Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:00
Static task
static1
Behavioral task
behavioral1
Sample
M7SkDQIpuSpt4KR.exe
Resource
win7-20241010-en
General
-
Target
M7SkDQIpuSpt4KR.exe
-
Size
690KB
-
MD5
2667b7eff8a62d63f951fcb39018a0d3
-
SHA1
76565ed25b4032ae6624ae665651dbc0b87cb591
-
SHA256
1fb328a56a2d1a4a30e135a597bf06565d1158e93983622ed6f35af046e66d09
-
SHA512
6789fbb7873fb28d87ec8fe3c6247cd6d8992b1cfde94f828b08f76c60f19de8cd1f0402822ce2e00568d03013ce985bdbf46cee4a3c22f1b2913bc581592a12
-
SSDEEP
12288:JBzcmhiTtohcWTShZupbhIRebp1SJJoGF+AHO8JY3D/ixBFmRq:JBomhiZJW4MvIR+1+CXd8Jsi1Wq
Malware Config
Extracted
xloader
2.5
e6wb
assetto.tech
surendramishra.com
bravohealthyskin.com
ipadzones.com
odmitatrends.quest
yfly633.xyz
firstwavegallery.com
moviedmine.com
hdcenergy.com
elbarcotechnology.com
sns-regionv.com
helmiaj.com
asgmedicalservice.store
siraestilistas.com
vbux.xyz
learnstarting.com
oceanmap.store
fullyloadedfiresticks.com
bingojx.com
airelibrerevista.com
gocanimation.com
ftao.club
roofing-evolution.com
handsomewines.net
anahole.com
artikgeridonustur.com
boisedrone.com
devmriguel.host
asxiaomi.com
anatatlar.com
moharatechnica-recruit.com
surumeika.com
haustrip.com
jobingle.com
qprmoh.xyz
shvipktv.com
onelovecafeatl.com
orderinformantmailer.store
bagfabstuff.com
tem-incltd.com
lopsrental.lease
lovejh.net
vende-digital.com
0dw.biz
stecken-pferd.com
bestofbahamas.net
leakingspecialist.com
avantipaintingsandiego.com
ooasne.com
ahsanbayjeyd.com
diamondtyme.com
picoluxasiate.com
01gjm.xyz
moronsinmotion.com
abupingtai.com
flywheelinsight.com
electricidadygasarnet.com
pernamed.com
dotjxi.website
serranosupholstery.com
presleysissonart.com
trumpvoter.net
michaelkpittman.store
sattaking-delhiborder07.xyz
singleton-trading.com
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral2/memory/1912-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1912-17-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3412-25-0x0000000000A20000-0x0000000000A49000-memory.dmp xloader behavioral2/memory/3412-27-0x0000000000A20000-0x0000000000A49000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1348 set thread context of 1912 1348 M7SkDQIpuSpt4KR.exe 98 PID 1912 set thread context of 3444 1912 M7SkDQIpuSpt4KR.exe 56 PID 3412 set thread context of 3444 3412 msiexec.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language M7SkDQIpuSpt4KR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 1912 M7SkDQIpuSpt4KR.exe 1912 M7SkDQIpuSpt4KR.exe 1912 M7SkDQIpuSpt4KR.exe 1912 M7SkDQIpuSpt4KR.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe 3412 msiexec.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1912 M7SkDQIpuSpt4KR.exe 1912 M7SkDQIpuSpt4KR.exe 1912 M7SkDQIpuSpt4KR.exe 3412 msiexec.exe 3412 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1912 M7SkDQIpuSpt4KR.exe Token: SeDebugPrivilege 3412 msiexec.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1348 wrote to memory of 1912 1348 M7SkDQIpuSpt4KR.exe 98 PID 1348 wrote to memory of 1912 1348 M7SkDQIpuSpt4KR.exe 98 PID 1348 wrote to memory of 1912 1348 M7SkDQIpuSpt4KR.exe 98 PID 1348 wrote to memory of 1912 1348 M7SkDQIpuSpt4KR.exe 98 PID 1348 wrote to memory of 1912 1348 M7SkDQIpuSpt4KR.exe 98 PID 1348 wrote to memory of 1912 1348 M7SkDQIpuSpt4KR.exe 98 PID 3444 wrote to memory of 3412 3444 Explorer.EXE 99 PID 3444 wrote to memory of 3412 3444 Explorer.EXE 99 PID 3444 wrote to memory of 3412 3444 Explorer.EXE 99 PID 3412 wrote to memory of 3592 3412 msiexec.exe 100 PID 3412 wrote to memory of 3592 3412 msiexec.exe 100 PID 3412 wrote to memory of 3592 3412 msiexec.exe 100
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\M7SkDQIpuSpt4KR.exe"C:\Users\Admin\AppData\Local\Temp\M7SkDQIpuSpt4KR.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\M7SkDQIpuSpt4KR.exe"C:\Users\Admin\AppData\Local\Temp\M7SkDQIpuSpt4KR.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1912
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\M7SkDQIpuSpt4KR.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3592
-
-