Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:07
Static task
static1
Behavioral task
behavioral1
Sample
E20210917ML-RFQ.exe
Resource
win7-20241010-en
General
-
Target
E20210917ML-RFQ.exe
-
Size
631KB
-
MD5
4bb97838f22e7d33122a38105b252b9e
-
SHA1
770a4807a1e32a8fbb765e3540d54c30bdd5c131
-
SHA256
c507c6ca8c3d71feb2af8d83136736bd2407fef4a26c9e681426be5501d4742c
-
SHA512
fd23aa8b75501d5a09fcb6c8c4ac2bc7406e0a73a7dc0215b3a1de8a4a31a418bee21fc750335c9de4652e62a7a9a4a409bf110d9a1bc49df9318ab38ba08cb5
-
SSDEEP
12288:PuXEjNzXgWfqIF/OXH+faNtmh4zNR+fh9rX8UQWObnrV8ZqsPh1r:EWfqIFyCatmINk5pX87WM
Malware Config
Extracted
xloader
2.5
a6er
floetic.club
deepspotters.com
tibo-dev.tech
kcmade.xyz
haulseattle.com
ceroli-dolci.com
chenkaichuangke.com
citycloudconsulting.online
rusunmedical.com
ingeborg-art.com
asianm.art
private-clicks.com
metalcorpperu.com
beautifulingodseyes.com
phutungxenangnguoi.com
shots-photo.com
wirlessjuicers.com
sadyrossiiural.com
jiho9jye.xyz
molilii.com
locomotionprogramming.com
greenaou.com
chaturagile.com
mandveni.com
pneuscosta.com
westbridgeboutique.com
goodscroll.com
theliquorb.com
lfaoqiang.com
noonis.xyz
pfbbtdsx.com
jstgwy.com
slopeupanddown.com
guidedlevelreading.com
stealth-emissari.asia
zegiza.xyz
yboutique.store
cijs-icjs.net
tenlog055.xyz
pleasantwakes.com
makemodestohome.com
ramatouliebah.com
klaseraestheticsclinic.com
wka-france.com
secure-dashboard-sosun.com
thecrashingbrains.com
art-han.com
guziwei.com
selu7474.net
chengyuglobal.com
kmkcorporation.com
cmbwqxkcbhtncqw.store
vanwindenbouw.com
limitlessbettings.com
prisonnurselife.com
lovemugzs.com
onionplusfoods.com
kikofriends.com
ahdhstore1.com
minicreators.online
dualmotorelectricscooter.com
banshi.info
amieli.xyz
germancyberacademy.com
revivalgomghw.xyz
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral1/memory/2832-14-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2832-18-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2832-23-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2764-29-0x00000000000D0000-0x00000000000F9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2108 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2844 set thread context of 2832 2844 E20210917ML-RFQ.exe 30 PID 2832 set thread context of 1192 2832 E20210917ML-RFQ.exe 21 PID 2832 set thread context of 1192 2832 E20210917ML-RFQ.exe 21 PID 2764 set thread context of 1192 2764 explorer.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E20210917ML-RFQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2832 E20210917ML-RFQ.exe 2832 E20210917ML-RFQ.exe 2832 E20210917ML-RFQ.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe 2764 explorer.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2832 E20210917ML-RFQ.exe 2832 E20210917ML-RFQ.exe 2832 E20210917ML-RFQ.exe 2832 E20210917ML-RFQ.exe 2764 explorer.exe 2764 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2832 E20210917ML-RFQ.exe Token: SeDebugPrivilege 2764 explorer.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2832 2844 E20210917ML-RFQ.exe 30 PID 2844 wrote to memory of 2832 2844 E20210917ML-RFQ.exe 30 PID 2844 wrote to memory of 2832 2844 E20210917ML-RFQ.exe 30 PID 2844 wrote to memory of 2832 2844 E20210917ML-RFQ.exe 30 PID 2844 wrote to memory of 2832 2844 E20210917ML-RFQ.exe 30 PID 2844 wrote to memory of 2832 2844 E20210917ML-RFQ.exe 30 PID 2844 wrote to memory of 2832 2844 E20210917ML-RFQ.exe 30 PID 1192 wrote to memory of 2764 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2764 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2764 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2764 1192 Explorer.EXE 31 PID 2764 wrote to memory of 2108 2764 explorer.exe 32 PID 2764 wrote to memory of 2108 2764 explorer.exe 32 PID 2764 wrote to memory of 2108 2764 explorer.exe 32 PID 2764 wrote to memory of 2108 2764 explorer.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\E20210917ML-RFQ.exe"C:\Users\Admin\AppData\Local\Temp\E20210917ML-RFQ.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\E20210917ML-RFQ.exe"C:\Users\Admin\AppData\Local\Temp\E20210917ML-RFQ.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\E20210917ML-RFQ.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2108
-
-