Analysis
-
max time kernel
149s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:09
Static task
static1
Behavioral task
behavioral1
Sample
Y0GEeY1WOWNMYni.exe
Resource
win7-20241010-en
General
-
Target
Y0GEeY1WOWNMYni.exe
-
Size
678KB
-
MD5
7c45a8542757d9ed6871c12d1d8e733b
-
SHA1
6ffdb6f2b38f45fe00ebd82a074336596938eaae
-
SHA256
7300768cbf7406a287c49de81c675dadd3d5bd4d181afabc533380eac73f944a
-
SHA512
d3fb0653ce229de6f885e7e24ae8fd4ad7de7eaebedbad7e07aff1d08be3b7c95c7133d65b9f72b1b087a634af3ace93e39102c77ded7bc82a1a14e63ab280a7
-
SSDEEP
6144:m4fxbbFJLgGo+lkVSuc8gGzBLAcFiR+Kt15f/OSjFiTTVFcXbCdp8o78HfVNNBI9:ZhlkVJcYB0igX5f/mj2Cd6iN53JJA
Malware Config
Extracted
xloader
2.3
bfhm
martensromania.com
e-cans.com
solarinverter.pro
threadluvapparel.com
livesarchitecture.com
velozgroup.net
xdcasdg.xyz
parsindoor.com
orderdonki.com
jingbangjy.com
dfjdfjtriurti548548548.xyz
au-cl8.com
workingclasscompany.com
wrjunk.com
debratreesaudiology.com
nuwearco.com
theteaverse.com
quanxinpdd.com
dabanse.com
pyztsl.com
hoplitesolution.com
ezeefashion.com
studyabroadalumnitravel.com
latitudesatsilverlake.com
matrixso.com
yem8.com
fusiopack.com
electracentrum.com
withheartbooks.com
convertge.com
theprofilemba.com
geminerojerusalem.com
italflavour.com
bemerrychristmas.com
nicolasghetti.com
hotelcasegoodinstallers.com
glutenfreebycharlie.com
mediasourcing.net
daveandlee.com
alittleloveliness.com
ylspsgxow.com
brhtz.com
rabifoods.com
zoratve.com
lihaoyx.com
firstchoicehealthcareclinic.com
studysoil.com
myfoodblog.asia
a7a8.xyz
nationalparksroadtrip.com
muyfaciles.com
bosakfordofchesterton.com
maxembier.info
substal.com
utcpay.com
anewway4nm.com
clairehuntingtonaesthetics.com
567jonesave.com
cakesandsugarcraftshop.com
royalbossbeauty.com
papamom1.com
westbypropertytax.com
kleimenconstruction.com
raouf99.com
politiconext.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2892-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2892-16-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2804-23-0x0000000000080000-0x00000000000A8000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2572 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1820 set thread context of 2892 1820 Y0GEeY1WOWNMYni.exe 29 PID 2892 set thread context of 1188 2892 Y0GEeY1WOWNMYni.exe 20 PID 2804 set thread context of 1188 2804 cmmon32.exe 20 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y0GEeY1WOWNMYni.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmmon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2892 Y0GEeY1WOWNMYni.exe 2892 Y0GEeY1WOWNMYni.exe 2804 cmmon32.exe 2804 cmmon32.exe 2804 cmmon32.exe 2804 cmmon32.exe 2804 cmmon32.exe 2804 cmmon32.exe 2804 cmmon32.exe 2804 cmmon32.exe 2804 cmmon32.exe 2804 cmmon32.exe 2804 cmmon32.exe 2804 cmmon32.exe 2804 cmmon32.exe 2804 cmmon32.exe 2804 cmmon32.exe 2804 cmmon32.exe 2804 cmmon32.exe 2804 cmmon32.exe 2804 cmmon32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2892 Y0GEeY1WOWNMYni.exe 2892 Y0GEeY1WOWNMYni.exe 2892 Y0GEeY1WOWNMYni.exe 2804 cmmon32.exe 2804 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2892 Y0GEeY1WOWNMYni.exe Token: SeDebugPrivilege 2804 cmmon32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2892 1820 Y0GEeY1WOWNMYni.exe 29 PID 1820 wrote to memory of 2892 1820 Y0GEeY1WOWNMYni.exe 29 PID 1820 wrote to memory of 2892 1820 Y0GEeY1WOWNMYni.exe 29 PID 1820 wrote to memory of 2892 1820 Y0GEeY1WOWNMYni.exe 29 PID 1820 wrote to memory of 2892 1820 Y0GEeY1WOWNMYni.exe 29 PID 1820 wrote to memory of 2892 1820 Y0GEeY1WOWNMYni.exe 29 PID 1820 wrote to memory of 2892 1820 Y0GEeY1WOWNMYni.exe 29 PID 1188 wrote to memory of 2804 1188 Explorer.EXE 30 PID 1188 wrote to memory of 2804 1188 Explorer.EXE 30 PID 1188 wrote to memory of 2804 1188 Explorer.EXE 30 PID 1188 wrote to memory of 2804 1188 Explorer.EXE 30 PID 2804 wrote to memory of 2572 2804 cmmon32.exe 31 PID 2804 wrote to memory of 2572 2804 cmmon32.exe 31 PID 2804 wrote to memory of 2572 2804 cmmon32.exe 31 PID 2804 wrote to memory of 2572 2804 cmmon32.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\Y0GEeY1WOWNMYni.exe"C:\Users\Admin\AppData\Local\Temp\Y0GEeY1WOWNMYni.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\Y0GEeY1WOWNMYni.exe"C:\Users\Admin\AppData\Local\Temp\Y0GEeY1WOWNMYni.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Y0GEeY1WOWNMYni.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2572
-
-