Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:13
Static task
static1
Behavioral task
behavioral1
Sample
f17173c42ee2394c24b3ea486e912fedc81659d5c8faa2a1360461a71ffda47a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f17173c42ee2394c24b3ea486e912fedc81659d5c8faa2a1360461a71ffda47a.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
f17173c42ee2394c24b3ea486e912fedc81659d5c8faa2a1360461a71ffda47a.exe
-
Size
374KB
-
MD5
0b18aa7f23e897c6d6557f3e8b7e676a
-
SHA1
7ceefcc2c6ccab4cf4108ebee0847b45357b72a8
-
SHA256
f17173c42ee2394c24b3ea486e912fedc81659d5c8faa2a1360461a71ffda47a
-
SHA512
0ed269ebac3b9623254ea3800b08c8666426386582caa6a3160b84dd53a923e474e9baee0f6347498549c7382ad67f29f170a1c9d0d3735e5e152a2d58379bbb
-
SSDEEP
6144:TBlL/Pa4ogLeqRqkZ/UrBZbBbBTWyGwH7BeZgcTQogYeC:F9JTVRWzNVBXH77cTog
Malware Config
Extracted
xloader
2.3
uoe8
chalance.design
certifiedlaywernj.com
bsbgraphic.com
caeka.com
zagorafinancial.com
cvingenieriacivil.net
mojilifenoosa.com
bucktheherd.net
sparkmonic.com
catherineandwilson.com
cdefenders.com
intersp.net
santoriniimpressivetours.net
arkansaspaymentrelief.com
tewab.com
bjzjgjg.com
michgoliki.com
oallahplease.com
plaisterpress.com
redyroblx.com
funnyfootballmugs.com
borderlesstrade.info
partequity.net
3992199.com
bestcoloncleanseblog.com
online-legalservices.com
fibermover.com
magen-tracks.xyz
hotelsinshirdimkm.com
beachjunction.com
lanren.plus
nouvellecartebancaire.com
thegiftsofdepression.com
metabol.parts
dvxdkrbll.icu
flsprayer.com
przyczepy.net
cantinhosdeaparecida.com
californiasecuritycamera.com
nevadasmallbusinessattorney.com
skipperdaily.com
missjeschickt.com
rocketmortgageshady.net
upholsteredwineracks.com
best20singles.com
fsquanyi.com
ronlinebiz.com
gaelmobilecarwash.com
commercials.pro
bl927.com
workforceuae.com
innercritictypes.com
unipacksexpress.com
chaitanya99.com
rangamaty.com
7chd.com
keydefi.com
liveporn.wiki
carajedellcasting.com
gooddoggymedia.com
boldercoolware.com
hispekdiamond.com
expnashvilletn.com
swashbug.com
montcoimmigrationlawyer.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2500-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Loads dropped DLL 2 IoCs
pid Process 2060 f17173c42ee2394c24b3ea486e912fedc81659d5c8faa2a1360461a71ffda47a.exe 2060 f17173c42ee2394c24b3ea486e912fedc81659d5c8faa2a1360461a71ffda47a.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2060 set thread context of 2500 2060 f17173c42ee2394c24b3ea486e912fedc81659d5c8faa2a1360461a71ffda47a.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f17173c42ee2394c24b3ea486e912fedc81659d5c8faa2a1360461a71ffda47a.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2500 f17173c42ee2394c24b3ea486e912fedc81659d5c8faa2a1360461a71ffda47a.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2060 f17173c42ee2394c24b3ea486e912fedc81659d5c8faa2a1360461a71ffda47a.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 2060 wrote to memory of 2500 2060 f17173c42ee2394c24b3ea486e912fedc81659d5c8faa2a1360461a71ffda47a.exe 30 PID 2060 wrote to memory of 2500 2060 f17173c42ee2394c24b3ea486e912fedc81659d5c8faa2a1360461a71ffda47a.exe 30 PID 2060 wrote to memory of 2500 2060 f17173c42ee2394c24b3ea486e912fedc81659d5c8faa2a1360461a71ffda47a.exe 30 PID 2060 wrote to memory of 2500 2060 f17173c42ee2394c24b3ea486e912fedc81659d5c8faa2a1360461a71ffda47a.exe 30 PID 2060 wrote to memory of 2500 2060 f17173c42ee2394c24b3ea486e912fedc81659d5c8faa2a1360461a71ffda47a.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f17173c42ee2394c24b3ea486e912fedc81659d5c8faa2a1360461a71ffda47a.exe"C:\Users\Admin\AppData\Local\Temp\f17173c42ee2394c24b3ea486e912fedc81659d5c8faa2a1360461a71ffda47a.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\f17173c42ee2394c24b3ea486e912fedc81659d5c8faa2a1360461a71ffda47a.exe"C:\Users\Admin\AppData\Local\Temp\f17173c42ee2394c24b3ea486e912fedc81659d5c8faa2a1360461a71ffda47a.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2500
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD556a321bd011112ec5d8a32b2f6fd3231
SHA1df20e3a35a1636de64df5290ae5e4e7572447f78
SHA256bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1
SHA5125354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3