2548 wrote to memory of 1476 2548 b3b05407428f3bb90350615cd39a4e637a6fbc4e_1637341810240.exe 30 PID 2548 wrote to memory of 1476 2548 b3b05407428f3bb90350615cd39a4e637a6fbc4e_1637341810240.exe 30 PID 2548 wrote to memory of 1476 2548 b3b05407428f3bb90350615cd39a4e637a6fbc4e_1637341810240.exe 30 PID 2548 wrote to memory of 1476 2548 b3b05407428f3bb90350615cd39a4e637a6fbc4e_1637341810240.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3b05407428f3bb90350615cd39a4e637a6fbc4e_1637341810240.exe"C:\Users\Admin\AppData\Local\Temp\b3b05407428f3bb90350615cd39a4e637a6fbc4e_1637341810240.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\b3b05407428f3bb90350615cd39a4e637a6fbc4e_1637341810240.exe"C:\Users\Admin\AppData\Local\Temp\b3b05407428f3bb90350615cd39a4e637a6fbc4e_1637341810240.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD5f54a3744a8bc9947fc4f01f9595010e3
SHA1b2e5c87d16cf29b55753297fefd6b7bab4cc77b0
SHA256a5cf6cd784167eab65e5c2b9a57d3df96ac0d89c2ddd0743674471e42100dcfd
SHA5129ff89e8b5234ba8fb9887fc589d4b6b334211058d9cc252a3f382d56783ea04d8524d54bc6f131bc7ad3246cd6bad95564086a6ae90042a42d441ac25a93dcf8