Analysis
-
max time kernel
93s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:07
Static task
static1
Behavioral task
behavioral1
Sample
982e727a53a27d2bfbaea608209b315bc892947a1ef954033f1b29c687b6e001.exe
Resource
win7-20240903-en
General
-
Target
982e727a53a27d2bfbaea608209b315bc892947a1ef954033f1b29c687b6e001.exe
-
Size
885KB
-
MD5
b8c17d08c78f88e49edd77c35b47e851
-
SHA1
43bb31c71c84de912fbc4b2df45df445e0fd5de4
-
SHA256
982e727a53a27d2bfbaea608209b315bc892947a1ef954033f1b29c687b6e001
-
SHA512
6489e1f5412c854d5b0b7d6761b9fe2bb5871b438c4bedc2080a9a0cc596f2c1fa2ce66e8d82c49611b973e6415214e52051db70a7af71db223fd3d8c3e79309
-
SSDEEP
12288:C1apH3333333PfJ55555555CaqaF0qMgmxd0C66baBTn0huT/pWygoptzU6Lm/GD:/X6TgCd05BTtpWDoDzU6LmO7SlEZLx
Malware Config
Extracted
xloader
2.5
uit2
transmutualinformation.com
northcarolinahempcrete.com
exceedrigging.online
verifiedpaypal.net
notlieu.xyz
cdn-corp.com
wz-edu.net
chaelve.xyz
lifesongcounselling.com
misterpeppers.toys
shortfatotaku.com
divineluxmedia.com
creative-solutionco.com
daumien.com
adenomyxosarcoma.com
permanentcleaning.com
bettyandcharlie.com
premium-gutters.com
shnuffle.com
trichycateringservices.com
thewritingmedic.com
merchantcashadvanceplus.com
shillingforadime.com
pantaneirajeans.online
webspark.online
woodysinc.com
aegon.academy
septemberstockevent200.com
xn--bb0bk5in2bz9tthi78cc22a.com
tiberewlezc.quest
apocalyptoapertureserrature.net
6-minute-ceo-iq.com
workxplace.com
melaniealdridgephotography.com
prolinkitservices.com
mbrind.com
ju88a.club
trinityhealthinstitute.com
askryggdrasills.com
7xv1nd.com
photoparadice.com
gufengtiyu.com
team-rwby-project.com
realtonmem.com
airlesscondimentdispenser.com
wx-zhongya.com
diversifiedes.online
dansstartupoffers.com
eaddsyan.com
6dsm.com
embodyitapparel.com
stanislauslabs.com
metodomulhermillionaria.com
handhlifestyles.solutions
taoxinping.com
asbestosmanagementservices.com
hillshady912.com
enemanozzle.info
left-side.com
southerncharmdrinks.com
ocvcoins.com
osjhl.xyz
coachdealtovuelo.com
anatomyinmotionathleticco.com
pipandelli.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/3428-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 5072 set thread context of 3428 5072 982e727a53a27d2bfbaea608209b315bc892947a1ef954033f1b29c687b6e001.exe 94 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 982e727a53a27d2bfbaea608209b315bc892947a1ef954033f1b29c687b6e001.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5072 982e727a53a27d2bfbaea608209b315bc892947a1ef954033f1b29c687b6e001.exe 5072 982e727a53a27d2bfbaea608209b315bc892947a1ef954033f1b29c687b6e001.exe 3428 982e727a53a27d2bfbaea608209b315bc892947a1ef954033f1b29c687b6e001.exe 3428 982e727a53a27d2bfbaea608209b315bc892947a1ef954033f1b29c687b6e001.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5072 982e727a53a27d2bfbaea608209b315bc892947a1ef954033f1b29c687b6e001.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5072 wrote to memory of 2144 5072 982e727a53a27d2bfbaea608209b315bc892947a1ef954033f1b29c687b6e001.exe 93 PID 5072 wrote to memory of 2144 5072 982e727a53a27d2bfbaea608209b315bc892947a1ef954033f1b29c687b6e001.exe 93 PID 5072 wrote to memory of 2144 5072 982e727a53a27d2bfbaea608209b315bc892947a1ef954033f1b29c687b6e001.exe 93 PID 5072 wrote to memory of 3428 5072 982e727a53a27d2bfbaea608209b315bc892947a1ef954033f1b29c687b6e001.exe 94 PID 5072 wrote to memory of 3428 5072 982e727a53a27d2bfbaea608209b315bc892947a1ef954033f1b29c687b6e001.exe 94 PID 5072 wrote to memory of 3428 5072 982e727a53a27d2bfbaea608209b315bc892947a1ef954033f1b29c687b6e001.exe 94 PID 5072 wrote to memory of 3428 5072 982e727a53a27d2bfbaea608209b315bc892947a1ef954033f1b29c687b6e001.exe 94 PID 5072 wrote to memory of 3428 5072 982e727a53a27d2bfbaea608209b315bc892947a1ef954033f1b29c687b6e001.exe 94 PID 5072 wrote to memory of 3428 5072 982e727a53a27d2bfbaea608209b315bc892947a1ef954033f1b29c687b6e001.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\982e727a53a27d2bfbaea608209b315bc892947a1ef954033f1b29c687b6e001.exe"C:\Users\Admin\AppData\Local\Temp\982e727a53a27d2bfbaea608209b315bc892947a1ef954033f1b29c687b6e001.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\982e727a53a27d2bfbaea608209b315bc892947a1ef954033f1b29c687b6e001.exe"C:\Users\Admin\AppData\Local\Temp\982e727a53a27d2bfbaea608209b315bc892947a1ef954033f1b29c687b6e001.exe"2⤵PID:2144
-
-
C:\Users\Admin\AppData\Local\Temp\982e727a53a27d2bfbaea608209b315bc892947a1ef954033f1b29c687b6e001.exe"C:\Users\Admin\AppData\Local\Temp\982e727a53a27d2bfbaea608209b315bc892947a1ef954033f1b29c687b6e001.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3428
-