Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:11
Behavioral task
behavioral1
Sample
1013981e9742f0debfe503dcb812e5f87990eecdb7d2857c233652a8a3acafff.exe
Resource
win7-20240903-en
General
-
Target
1013981e9742f0debfe503dcb812e5f87990eecdb7d2857c233652a8a3acafff.exe
-
Size
636KB
-
MD5
af331c3c0907af5282c00443536b22c7
-
SHA1
ed908b4ad857a61bc9aa84bf8d53df894ee7bd5d
-
SHA256
1013981e9742f0debfe503dcb812e5f87990eecdb7d2857c233652a8a3acafff
-
SHA512
f00f1eb4df01061dd1bfec6c6df3e509359aa4a5acea5c91f5b9cd41e4bbf218d46a43b25d00922f86d1bbe99d090622e042cea1ce2184bd75d6f47b14fc7423
-
SSDEEP
12288:jXe9PPlowWX0t6mOQwg1Qd15CcYk0We11Z6SBlWJ1bGo+QTIXZ0+PBBVb:KhloDX0XOf4NARGojTIXu+PzVb
Malware Config
Extracted
xloader
2.3
p086
jinshichain.com
worldpettraveler.com
hightecforpc.com
kj97fm.com
streetnewstv.com
webrew.club
wheretogodubai.com
apostapolitica.net
thecafy.com
vinelosangeles.com
gashinc.com
gutitout.net
bvd-invest.com
realtoroutdesk.com
lawnbowlstournaments.net
nobodyisillegal.com
abogadoorihuela.net
sanistela.com
jksecurityworld.com
peppermintproject.com
blaxies3.com
oil51.com
joessche.com
7763.xyz
great-news-today.com
gen-oct.com
viyados.com
believe4america.com
misskarenenglishreacher.com
playgrnd.club
disseminate.info
degroeneremedie.com
clasedeangel.com
humanpossibilitiesfreed.com
lilythreads.com
6416drexel.com
jerseyshoreweedtees.com
eztrickstart.com
marionlittle.com
ecklesphoto.com
halifaxmews.com
carguymarkvan.com
cvpsychicmedium.com
greenlitebm.com
mainestreetwebdesign.com
wajvrko.icu
qbonitafesta.com
udsumberbarokah.com
maryschatzmd.com
leoscorpio.com
stashbashpartybus.com
bootlegnews.com
a1perfomance.com
publicofsociety.com
easybuy.cool
yhbt103.com
hereandnowme.com
proskinaesthetics.com
atminishop.com
dashcrew.net
4xpipsnager.com
ngmysz.com
moorestownquakerparents.com
maternity.cloud
riscology.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/1488-9-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/2400-10-0x0000000000400000-0x000000000056E000-memory.dmp autoit_exe -
resource yara_rule behavioral1/memory/2400-0-0x0000000000400000-0x000000000056E000-memory.dmp upx behavioral1/memory/2400-10-0x0000000000400000-0x000000000056E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1013981e9742f0debfe503dcb812e5f87990eecdb7d2857c233652a8a3acafff.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2400 1013981e9742f0debfe503dcb812e5f87990eecdb7d2857c233652a8a3acafff.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2400 wrote to memory of 1488 2400 1013981e9742f0debfe503dcb812e5f87990eecdb7d2857c233652a8a3acafff.exe 30 PID 2400 wrote to memory of 1488 2400 1013981e9742f0debfe503dcb812e5f87990eecdb7d2857c233652a8a3acafff.exe 30 PID 2400 wrote to memory of 1488 2400 1013981e9742f0debfe503dcb812e5f87990eecdb7d2857c233652a8a3acafff.exe 30 PID 2400 wrote to memory of 1488 2400 1013981e9742f0debfe503dcb812e5f87990eecdb7d2857c233652a8a3acafff.exe 30 PID 2400 wrote to memory of 1488 2400 1013981e9742f0debfe503dcb812e5f87990eecdb7d2857c233652a8a3acafff.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\1013981e9742f0debfe503dcb812e5f87990eecdb7d2857c233652a8a3acafff.exe"C:\Users\Admin\AppData\Local\Temp\1013981e9742f0debfe503dcb812e5f87990eecdb7d2857c233652a8a3acafff.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\1013981e9742f0debfe503dcb812e5f87990eecdb7d2857c233652a8a3acafff.exe"C:\Users\Admin\AppData\Local\Temp\1013981e9742f0debfe503dcb812e5f87990eecdb7d2857c233652a8a3acafff.exe"2⤵PID:1488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
218KB
MD57bbe7664b37c3d0d4eb86fb34ade9451
SHA16ac547e955d855cf50d57a26965b852e13d5f5b7
SHA256c9fc8e1d526c38349b26662d820394fdbc7ca4dc928aa96589a92832402b52b7
SHA512c2e4ee3d006a9bc78ea345e19504bc21f3db9877523722a494c8954351f5cf8c927a4ace8fd3f218761e327532f951bdcef48236023f00d015670218bee9f630