Analysis
-
max time kernel
148s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:00
Static task
static1
Behavioral task
behavioral1
Sample
M7SkDQIpuSpt4KR.exe
Resource
win7-20241010-en
General
-
Target
M7SkDQIpuSpt4KR.exe
-
Size
690KB
-
MD5
2667b7eff8a62d63f951fcb39018a0d3
-
SHA1
76565ed25b4032ae6624ae665651dbc0b87cb591
-
SHA256
1fb328a56a2d1a4a30e135a597bf06565d1158e93983622ed6f35af046e66d09
-
SHA512
6789fbb7873fb28d87ec8fe3c6247cd6d8992b1cfde94f828b08f76c60f19de8cd1f0402822ce2e00568d03013ce985bdbf46cee4a3c22f1b2913bc581592a12
-
SSDEEP
12288:JBzcmhiTtohcWTShZupbhIRebp1SJJoGF+AHO8JY3D/ixBFmRq:JBomhiZJW4MvIR+1+CXd8Jsi1Wq
Malware Config
Extracted
xloader
2.5
e6wb
assetto.tech
surendramishra.com
bravohealthyskin.com
ipadzones.com
odmitatrends.quest
yfly633.xyz
firstwavegallery.com
moviedmine.com
hdcenergy.com
elbarcotechnology.com
sns-regionv.com
helmiaj.com
asgmedicalservice.store
siraestilistas.com
vbux.xyz
learnstarting.com
oceanmap.store
fullyloadedfiresticks.com
bingojx.com
airelibrerevista.com
gocanimation.com
ftao.club
roofing-evolution.com
handsomewines.net
anahole.com
artikgeridonustur.com
boisedrone.com
devmriguel.host
asxiaomi.com
anatatlar.com
moharatechnica-recruit.com
surumeika.com
haustrip.com
jobingle.com
qprmoh.xyz
shvipktv.com
onelovecafeatl.com
orderinformantmailer.store
bagfabstuff.com
tem-incltd.com
lopsrental.lease
lovejh.net
vende-digital.com
0dw.biz
stecken-pferd.com
bestofbahamas.net
leakingspecialist.com
avantipaintingsandiego.com
ooasne.com
ahsanbayjeyd.com
diamondtyme.com
picoluxasiate.com
01gjm.xyz
moronsinmotion.com
abupingtai.com
flywheelinsight.com
electricidadygasarnet.com
pernamed.com
dotjxi.website
serranosupholstery.com
presleysissonart.com
trumpvoter.net
michaelkpittman.store
sattaking-delhiborder07.xyz
singleton-trading.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2928-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2928-17-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2744-24-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2608 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3004 set thread context of 2928 3004 M7SkDQIpuSpt4KR.exe 29 PID 2928 set thread context of 1188 2928 M7SkDQIpuSpt4KR.exe 20 PID 2744 set thread context of 1188 2744 NETSTAT.EXE 20 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language M7SkDQIpuSpt4KR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2744 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2928 M7SkDQIpuSpt4KR.exe 2928 M7SkDQIpuSpt4KR.exe 2744 NETSTAT.EXE 2744 NETSTAT.EXE 2744 NETSTAT.EXE 2744 NETSTAT.EXE 2744 NETSTAT.EXE 2744 NETSTAT.EXE 2744 NETSTAT.EXE 2744 NETSTAT.EXE 2744 NETSTAT.EXE 2744 NETSTAT.EXE 2744 NETSTAT.EXE 2744 NETSTAT.EXE 2744 NETSTAT.EXE 2744 NETSTAT.EXE 2744 NETSTAT.EXE 2744 NETSTAT.EXE 2744 NETSTAT.EXE 2744 NETSTAT.EXE 2744 NETSTAT.EXE 2744 NETSTAT.EXE 2744 NETSTAT.EXE 2744 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2928 M7SkDQIpuSpt4KR.exe 2928 M7SkDQIpuSpt4KR.exe 2928 M7SkDQIpuSpt4KR.exe 2744 NETSTAT.EXE 2744 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2928 M7SkDQIpuSpt4KR.exe Token: SeDebugPrivilege 2744 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3004 wrote to memory of 2928 3004 M7SkDQIpuSpt4KR.exe 29 PID 3004 wrote to memory of 2928 3004 M7SkDQIpuSpt4KR.exe 29 PID 3004 wrote to memory of 2928 3004 M7SkDQIpuSpt4KR.exe 29 PID 3004 wrote to memory of 2928 3004 M7SkDQIpuSpt4KR.exe 29 PID 3004 wrote to memory of 2928 3004 M7SkDQIpuSpt4KR.exe 29 PID 3004 wrote to memory of 2928 3004 M7SkDQIpuSpt4KR.exe 29 PID 3004 wrote to memory of 2928 3004 M7SkDQIpuSpt4KR.exe 29 PID 1188 wrote to memory of 2744 1188 Explorer.EXE 33 PID 1188 wrote to memory of 2744 1188 Explorer.EXE 33 PID 1188 wrote to memory of 2744 1188 Explorer.EXE 33 PID 1188 wrote to memory of 2744 1188 Explorer.EXE 33 PID 2744 wrote to memory of 2608 2744 NETSTAT.EXE 34 PID 2744 wrote to memory of 2608 2744 NETSTAT.EXE 34 PID 2744 wrote to memory of 2608 2744 NETSTAT.EXE 34 PID 2744 wrote to memory of 2608 2744 NETSTAT.EXE 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\M7SkDQIpuSpt4KR.exe"C:\Users\Admin\AppData\Local\Temp\M7SkDQIpuSpt4KR.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\M7SkDQIpuSpt4KR.exe"C:\Users\Admin\AppData\Local\Temp\M7SkDQIpuSpt4KR.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2968
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2724
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2720
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\M7SkDQIpuSpt4KR.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2608
-
-