Analysis
-
max time kernel
92s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:05
Static task
static1
Behavioral task
behavioral1
Sample
658c94d14c8b62ffd8fca85a0c80b3839dc978ed40c95ec78c646603b339fda3.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
658c94d14c8b62ffd8fca85a0c80b3839dc978ed40c95ec78c646603b339fda3.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe
Resource
win7-20240903-en
General
-
Target
7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe
-
Size
695KB
-
MD5
292be66f8033e0674a8f407bbc81cdc9
-
SHA1
844348d2c63ed27bf0518fd0a067c4211c8cb67a
-
SHA256
7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a
-
SHA512
930c6e14a518413f846b33c8ae40219e45a34a44e5fb7e622d0e4e385e017a1cce87b17e229436622f0269b9aacdc0f968439a69cc1cd193c7221edf77380e4b
-
SSDEEP
12288:ou4OwrIpFzib1nmQSgJHeSuxPZDulujkZ5mF:WjIpt/ZSsPZSME2
Malware Config
Extracted
xloader
2.3
osnr
aktemgayrimenkul.com
earthychicetc.com
domainesforoffers.club
wxglasses.com
lsdknfw.com
knowmoreaddiction.com
yorpol.xyz
microbladingangel.com
xn--zel-rna.xyz
learntogrow.site
rin.xyz
freemindsweden.com
michinoeki-taka.com
wxjyzb88.com
kaluari.com
cheapairtickets.club
raftel11.xyz
thenomadichusband.com
cocoschicshop.com
thescreamingzombie.com
allderry.com
asmafouzprotofilio.com
ravexim3.com
coyleusa.com
novarticle.com
alwaysdial.com
riki1988.com
heritageluxuryliving.com
lnstagramverifyhelpbase.com
urztruli.store
staywithbuzz.com
supergraphik.com
lulirodriguez.com
powerbie.com
tabaccafe.com
localsgoint.com
caizhaowang.net
dmaureenyoung.com
amarkush.com
christinakouvaras.com
metallsheetmetal.com
motusvitasfitness.com
amorveruse.com
charmedodetalhe.com
oghomeinfoa18.club
airleakagetest.com
longrunbrand.com
toletctg.com
eyesofegypttours.com
discordbot-entwicklung.tech
exchanger-rhcindonesia.com
myserenadetoyou.com
goupubu.com
notice-transfer-online.network
magazinneshow.com
taoimangaonline.com
dynavidsd.com
cornerstoneautomotiveca.com
iaventure.com
hbzmb.com
barnstormertech.com
threeleesboutique.com
thebeachbabeboss.com
nhka01.com
marianapradillo.art
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral4/memory/4728-1577-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3752 set thread context of 4728 3752 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe 101 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3752 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe 3752 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe 3752 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe 3752 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe 3752 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe 3752 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe 3752 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe 3752 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe 3752 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe 3752 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe 3752 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe 3752 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe 3752 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe 3752 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe 4728 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe 4728 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3752 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3752 wrote to memory of 1560 3752 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe 98 PID 3752 wrote to memory of 1560 3752 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe 98 PID 3752 wrote to memory of 1560 3752 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe 98 PID 3752 wrote to memory of 1048 3752 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe 99 PID 3752 wrote to memory of 1048 3752 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe 99 PID 3752 wrote to memory of 1048 3752 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe 99 PID 3752 wrote to memory of 768 3752 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe 100 PID 3752 wrote to memory of 768 3752 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe 100 PID 3752 wrote to memory of 768 3752 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe 100 PID 3752 wrote to memory of 4728 3752 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe 101 PID 3752 wrote to memory of 4728 3752 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe 101 PID 3752 wrote to memory of 4728 3752 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe 101 PID 3752 wrote to memory of 4728 3752 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe 101 PID 3752 wrote to memory of 4728 3752 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe 101 PID 3752 wrote to memory of 4728 3752 7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe"C:\Users\Admin\AppData\Local\Temp\7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exeC:\Users\Admin\AppData\Local\Temp\7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe2⤵PID:1560
-
-
C:\Users\Admin\AppData\Local\Temp\7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exeC:\Users\Admin\AppData\Local\Temp\7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe2⤵PID:1048
-
-
C:\Users\Admin\AppData\Local\Temp\7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exeC:\Users\Admin\AppData\Local\Temp\7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe2⤵PID:768
-
-
C:\Users\Admin\AppData\Local\Temp\7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exeC:\Users\Admin\AppData\Local\Temp\7b9f45a9b587bfddc2daabc1ac2908545c53f8f453d4f19520ba68c055a3d33a.exe2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4728
-