Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:09
Static task
static1
Behavioral task
behavioral1
Sample
Y0GEeY1WOWNMYni.exe
Resource
win7-20241010-en
General
-
Target
Y0GEeY1WOWNMYni.exe
-
Size
678KB
-
MD5
7c45a8542757d9ed6871c12d1d8e733b
-
SHA1
6ffdb6f2b38f45fe00ebd82a074336596938eaae
-
SHA256
7300768cbf7406a287c49de81c675dadd3d5bd4d181afabc533380eac73f944a
-
SHA512
d3fb0653ce229de6f885e7e24ae8fd4ad7de7eaebedbad7e07aff1d08be3b7c95c7133d65b9f72b1b087a634af3ace93e39102c77ded7bc82a1a14e63ab280a7
-
SSDEEP
6144:m4fxbbFJLgGo+lkVSuc8gGzBLAcFiR+Kt15f/OSjFiTTVFcXbCdp8o78HfVNNBI9:ZhlkVJcYB0igX5f/mj2Cd6iN53JJA
Malware Config
Extracted
xloader
2.3
bfhm
martensromania.com
e-cans.com
solarinverter.pro
threadluvapparel.com
livesarchitecture.com
velozgroup.net
xdcasdg.xyz
parsindoor.com
orderdonki.com
jingbangjy.com
dfjdfjtriurti548548548.xyz
au-cl8.com
workingclasscompany.com
wrjunk.com
debratreesaudiology.com
nuwearco.com
theteaverse.com
quanxinpdd.com
dabanse.com
pyztsl.com
hoplitesolution.com
ezeefashion.com
studyabroadalumnitravel.com
latitudesatsilverlake.com
matrixso.com
yem8.com
fusiopack.com
electracentrum.com
withheartbooks.com
convertge.com
theprofilemba.com
geminerojerusalem.com
italflavour.com
bemerrychristmas.com
nicolasghetti.com
hotelcasegoodinstallers.com
glutenfreebycharlie.com
mediasourcing.net
daveandlee.com
alittleloveliness.com
ylspsgxow.com
brhtz.com
rabifoods.com
zoratve.com
lihaoyx.com
firstchoicehealthcareclinic.com
studysoil.com
myfoodblog.asia
a7a8.xyz
nationalparksroadtrip.com
muyfaciles.com
bosakfordofchesterton.com
maxembier.info
substal.com
utcpay.com
anewway4nm.com
clairehuntingtonaesthetics.com
567jonesave.com
cakesandsugarcraftshop.com
royalbossbeauty.com
papamom1.com
westbypropertytax.com
kleimenconstruction.com
raouf99.com
politiconext.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/948-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/948-17-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/404-22-0x0000000000790000-0x00000000007B8000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4928 set thread context of 948 4928 Y0GEeY1WOWNMYni.exe 92 PID 948 set thread context of 3448 948 Y0GEeY1WOWNMYni.exe 56 PID 404 set thread context of 3448 404 wscript.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Y0GEeY1WOWNMYni.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 4928 Y0GEeY1WOWNMYni.exe 4928 Y0GEeY1WOWNMYni.exe 948 Y0GEeY1WOWNMYni.exe 948 Y0GEeY1WOWNMYni.exe 948 Y0GEeY1WOWNMYni.exe 948 Y0GEeY1WOWNMYni.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe 404 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 948 Y0GEeY1WOWNMYni.exe 948 Y0GEeY1WOWNMYni.exe 948 Y0GEeY1WOWNMYni.exe 404 wscript.exe 404 wscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4928 Y0GEeY1WOWNMYni.exe Token: SeDebugPrivilege 948 Y0GEeY1WOWNMYni.exe Token: SeDebugPrivilege 404 wscript.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4928 wrote to memory of 4484 4928 Y0GEeY1WOWNMYni.exe 91 PID 4928 wrote to memory of 4484 4928 Y0GEeY1WOWNMYni.exe 91 PID 4928 wrote to memory of 4484 4928 Y0GEeY1WOWNMYni.exe 91 PID 4928 wrote to memory of 948 4928 Y0GEeY1WOWNMYni.exe 92 PID 4928 wrote to memory of 948 4928 Y0GEeY1WOWNMYni.exe 92 PID 4928 wrote to memory of 948 4928 Y0GEeY1WOWNMYni.exe 92 PID 4928 wrote to memory of 948 4928 Y0GEeY1WOWNMYni.exe 92 PID 4928 wrote to memory of 948 4928 Y0GEeY1WOWNMYni.exe 92 PID 4928 wrote to memory of 948 4928 Y0GEeY1WOWNMYni.exe 92 PID 3448 wrote to memory of 404 3448 Explorer.EXE 93 PID 3448 wrote to memory of 404 3448 Explorer.EXE 93 PID 3448 wrote to memory of 404 3448 Explorer.EXE 93 PID 404 wrote to memory of 944 404 wscript.exe 94 PID 404 wrote to memory of 944 404 wscript.exe 94 PID 404 wrote to memory of 944 404 wscript.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\Y0GEeY1WOWNMYni.exe"C:\Users\Admin\AppData\Local\Temp\Y0GEeY1WOWNMYni.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\Y0GEeY1WOWNMYni.exe"C:\Users\Admin\AppData\Local\Temp\Y0GEeY1WOWNMYni.exe"3⤵PID:4484
-
-
C:\Users\Admin\AppData\Local\Temp\Y0GEeY1WOWNMYni.exe"C:\Users\Admin\AppData\Local\Temp\Y0GEeY1WOWNMYni.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:948
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Y0GEeY1WOWNMYni.exe"3⤵
- System Location Discovery: System Language Discovery
PID:944
-
-