Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:10
Static task
static1
Behavioral task
behavioral1
Sample
66fd2bc4d1ec466bcd76e50bbc959b9a794e897345e69305e11aa99d0b0d656d.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
66fd2bc4d1ec466bcd76e50bbc959b9a794e897345e69305e11aa99d0b0d656d.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
nwixhieg.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
nwixhieg.exe
Resource
win10v2004-20241007-en
General
-
Target
66fd2bc4d1ec466bcd76e50bbc959b9a794e897345e69305e11aa99d0b0d656d.exe
-
Size
357KB
-
MD5
b99e10d4eb07e4a986ee92bcf444a7bf
-
SHA1
470d703ad9ea51844f0577d917f7167cc032887d
-
SHA256
66fd2bc4d1ec466bcd76e50bbc959b9a794e897345e69305e11aa99d0b0d656d
-
SHA512
4914d79035dffa9ef00dc79ac756957a3cf686af41e414836ae0500ec1a9c5084cb77b1a2c1f7ff203d77b9f7897f8de3b38c1aadb36c68aa92d5900b18096b0
-
SSDEEP
6144:GwvDTzJ2RxyyZkZkMgGpHL9lIXJSto6BYvF1p7a0J8GM9p9MS:JzzZuMgGpheJSesYd1pR8lrR
Malware Config
Extracted
xloader
2.5
pout
leadergaterealty.com
k7bsz.info
laidjapp1.com
eastcountytaxi.com
betterlife-uae.com
materaiku.com
chanhxebinhthuan-hcm.online
06gjm.xyz
67t.xyz
here-we-meet.com
screened-articletoseetoday.info
lucykg.club
mujdobron.quest
susakhi.com
funtabse.com
unlimitedpain.com
2ed58fwec.xyz
weighttrainingexpert.com
allisonsheillax.com
yektaburgers.com
altijdstoer.info
airemspapartments.com
videomuncher.com
centerstagedrama.com
nikkou-toy.store
arequipesymerengues.com
haishandl.com
fy2zy5.com
mailheld.digital
sheepysage.com
fabricadocredito.com
siq212.com
moo-coo.com
hoomxb.net
6s2.space
rsholding.net
castellanacustomboats.online
tremblock.com
ramblingkinkster.com
teamsooners.club
onlinecasino-univ.com
dash8board.com
aichuncha.com
springhilllawn.com
zgluke.com
happynft.agency
urbanempireapparel.com
guanyiren.com
biglotteryking.com
marionkgregory.store
mujeresyaccion.com
smcusa.net
mayyon.net
vivibanca.website
15dgj.xyz
miabossjewelry.com
ideeperloshopping.cloud
healizy.com
huvao.com
huggsforbubbs.com
radiomacadam.online
firirifilms.com
knowhorses.com
chickenbeetlebooks.com
transtarintl.com
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral1/memory/1868-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1868-16-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1868-19-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2880-26-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Executes dropped EXE 2 IoCs
pid Process 2900 nwixhieg.exe 1868 nwixhieg.exe -
Loads dropped DLL 2 IoCs
pid Process 1680 66fd2bc4d1ec466bcd76e50bbc959b9a794e897345e69305e11aa99d0b0d656d.exe 2900 nwixhieg.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2900 set thread context of 1868 2900 nwixhieg.exe 32 PID 1868 set thread context of 1280 1868 nwixhieg.exe 21 PID 1868 set thread context of 1280 1868 nwixhieg.exe 21 PID 2880 set thread context of 1280 2880 chkdsk.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66fd2bc4d1ec466bcd76e50bbc959b9a794e897345e69305e11aa99d0b0d656d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwixhieg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chkdsk.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1868 nwixhieg.exe 1868 nwixhieg.exe 1868 nwixhieg.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1868 nwixhieg.exe 1868 nwixhieg.exe 1868 nwixhieg.exe 1868 nwixhieg.exe 2880 chkdsk.exe 2880 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1868 nwixhieg.exe Token: SeDebugPrivilege 2880 chkdsk.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1680 wrote to memory of 2900 1680 66fd2bc4d1ec466bcd76e50bbc959b9a794e897345e69305e11aa99d0b0d656d.exe 30 PID 1680 wrote to memory of 2900 1680 66fd2bc4d1ec466bcd76e50bbc959b9a794e897345e69305e11aa99d0b0d656d.exe 30 PID 1680 wrote to memory of 2900 1680 66fd2bc4d1ec466bcd76e50bbc959b9a794e897345e69305e11aa99d0b0d656d.exe 30 PID 1680 wrote to memory of 2900 1680 66fd2bc4d1ec466bcd76e50bbc959b9a794e897345e69305e11aa99d0b0d656d.exe 30 PID 2900 wrote to memory of 1868 2900 nwixhieg.exe 32 PID 2900 wrote to memory of 1868 2900 nwixhieg.exe 32 PID 2900 wrote to memory of 1868 2900 nwixhieg.exe 32 PID 2900 wrote to memory of 1868 2900 nwixhieg.exe 32 PID 2900 wrote to memory of 1868 2900 nwixhieg.exe 32 PID 2900 wrote to memory of 1868 2900 nwixhieg.exe 32 PID 2900 wrote to memory of 1868 2900 nwixhieg.exe 32 PID 1280 wrote to memory of 2880 1280 Explorer.EXE 33 PID 1280 wrote to memory of 2880 1280 Explorer.EXE 33 PID 1280 wrote to memory of 2880 1280 Explorer.EXE 33 PID 1280 wrote to memory of 2880 1280 Explorer.EXE 33 PID 2880 wrote to memory of 2652 2880 chkdsk.exe 34 PID 2880 wrote to memory of 2652 2880 chkdsk.exe 34 PID 2880 wrote to memory of 2652 2880 chkdsk.exe 34 PID 2880 wrote to memory of 2652 2880 chkdsk.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\66fd2bc4d1ec466bcd76e50bbc959b9a794e897345e69305e11aa99d0b0d656d.exe"C:\Users\Admin\AppData\Local\Temp\66fd2bc4d1ec466bcd76e50bbc959b9a794e897345e69305e11aa99d0b0d656d.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\nwixhieg.exeC:\Users\Admin\AppData\Local\Temp\nwixhieg.exe C:\Users\Admin\AppData\Local\Temp\idgcov3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\nwixhieg.exeC:\Users\Admin\AppData\Local\Temp\nwixhieg.exe C:\Users\Admin\AppData\Local\Temp\idgcov4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1868
-
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\nwixhieg.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2652
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
213KB
MD5bec780ab3a86d3885c9872f4d75dbcd5
SHA1a1122469144444e83c37fb27b69f32835a007379
SHA256a8447660db41efb0fc4bc2948f31c3b6ef82adf83844ccbb21ec45a37bfafe0d
SHA512ee210c5b7dac3494d7ed12793fcb292462f9dd190820c7099d233b223b5097b5541fc301cd32101947564a9e5934ff13753722f4d7fad83a503b27eadbe4fc29
-
Filesize
5KB
MD5ef56418270d58e8a8ad6bc84ed05928c
SHA1d3210c0c1568cc6d67763c628654209cf0ee60be
SHA256ebb25e646a42bc51c2f6c03f5715a07b0e672256e348b37893e9f6a5a558d06e
SHA512a92d5b12b82241049cb588de455b214eca739efbb9ce06eed834b86e5ea512a8ddf751e3c1a81c1e1c6dd9ab5c4e9ca95586c475ccdbec0c64f5490e79eadbe7
-
Filesize
118KB
MD5ac46facd334c7cd106cde9fdf38e965c
SHA1daa001174d595132938cfc19c43579cbd4d082ca
SHA256c1d018b4850721d1a602b7aa0273ef1e00d962199167f1b09465a47daff31b1b
SHA512f546345984e3edb7651737306201e8b5a5d76c4b508170fb998ecb16245846cc3719052390aa47ca2b862bc0bbb5ae4174ec9605f5fb0c91758c4aef4092805e