Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:02
Static task
static1
Behavioral task
behavioral1
Sample
mcb.exe
Resource
win7-20241023-en
General
-
Target
mcb.exe
-
Size
532KB
-
MD5
ce3fe162f65754238f56df135ddd43e5
-
SHA1
9cc55a9bc87bde222243c4fe0075288f0ede3d89
-
SHA256
1a2da8f660bf2273096bf34961d2cd0573eae10717e7259c30e96195d2485597
-
SHA512
e80e4304d3a7fc711c7d80785e92d6392fc9a4d54c0a96b16f8030fc4d48546416c771ae151c27f4de641817035a24c47095a4e05f44c13c3a30186fe9edd97d
-
SSDEEP
12288:slc9Drw8FSZCWyr72w4n4e7PWP9G0bxJLg6IybwvFSMozH9prwPRD:sCt4ZjyP2w4n4Jc6TQSMU/rgD
Malware Config
Extracted
xloader
2.5
fg6s
fairshakeforfarmers.com
pierpontlaw.com
expertnomad.com
ishhs.xyz
quotextaiwan.com
thaivisapro.com
madrassat-al-manahil.com
whf5.xyz
dutchpetfelt.com
wizard-nt.store
edfneu.com
zf0.net
hbxft.com
hugevari.com
websitefast.online
maisoncb.com
lghl56.com
donajisf.com
alexandertaylorforhiggins.com
evaz2.xyz
tuosangnb.com
eddupdate-secure.com
engelskapiste.com
fleetizer.com
sapphireutil.com
alo360.net
viperhosting.net
capitandelamarina.com
santogin.com
talentoscomplementarios.com
justeatpay.com
drfarhad-amini.com
omnebrand.com
bedbugretrieverdogs.biz
forhims.jobs
artsyangela.art
guzzolawfirm.com
lavishbynovell.com
fuqoguiders.xyz
spaceameseu.xyz
texorse.website
lyric.group
wettybucket.com
jshntn.com
vamp4883.com
f2dr5e4eaf.xyz
makeposturebetterapp.xyz
clashgame.com
punyh.com
bookbqconspicuous.com
berkshirebrewers.com
hz7y6hsti7uj.biz
myadpwisely.com
destination-denver.com
phoenixphantoms.com
mrdanvillesafelocksmith.com
valleyelitecleaning.com
astairazur.xyz
decentralstream.com
doctorfly.mobi
3dpropertyinspection.com
eislamiceducation.net
aliensandzombieswarontitan.com
invalidmob.com
leadgenteambyec2.online
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral2/memory/3096-1-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3096-2-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3096-5-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1660-14-0x0000000001110000-0x0000000001139000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4024 set thread context of 3096 4024 mcb.exe 88 PID 3096 set thread context of 3364 3096 mcb.exe 56 PID 3096 set thread context of 3364 3096 mcb.exe 56 PID 1660 set thread context of 3364 1660 explorer.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mcb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mcb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 3096 mcb.exe 3096 mcb.exe 3096 mcb.exe 3096 mcb.exe 3096 mcb.exe 3096 mcb.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe 1660 explorer.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 3096 mcb.exe 3096 mcb.exe 3096 mcb.exe 3096 mcb.exe 1660 explorer.exe 1660 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3096 mcb.exe Token: SeDebugPrivilege 1660 explorer.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4024 mcb.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4024 wrote to memory of 3096 4024 mcb.exe 88 PID 4024 wrote to memory of 3096 4024 mcb.exe 88 PID 4024 wrote to memory of 3096 4024 mcb.exe 88 PID 4024 wrote to memory of 3096 4024 mcb.exe 88 PID 3096 wrote to memory of 1660 3096 mcb.exe 95 PID 3096 wrote to memory of 1660 3096 mcb.exe 95 PID 3096 wrote to memory of 1660 3096 mcb.exe 95 PID 1660 wrote to memory of 2328 1660 explorer.exe 96 PID 1660 wrote to memory of 2328 1660 explorer.exe 96 PID 1660 wrote to memory of 2328 1660 explorer.exe 96
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3364
-
C:\Users\Admin\AppData\Local\Temp\mcb.exe"C:\Users\Admin\AppData\Local\Temp\mcb.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\mcb.exe"C:\Users\Admin\AppData\Local\Temp\mcb.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\mcb.exe"5⤵
- System Location Discovery: System Language Discovery
PID:2328
-
-
-
-