Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:12
Static task
static1
Behavioral task
behavioral1
Sample
3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f.exe
Resource
win7-20240903-en
General
-
Target
3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f.exe
-
Size
582KB
-
MD5
7865e4215d53758ff1d749b26b56142e
-
SHA1
506db383bbaa167442c8dba0f0884b745cec8a8b
-
SHA256
3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f
-
SHA512
7064e831ebec08befc0ceb06780cf4a2159f6f9267f6e76cb9db1216aa42d84c1f0511ce6a7bf36957e28a9edfd78c7c71f9c947bd24fa610c5e4358f4a138f4
-
SSDEEP
12288:mm4R7v3Knn6oJyyInK+EUbwzLjXtBaESLEPalMXY2X51Pljh:ibal4nkUsBB/DkMx7Pljh
Malware Config
Extracted
xloader
2.3
uv34
lattakia-imbiss.com
helenafinaltouch.com
yogamays.com
habangli.com
embraceblm.com
freeurlsite.com
szxanpet.com
inspirationalsblog.com
calibratefirearms.net
chelseashalza.com
ihdeuruim.com
symbolofsafety.com
albanyhumanesociety.net
exclusiveoffer.bet
888yuntu.com
maraitime.com
caletaexperience.com
dreamlikeliving.com
wolvesmito.club
zbyunjin.com
senkrononline.com
thesugarbasket.com
organiccbgoil.com
amazoncor.xyz
dofus-tr.com
bhzconstrutora.com
onlinepaintandsips.com
sandybottomsflipflops.com
paobuyingxiong.com
wokeinteractive.com
furbabiesandflowers.com
hellojesse.com
ssssummit.com
vaiu-ks.com
akb48-loveantena.com
wagsorganics.com
import-union.com
sxrqsgs.icu
72loca.com
ssc018.com
jewelta.com
buildingdigitalmind.com
pantechinsulation.com
cobakoreksinjinx.com
mischurretes.com
contorig2.com
julesecurity.com
soccer-yokouchi.club
gofourd.com
holdimob.com
omorashi-mania.com
ytksw.com
gsf-fashon.com
bogolacke.com
odislewis.com
shenzhenmaojinchang.com
kimsfist.com
xsites-dev.xyz
buraktradingltd.com
muldentaxi.com
supergurlmarketing.com
areametalurgia.com
dejikatsu.com
pcbet999.com
hysjs168.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/1568-14-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/1568-17-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/1940-23-0x0000000000080000-0x00000000000A8000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2084 set thread context of 1568 2084 3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f.exe 31 PID 1568 set thread context of 1160 1568 RegSvcs.exe 21 PID 1940 set thread context of 1160 1940 colorcpl.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language colorcpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2084 3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f.exe 1568 RegSvcs.exe 1568 RegSvcs.exe 1940 colorcpl.exe 1940 colorcpl.exe 1940 colorcpl.exe 1940 colorcpl.exe 1940 colorcpl.exe 1940 colorcpl.exe 1940 colorcpl.exe 1940 colorcpl.exe 1940 colorcpl.exe 1940 colorcpl.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1568 RegSvcs.exe 1568 RegSvcs.exe 1568 RegSvcs.exe 1940 colorcpl.exe 1940 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2084 3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f.exe Token: SeDebugPrivilege 1568 RegSvcs.exe Token: SeDebugPrivilege 1940 colorcpl.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2084 wrote to memory of 1568 2084 3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f.exe 31 PID 2084 wrote to memory of 1568 2084 3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f.exe 31 PID 2084 wrote to memory of 1568 2084 3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f.exe 31 PID 2084 wrote to memory of 1568 2084 3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f.exe 31 PID 2084 wrote to memory of 1568 2084 3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f.exe 31 PID 2084 wrote to memory of 1568 2084 3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f.exe 31 PID 2084 wrote to memory of 1568 2084 3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f.exe 31 PID 2084 wrote to memory of 1568 2084 3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f.exe 31 PID 2084 wrote to memory of 1568 2084 3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f.exe 31 PID 2084 wrote to memory of 1568 2084 3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f.exe 31 PID 1160 wrote to memory of 1940 1160 Explorer.EXE 32 PID 1160 wrote to memory of 1940 1160 Explorer.EXE 32 PID 1160 wrote to memory of 1940 1160 Explorer.EXE 32 PID 1160 wrote to memory of 1940 1160 Explorer.EXE 32 PID 1940 wrote to memory of 372 1940 colorcpl.exe 33 PID 1940 wrote to memory of 372 1940 colorcpl.exe 33 PID 1940 wrote to memory of 372 1940 colorcpl.exe 33 PID 1940 wrote to memory of 372 1940 colorcpl.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f.exe"C:\Users\Admin\AppData\Local\Temp\3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1568
-
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:372
-
-