Analysis
-
max time kernel
146s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:13
Static task
static1
Behavioral task
behavioral1
Sample
79e8144ee4e2e97695849928e162288fc282de48ff4caea48314f9cb56477917.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
79e8144ee4e2e97695849928e162288fc282de48ff4caea48314f9cb56477917.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
yjpsyjwo.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
yjpsyjwo.exe
Resource
win10v2004-20241007-en
General
-
Target
79e8144ee4e2e97695849928e162288fc282de48ff4caea48314f9cb56477917.exe
-
Size
313KB
-
MD5
da75710d466d2544bc8f4442b1ce57eb
-
SHA1
8356ff061e4864bfe114fb9e65bed20c267c78e3
-
SHA256
79e8144ee4e2e97695849928e162288fc282de48ff4caea48314f9cb56477917
-
SHA512
6d5c8f28f60bd494cade7bf4324c3309ac29a421202dae3494b8118ade429560e4062a2c83bacbfea46c63fe173bc04ffc299b8dcd2f611d67c45e7cf2c22695
-
SSDEEP
6144:TxD3m22lVTV6BSLia0bfMUB8uEqLjLQ7LYAbesH/pAK+eRBYBD:Vm246BSLTkfN8ubLj4Uy/pAKaD
Malware Config
Extracted
xloader
2.5
ciaz
jobgeist.com
pxwss.com
nathanaeljeffrey.xyz
rhoypl.biz
avachaturbate.com
xvideopornfilm.com
heser.net
olphschoolcrabfeed.com
ballygallycastle.com
attunetouchandglow.com
wwwswanciitaphotography.com
inspinevision.com
ebabadofood.com
glenngreerforlyman.com
stickojfni.online
cursophpbr.xyz
thefindommistress.com
8c9myn92dzep.biz
alexamedia.art
rarerp.com
volostmarat.quest
dobbeltclic.com
blablacrafts.com
jaxlvye.com
arab-xt-pro.com
pow4u.com
healthynutritionfriend.com
hrzjx.com
greenbrierlaw.com
bbrmsy.com
sebasfernandezart.com
ban-click.com
ieventsdm.com
tonglingeyes.com
pachi777slot.com
gsjbd31.club
kirbychristian.com
ytffdweb.club
circutor-ele.com
emlsistemas.info
y963588.xyz
yomave.com
hotelgirijasunrise.com
strawshack.com
mslabrepro4all.com
scentrahome.com
luckysamsoncrafts.com
wsxkd.com
consumerdirections.net
westcoastify.com
rnhealthwriting.com
credsilo.com
yewear.pro
heartlanddentalcr.com
dimm.city
thestar-daily.com
vizitholland.com
septemberstockevent100.com
dynamoproperties.com
artemisbet294.com
qraftacademy.com
lawsatlanta.com
gidee.net
maxicashprogfd.xyz
ecoguardianasia.online
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/1720-14-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1720-16-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2020-23-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Executes dropped EXE 2 IoCs
pid Process 2708 yjpsyjwo.exe 1720 yjpsyjwo.exe -
Loads dropped DLL 2 IoCs
pid Process 3048 79e8144ee4e2e97695849928e162288fc282de48ff4caea48314f9cb56477917.exe 2708 yjpsyjwo.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2708 set thread context of 1720 2708 yjpsyjwo.exe 31 PID 1720 set thread context of 1208 1720 yjpsyjwo.exe 21 PID 2020 set thread context of 1208 2020 msdt.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 79e8144ee4e2e97695849928e162288fc282de48ff4caea48314f9cb56477917.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yjpsyjwo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdt.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1720 yjpsyjwo.exe 1720 yjpsyjwo.exe 2020 msdt.exe 2020 msdt.exe 2020 msdt.exe 2020 msdt.exe 2020 msdt.exe 2020 msdt.exe 2020 msdt.exe 2020 msdt.exe 2020 msdt.exe 2020 msdt.exe 2020 msdt.exe 2020 msdt.exe 2020 msdt.exe 2020 msdt.exe 2020 msdt.exe 2020 msdt.exe 2020 msdt.exe 2020 msdt.exe 2020 msdt.exe 2020 msdt.exe 2020 msdt.exe 2020 msdt.exe 2020 msdt.exe 2020 msdt.exe 2020 msdt.exe 2020 msdt.exe 2020 msdt.exe 2020 msdt.exe 2020 msdt.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1720 yjpsyjwo.exe 1720 yjpsyjwo.exe 1720 yjpsyjwo.exe 2020 msdt.exe 2020 msdt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1720 yjpsyjwo.exe Token: SeDebugPrivilege 2020 msdt.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2708 3048 79e8144ee4e2e97695849928e162288fc282de48ff4caea48314f9cb56477917.exe 30 PID 3048 wrote to memory of 2708 3048 79e8144ee4e2e97695849928e162288fc282de48ff4caea48314f9cb56477917.exe 30 PID 3048 wrote to memory of 2708 3048 79e8144ee4e2e97695849928e162288fc282de48ff4caea48314f9cb56477917.exe 30 PID 3048 wrote to memory of 2708 3048 79e8144ee4e2e97695849928e162288fc282de48ff4caea48314f9cb56477917.exe 30 PID 2708 wrote to memory of 1720 2708 yjpsyjwo.exe 31 PID 2708 wrote to memory of 1720 2708 yjpsyjwo.exe 31 PID 2708 wrote to memory of 1720 2708 yjpsyjwo.exe 31 PID 2708 wrote to memory of 1720 2708 yjpsyjwo.exe 31 PID 2708 wrote to memory of 1720 2708 yjpsyjwo.exe 31 PID 2708 wrote to memory of 1720 2708 yjpsyjwo.exe 31 PID 2708 wrote to memory of 1720 2708 yjpsyjwo.exe 31 PID 1208 wrote to memory of 2020 1208 Explorer.EXE 32 PID 1208 wrote to memory of 2020 1208 Explorer.EXE 32 PID 1208 wrote to memory of 2020 1208 Explorer.EXE 32 PID 1208 wrote to memory of 2020 1208 Explorer.EXE 32 PID 2020 wrote to memory of 1952 2020 msdt.exe 33 PID 2020 wrote to memory of 1952 2020 msdt.exe 33 PID 2020 wrote to memory of 1952 2020 msdt.exe 33 PID 2020 wrote to memory of 1952 2020 msdt.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\79e8144ee4e2e97695849928e162288fc282de48ff4caea48314f9cb56477917.exe"C:\Users\Admin\AppData\Local\Temp\79e8144ee4e2e97695849928e162288fc282de48ff4caea48314f9cb56477917.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\yjpsyjwo.exeC:\Users\Admin\AppData\Local\Temp\yjpsyjwo.exe C:\Users\Admin\AppData\Local\Temp\vhdpeghnoh3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\yjpsyjwo.exeC:\Users\Admin\AppData\Local\Temp\yjpsyjwo.exe C:\Users\Admin\AppData\Local\Temp\vhdpeghnoh4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\yjpsyjwo.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1952
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD50166caeddc243f04eacfbf1f056a30d9
SHA168e0ee392397414c1162ddea3b195ab0204006ae
SHA25643bcdc82047a603ae2e2d2635c1d3dcfa22a5e08808b3a5c2dbef4e648af75ff
SHA512b03886ebefa1fa2f5be8739cca14fb5e62a40e5d07c0d254e664f77cee8e135f9c6160aa619a85346fb426154cab4acefe63dad9299c828f3c5f1225015b7c02
-
Filesize
210KB
MD5120e3f53c350aa1ea669ee65d35507cf
SHA1d935f721cb06ab56b6d8a8a24f1bdbbd9c78a1a0
SHA2564225889013fa833a51d12ce224d672444e281daa6d295fb83b5fc189db657418
SHA5120d9f08105562005031f7533d8034b09565ae866318c7bd1ef9df5844e1da5147bc4c6904223268af918120ead6c6517750fd6fa5ef76f8723e86c050fb29f10c
-
Filesize
168KB
MD5c55e114aae523179f507d32858962fe4
SHA13a35f75de10123d4b438d7be88c6bae7087a9a74
SHA256445868ae39772e2a65c0e927d6a98d240d93c8515d57837b95c17304ea0dd693
SHA5123900a645770ed43ab18de621f85f83588efe9fafee732277ee26e361dc417560a0aacea392d7975634e16f250734dea1f15c8aa26fb8b80c31bec1833da9044c