Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:04
Static task
static1
Behavioral task
behavioral1
Sample
65b8d28cc93ef078954f569422e9292298e638a11a6bb681c85065c84e042bff.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
65b8d28cc93ef078954f569422e9292298e638a11a6bb681c85065c84e042bff.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/gbywalds.dll
Resource
win7-20240729-en
General
-
Target
65b8d28cc93ef078954f569422e9292298e638a11a6bb681c85065c84e042bff.exe
-
Size
251KB
-
MD5
5da62bdb6889d90f395efd87681ebdc7
-
SHA1
d6d8cfb0f3bec3b693b805a8bdeefe3651b6d509
-
SHA256
65b8d28cc93ef078954f569422e9292298e638a11a6bb681c85065c84e042bff
-
SHA512
5c896c8506557c8df0fe44272557e40c3c312458ceea7dfdcd8449438f6b51de0a25aa0d128c77a534142bfa1c345b65075f7e353e515e477693a75aa54d99c8
-
SSDEEP
6144:p8LxBntcE0yoInozz1mZOoEFmAckF5rTKqdacxIiSgIF3CFbW:EuE0yAVsI4yPbaQBSgIFyFi
Malware Config
Extracted
xloader
2.3
oqxs
northkoreamatrimony.com
we11studio.net
ekviraonewaycab.com
biakbiak.com
pdmclinic.com
biophots.com
shaydd.com
uplandpro.com
newcrestredchrisltd.com
aventuragaming.com
righteousrewards.com
pengwinz.com
ganey-hn.com
gz-bbe.com
xicauyb.com
historyfive.com
racofix.net
teetimeforyou.com
perfumeriadeverano.com
electrumkeys.works
sellyourleesburghome.com
thecomplexityoftruth.com
kxpan.com
avdhutraut.com
457ebhw.com
papelparede365.com
eastmidlandschauffeurgroup.com
seventhcircleofhelena.com
aprendeonline10.com
nirvanaremote.icu
ntra120.com
ultrafor.asia
ayoadventure.com
sellingsunsetmarbella.com
titanlifeinsurance.com
ansarimc.com
poslinkhub.club
sensationdrone.com
massapequawaterbill.com
advancedfiltrationconcepts.net
patriotfarmshepherds.com
tb1919.com
ferienkompass.com
error404page.com
pricegr8.com
sante-evolutionshop.com
sebiexchange.com
loimaannettiapteekki.net
xn--mad-drb.com
solutionsessentialoil.com
champavatipipes.com
kiddiecarenc.com
detemptationsrevue.com
topservices1.site
mimikis.info
weekendanorak.com
xn--zmremlak-skbc.com
bioworldng.com
thealliancestand.com
blackleadershippodcast.com
portmacquarievodka.com
pointpermis-france.com
fuzzue.com
virusfriendlybusinesses.com
e-commercehispano.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2744-9-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Loads dropped DLL 1 IoCs
pid Process 1420 65b8d28cc93ef078954f569422e9292298e638a11a6bb681c85065c84e042bff.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1420 set thread context of 2744 1420 65b8d28cc93ef078954f569422e9292298e638a11a6bb681c85065c84e042bff.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65b8d28cc93ef078954f569422e9292298e638a11a6bb681c85065c84e042bff.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2744 65b8d28cc93ef078954f569422e9292298e638a11a6bb681c85065c84e042bff.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1420 65b8d28cc93ef078954f569422e9292298e638a11a6bb681c85065c84e042bff.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1420 wrote to memory of 2744 1420 65b8d28cc93ef078954f569422e9292298e638a11a6bb681c85065c84e042bff.exe 30 PID 1420 wrote to memory of 2744 1420 65b8d28cc93ef078954f569422e9292298e638a11a6bb681c85065c84e042bff.exe 30 PID 1420 wrote to memory of 2744 1420 65b8d28cc93ef078954f569422e9292298e638a11a6bb681c85065c84e042bff.exe 30 PID 1420 wrote to memory of 2744 1420 65b8d28cc93ef078954f569422e9292298e638a11a6bb681c85065c84e042bff.exe 30 PID 1420 wrote to memory of 2744 1420 65b8d28cc93ef078954f569422e9292298e638a11a6bb681c85065c84e042bff.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\65b8d28cc93ef078954f569422e9292298e638a11a6bb681c85065c84e042bff.exe"C:\Users\Admin\AppData\Local\Temp\65b8d28cc93ef078954f569422e9292298e638a11a6bb681c85065c84e042bff.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\65b8d28cc93ef078954f569422e9292298e638a11a6bb681c85065c84e042bff.exe"C:\Users\Admin\AppData\Local\Temp\65b8d28cc93ef078954f569422e9292298e638a11a6bb681c85065c84e042bff.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD55b7950419e981b94f2d78ba5f70b8f47
SHA1007b19f9267c8634a7b4b488770ae1f667655c20
SHA2566e11a5bb985683f9d03865289565124c11ce2c481a9a505866602cc950c80f5e
SHA51203d2a63385fa404e3fec62b16af9baa3ae93c26250e3ab1b104b6bb42542a7690d182faa50c5f27e89d4a8d00306ba252a188df9109667ca964ba80640882e65