Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:12
Static task
static1
Behavioral task
behavioral1
Sample
3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f.exe
Resource
win7-20240903-en
General
-
Target
3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f.exe
-
Size
582KB
-
MD5
7865e4215d53758ff1d749b26b56142e
-
SHA1
506db383bbaa167442c8dba0f0884b745cec8a8b
-
SHA256
3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f
-
SHA512
7064e831ebec08befc0ceb06780cf4a2159f6f9267f6e76cb9db1216aa42d84c1f0511ce6a7bf36957e28a9edfd78c7c71f9c947bd24fa610c5e4358f4a138f4
-
SSDEEP
12288:mm4R7v3Knn6oJyyInK+EUbwzLjXtBaESLEPalMXY2X51Pljh:ibal4nkUsBB/DkMx7Pljh
Malware Config
Extracted
xloader
2.3
uv34
lattakia-imbiss.com
helenafinaltouch.com
yogamays.com
habangli.com
embraceblm.com
freeurlsite.com
szxanpet.com
inspirationalsblog.com
calibratefirearms.net
chelseashalza.com
ihdeuruim.com
symbolofsafety.com
albanyhumanesociety.net
exclusiveoffer.bet
888yuntu.com
maraitime.com
caletaexperience.com
dreamlikeliving.com
wolvesmito.club
zbyunjin.com
senkrononline.com
thesugarbasket.com
organiccbgoil.com
amazoncor.xyz
dofus-tr.com
bhzconstrutora.com
onlinepaintandsips.com
sandybottomsflipflops.com
paobuyingxiong.com
wokeinteractive.com
furbabiesandflowers.com
hellojesse.com
ssssummit.com
vaiu-ks.com
akb48-loveantena.com
wagsorganics.com
import-union.com
sxrqsgs.icu
72loca.com
ssc018.com
jewelta.com
buildingdigitalmind.com
pantechinsulation.com
cobakoreksinjinx.com
mischurretes.com
contorig2.com
julesecurity.com
soccer-yokouchi.club
gofourd.com
holdimob.com
omorashi-mania.com
ytksw.com
gsf-fashon.com
bogolacke.com
odislewis.com
shenzhenmaojinchang.com
kimsfist.com
xsites-dev.xyz
buraktradingltd.com
muldentaxi.com
supergurlmarketing.com
areametalurgia.com
dejikatsu.com
pcbet999.com
hysjs168.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/3536-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/3536-17-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/2204-22-0x00000000006A0000-0x00000000006C8000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4044 set thread context of 3536 4044 3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f.exe 98 PID 3536 set thread context of 3516 3536 RegSvcs.exe 56 PID 2204 set thread context of 3516 2204 msdt.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 4044 3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f.exe 3536 RegSvcs.exe 3536 RegSvcs.exe 3536 RegSvcs.exe 3536 RegSvcs.exe 2204 msdt.exe 2204 msdt.exe 2204 msdt.exe 2204 msdt.exe 2204 msdt.exe 2204 msdt.exe 2204 msdt.exe 2204 msdt.exe 2204 msdt.exe 2204 msdt.exe 2204 msdt.exe 2204 msdt.exe 2204 msdt.exe 2204 msdt.exe 2204 msdt.exe 2204 msdt.exe 2204 msdt.exe 2204 msdt.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3536 RegSvcs.exe 3536 RegSvcs.exe 3536 RegSvcs.exe 2204 msdt.exe 2204 msdt.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4044 3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f.exe Token: SeDebugPrivilege 3536 RegSvcs.exe Token: SeDebugPrivilege 2204 msdt.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4044 wrote to memory of 3536 4044 3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f.exe 98 PID 4044 wrote to memory of 3536 4044 3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f.exe 98 PID 4044 wrote to memory of 3536 4044 3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f.exe 98 PID 4044 wrote to memory of 3536 4044 3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f.exe 98 PID 4044 wrote to memory of 3536 4044 3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f.exe 98 PID 4044 wrote to memory of 3536 4044 3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f.exe 98 PID 3516 wrote to memory of 2204 3516 Explorer.EXE 99 PID 3516 wrote to memory of 2204 3516 Explorer.EXE 99 PID 3516 wrote to memory of 2204 3516 Explorer.EXE 99 PID 2204 wrote to memory of 4344 2204 msdt.exe 100 PID 2204 wrote to memory of 4344 2204 msdt.exe 100 PID 2204 wrote to memory of 4344 2204 msdt.exe 100
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f.exe"C:\Users\Admin\AppData\Local\Temp\3d376406d5d05f3f353447e17a2f5adab37ea85d72a3a7cefb33549c2a17c19f.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3536
-
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4344
-
-