Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:02
Static task
static1
Behavioral task
behavioral1
Sample
mcb.exe
Resource
win7-20241023-en
General
-
Target
mcb.exe
-
Size
532KB
-
MD5
ce3fe162f65754238f56df135ddd43e5
-
SHA1
9cc55a9bc87bde222243c4fe0075288f0ede3d89
-
SHA256
1a2da8f660bf2273096bf34961d2cd0573eae10717e7259c30e96195d2485597
-
SHA512
e80e4304d3a7fc711c7d80785e92d6392fc9a4d54c0a96b16f8030fc4d48546416c771ae151c27f4de641817035a24c47095a4e05f44c13c3a30186fe9edd97d
-
SSDEEP
12288:slc9Drw8FSZCWyr72w4n4e7PWP9G0bxJLg6IybwvFSMozH9prwPRD:sCt4ZjyP2w4n4Jc6TQSMU/rgD
Malware Config
Extracted
xloader
2.5
fg6s
fairshakeforfarmers.com
pierpontlaw.com
expertnomad.com
ishhs.xyz
quotextaiwan.com
thaivisapro.com
madrassat-al-manahil.com
whf5.xyz
dutchpetfelt.com
wizard-nt.store
edfneu.com
zf0.net
hbxft.com
hugevari.com
websitefast.online
maisoncb.com
lghl56.com
donajisf.com
alexandertaylorforhiggins.com
evaz2.xyz
tuosangnb.com
eddupdate-secure.com
engelskapiste.com
fleetizer.com
sapphireutil.com
alo360.net
viperhosting.net
capitandelamarina.com
santogin.com
talentoscomplementarios.com
justeatpay.com
drfarhad-amini.com
omnebrand.com
bedbugretrieverdogs.biz
forhims.jobs
artsyangela.art
guzzolawfirm.com
lavishbynovell.com
fuqoguiders.xyz
spaceameseu.xyz
texorse.website
lyric.group
wettybucket.com
jshntn.com
vamp4883.com
f2dr5e4eaf.xyz
makeposturebetterapp.xyz
clashgame.com
punyh.com
bookbqconspicuous.com
berkshirebrewers.com
hz7y6hsti7uj.biz
myadpwisely.com
destination-denver.com
phoenixphantoms.com
mrdanvillesafelocksmith.com
valleyelitecleaning.com
astairazur.xyz
decentralstream.com
doctorfly.mobi
3dpropertyinspection.com
eislamiceducation.net
aliensandzombieswarontitan.com
invalidmob.com
leadgenteambyec2.online
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2828-1-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2828-2-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2760-9-0x0000000000090000-0x00000000000B9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2924 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2848 set thread context of 2828 2848 mcb.exe 30 PID 2828 set thread context of 1248 2828 mcb.exe 21 PID 2760 set thread context of 1248 2760 cmstp.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mcb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2828 mcb.exe 2828 mcb.exe 2760 cmstp.exe 2760 cmstp.exe 2760 cmstp.exe 2760 cmstp.exe 2760 cmstp.exe 2760 cmstp.exe 2760 cmstp.exe 2760 cmstp.exe 2760 cmstp.exe 2760 cmstp.exe 2760 cmstp.exe 2760 cmstp.exe 2760 cmstp.exe 2760 cmstp.exe 2760 cmstp.exe 2760 cmstp.exe 2760 cmstp.exe 2760 cmstp.exe 2760 cmstp.exe 2760 cmstp.exe 2760 cmstp.exe 2760 cmstp.exe 2760 cmstp.exe 2760 cmstp.exe 2760 cmstp.exe 2760 cmstp.exe 2760 cmstp.exe 2760 cmstp.exe 2760 cmstp.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2828 mcb.exe 2828 mcb.exe 2828 mcb.exe 2760 cmstp.exe 2760 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2828 mcb.exe Token: SeDebugPrivilege 2760 cmstp.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2848 mcb.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2828 2848 mcb.exe 30 PID 2848 wrote to memory of 2828 2848 mcb.exe 30 PID 2848 wrote to memory of 2828 2848 mcb.exe 30 PID 2848 wrote to memory of 2828 2848 mcb.exe 30 PID 2848 wrote to memory of 2828 2848 mcb.exe 30 PID 1248 wrote to memory of 2760 1248 Explorer.EXE 31 PID 1248 wrote to memory of 2760 1248 Explorer.EXE 31 PID 1248 wrote to memory of 2760 1248 Explorer.EXE 31 PID 1248 wrote to memory of 2760 1248 Explorer.EXE 31 PID 1248 wrote to memory of 2760 1248 Explorer.EXE 31 PID 1248 wrote to memory of 2760 1248 Explorer.EXE 31 PID 1248 wrote to memory of 2760 1248 Explorer.EXE 31 PID 2760 wrote to memory of 2924 2760 cmstp.exe 32 PID 2760 wrote to memory of 2924 2760 cmstp.exe 32 PID 2760 wrote to memory of 2924 2760 cmstp.exe 32 PID 2760 wrote to memory of 2924 2760 cmstp.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\mcb.exe"C:\Users\Admin\AppData\Local\Temp\mcb.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\mcb.exe"C:\Users\Admin\AppData\Local\Temp\mcb.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2828
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\mcb.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2924
-
-