Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:12
Static task
static1
Behavioral task
behavioral1
Sample
BCS_ECS9522019111121380024_1206_952.exe
Resource
win7-20240903-en
General
-
Target
BCS_ECS9522019111121380024_1206_952.exe
-
Size
1.2MB
-
MD5
54e12bb22e93723f1207f9b0c68ce740
-
SHA1
c4c2bd10d4e5a21997e1b5a2eec5beccd63759ea
-
SHA256
47e832373110163a11b922941cb9a2377c7e44ed290a528073152b0fb1ffef93
-
SHA512
d1741eecc9bb3177ce4b115ded4379af5d4898a9088882f130f3a52ecfca5cdefd488316e8076f42c56d5e0c12119b38de28236429b67daaf9262b64af1a5bf3
-
SSDEEP
12288:tP6lfqSXnoJQSfo9PwSNGAQI7/OGBbuqPFxeElvzLVMAcfNQBLSi:Rvaj9oSN77/OGMyHlbxxcfNxi
Malware Config
Extracted
xloader
2.3
a7dr
thevirginiahighlanders.com
crazybenzi.com
nottruthful.com
happi.info
amjadlighting.com
mlebentv.com
pogrebnolipa.com
907wine.com
programheart.com
jenniferlarmstrong.com
alexjcarpenter.com
rokyslegendou.com
confidenceismine.com
thegeek420.com
hover-lover.com
conversationallawinstitute.com
ssonya.com
woopyyl.com
ebotasymas.com
nysobvakoiijqjs.com
apt-school.com
towerplaceapartments.com
lafinchfabric.com
solterosdeviaje.net
thenextcatastrophe.com
kleanrituals.net
boyamobilya.com
unstoppablegoodness.com
szwj91.com
daeverse.com
contorig2.com
tradingandcargo.com
freedomseattle.net
vegefitness.net
bastiontools.tools
enbienes.com
nestedmedia.com
beforeandafter-alwayshair.com
impianramai.com
labour.lgbt
simplifytaos.com
exaskate.com
arolist.com
joaomkt.com
byedon2020gear.com
saibailong.com
xn--elektrikpazar-gbc.com
annaiasacademy.com
jimmygmask.com
fearlesssport.store
toiyzy.com
stringsandthingsnwa.com
heaheakoya.com
peakvitamind3.com
kennethjtackett.com
mysticjp.com
momohuishou.com
theclubmarbella.com
doreljuvenilecares.com
begeorgia.com
pinnacleviewapartment.com
soberrituals.com
recometals.com
saywahhtech.com
maleev.design
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/1556-13-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2244 set thread context of 1556 2244 BCS_ECS9522019111121380024_1206_952.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BCS_ECS9522019111121380024_1206_952.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1556 BCS_ECS9522019111121380024_1206_952.exe 1556 BCS_ECS9522019111121380024_1206_952.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2244 wrote to memory of 1556 2244 BCS_ECS9522019111121380024_1206_952.exe 99 PID 2244 wrote to memory of 1556 2244 BCS_ECS9522019111121380024_1206_952.exe 99 PID 2244 wrote to memory of 1556 2244 BCS_ECS9522019111121380024_1206_952.exe 99 PID 2244 wrote to memory of 1556 2244 BCS_ECS9522019111121380024_1206_952.exe 99 PID 2244 wrote to memory of 1556 2244 BCS_ECS9522019111121380024_1206_952.exe 99 PID 2244 wrote to memory of 1556 2244 BCS_ECS9522019111121380024_1206_952.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\BCS_ECS9522019111121380024_1206_952.exe"C:\Users\Admin\AppData\Local\Temp\BCS_ECS9522019111121380024_1206_952.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\BCS_ECS9522019111121380024_1206_952.exe"C:\Users\Admin\AppData\Local\Temp\BCS_ECS9522019111121380024_1206_952.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1556
-