Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:08
Static task
static1
Behavioral task
behavioral1
Sample
931678c464ddfa2b640003aa86be1d8e410ad20e5d833ecd4955116bc21f7f2b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
931678c464ddfa2b640003aa86be1d8e410ad20e5d833ecd4955116bc21f7f2b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/hkkeuk.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/hkkeuk.dll
Resource
win10v2004-20241007-en
General
-
Target
931678c464ddfa2b640003aa86be1d8e410ad20e5d833ecd4955116bc21f7f2b.exe
-
Size
443KB
-
MD5
0cd0ac4ac6acb3351f2d9fc26a71bf1d
-
SHA1
c8829c949b6cb82495108878b041c7f2d50d48ed
-
SHA256
931678c464ddfa2b640003aa86be1d8e410ad20e5d833ecd4955116bc21f7f2b
-
SHA512
f6d67c2c5ed7a41f7cd748e413acc66fe0346ffcd8607e3a8a49f0d452457224d5f79e5c61fbab48b5e05be4d8a86fe6ff535700f7e2bb6bd5ee762d80753c78
-
SSDEEP
6144:yGiU9eX6KKKKKKJEKPMlGWj6C/7Pf7hvJnSKywZjR896JHdpKHoLykp6a:eX6KKKKKKjPMltj64f7NJ896JHrKYJ
Malware Config
Extracted
xloader
2.5
hf9j
afrifarmgroup.com
coffeeassiciation.com
unlimit-ed.com
guy.rest
dnemperor.com
ringstorule.com
reelnasty.com
travelgleam.com
sagestyleresale.com
jiaoyizhuan.club
fastred.biz
xn--fiqs8srv0ahj5a.xn--czru2d
eden-foundation.com
exquisite-epoxy-systems.com
luxurycaroffer.com
sdffzc.com
suvsdealsonlinesearchdusorg.com
weihaits.com
fetch-us-mtg-refi.zone
uterinevmkvhm.online
redcarpetwithrob.online
puertasautomaticassalceda.com
blockchainsupport.global
lalasushi.com
picaworks.online
airductcleaningindianapolis.net
maximumdouglas.com
bs2860.com
pharmaceuticalmarking.com
billionaireroyalties.com
libertarias.wiki
cupsnax.com
koutarouserver.com
crazydealeon.com
amoraprimeirajogada.com
fearlessfashionaccessories.biz
ella.tech
breackae.xyz
hostmatadvice.com
aestheticnursearie.com
henryzingo.com
folpro.com
kooles.com
rushingrofogg.xyz
377techan.com
sprookjesbosch.store
newsymphonie.net
lawswashington.com
homesandhorses.net
jacobalexandermusic.com
ll1ysq.biz
faceresurfacing.com
thekeappro.com
joycemalaysiaproperty.com
traexcel.com
subsoilcorp.com
thejoannaha.com
477karakabayrd.com
bfcmtld.com
kuratours.com
group-place.com
sixtreechina.com
rattansagar.com
ascenddronenews.com
dubaibiologicdentist.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2320-9-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Loads dropped DLL 1 IoCs
pid Process 2544 931678c464ddfa2b640003aa86be1d8e410ad20e5d833ecd4955116bc21f7f2b.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2544 set thread context of 2320 2544 931678c464ddfa2b640003aa86be1d8e410ad20e5d833ecd4955116bc21f7f2b.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 931678c464ddfa2b640003aa86be1d8e410ad20e5d833ecd4955116bc21f7f2b.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2320 931678c464ddfa2b640003aa86be1d8e410ad20e5d833ecd4955116bc21f7f2b.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2320 2544 931678c464ddfa2b640003aa86be1d8e410ad20e5d833ecd4955116bc21f7f2b.exe 31 PID 2544 wrote to memory of 2320 2544 931678c464ddfa2b640003aa86be1d8e410ad20e5d833ecd4955116bc21f7f2b.exe 31 PID 2544 wrote to memory of 2320 2544 931678c464ddfa2b640003aa86be1d8e410ad20e5d833ecd4955116bc21f7f2b.exe 31 PID 2544 wrote to memory of 2320 2544 931678c464ddfa2b640003aa86be1d8e410ad20e5d833ecd4955116bc21f7f2b.exe 31 PID 2544 wrote to memory of 2320 2544 931678c464ddfa2b640003aa86be1d8e410ad20e5d833ecd4955116bc21f7f2b.exe 31 PID 2544 wrote to memory of 2320 2544 931678c464ddfa2b640003aa86be1d8e410ad20e5d833ecd4955116bc21f7f2b.exe 31 PID 2544 wrote to memory of 2320 2544 931678c464ddfa2b640003aa86be1d8e410ad20e5d833ecd4955116bc21f7f2b.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\931678c464ddfa2b640003aa86be1d8e410ad20e5d833ecd4955116bc21f7f2b.exe"C:\Users\Admin\AppData\Local\Temp\931678c464ddfa2b640003aa86be1d8e410ad20e5d833ecd4955116bc21f7f2b.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\931678c464ddfa2b640003aa86be1d8e410ad20e5d833ecd4955116bc21f7f2b.exe"C:\Users\Admin\AppData\Local\Temp\931678c464ddfa2b640003aa86be1d8e410ad20e5d833ecd4955116bc21f7f2b.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD570f300abbcb7565f8b2fa095839602c2
SHA1b0c1536216eae6182a625126494fc69fb2b8c826
SHA256c29deeb91e029c0325c2faf1fa6e8d9c71854dd3b640b4d6301f3471f5047971
SHA512fdad93927eef81f761f7644b8d9bf6a96ea6b681a63b6d47989266d745eb9fb7ec6cc2103dbaa9adf565714c40ca3abc192c93181e2c70e56b793ace22fef2c8