Analysis
-
max time kernel
94s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:31
Static task
static1
Behavioral task
behavioral1
Sample
745e543add6b5fa73b5074242ecac831c5386bf760acdd8fe5e5146be9da7192.exe
Resource
win7-20240903-en
General
-
Target
745e543add6b5fa73b5074242ecac831c5386bf760acdd8fe5e5146be9da7192.exe
-
Size
947KB
-
MD5
75c9e3e19f92b217e1212be899791335
-
SHA1
33cd45f09df2e1ceb03348bda65d8c49ed371655
-
SHA256
745e543add6b5fa73b5074242ecac831c5386bf760acdd8fe5e5146be9da7192
-
SHA512
31f467ef0bd78c07b3b40bb61403b551ed0a5deb606fb2cfebe7af962af7a44d93f07b6d20b88715a66bf41ed5876824ce4b1c2a62a1cc7619e6c4875a32bd81
-
SSDEEP
24576:NJTHwOJzBZ/+9cf5Awt/ll0fKCtZulP0pHN:XfJzHzxRDTEyQH
Malware Config
Extracted
xloader
2.5
rmpc
lrsdh.com
sugarcurd.com
genussqmzg.online
warkulat.net
topstitched.com
sman1kotatambaloka.xyz
hireprowriter.com
robroyrecords.com
merlinreport.com
topofluna.com
planident.com
hokashoesingapore.com
buckitload.com
xn--0k1a.com
mynba2k22.com
thiccblanket.com
zayedhealth.clinic
alfer-srl.com
sunnysikka.com
sdtcbh.com
izzat.green
princealwaleed.com
cesiesis.com
alternativedata.company
chriscrown.xyz
fsyetuo.com
gmat-easy.online
daadoosh.com
sectorfarmaceutico.com
loueofficial.com
daddybearbodywork.com
dtmrealtyspi.com
contact-europe.com
meltingpotspot.com
baojiangou.com
escuelaacupunturaimai.com
bboldit.com
drawerfuid.com
sdysjskj.com
nbslktwx.com
nashvilleholdings.com
bajrangiexch9.com
cryptowhaledone.com
kai6agfw.com
silhouette-consult.com
vegane-adventskalender.info
6dianliu.com
virboss.online
mocmynghe.com
lilbimbi.com
dpsxsec.com
odnamyslowa.xyz
meetmedubai.com
rafke.online
unusual696.club
chathamwaste.com
yjaxx.com
eurostyl.net
krnlfree.com
urbandevelopers.net
k9surg.com
eazlabor.net
ttt-asia.com
12y0-blog.com
lktdjvbwepiw.mobi
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/1452-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3484 set thread context of 1452 3484 745e543add6b5fa73b5074242ecac831c5386bf760acdd8fe5e5146be9da7192.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 745e543add6b5fa73b5074242ecac831c5386bf760acdd8fe5e5146be9da7192.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1452 745e543add6b5fa73b5074242ecac831c5386bf760acdd8fe5e5146be9da7192.exe 1452 745e543add6b5fa73b5074242ecac831c5386bf760acdd8fe5e5146be9da7192.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3484 wrote to memory of 1452 3484 745e543add6b5fa73b5074242ecac831c5386bf760acdd8fe5e5146be9da7192.exe 99 PID 3484 wrote to memory of 1452 3484 745e543add6b5fa73b5074242ecac831c5386bf760acdd8fe5e5146be9da7192.exe 99 PID 3484 wrote to memory of 1452 3484 745e543add6b5fa73b5074242ecac831c5386bf760acdd8fe5e5146be9da7192.exe 99 PID 3484 wrote to memory of 1452 3484 745e543add6b5fa73b5074242ecac831c5386bf760acdd8fe5e5146be9da7192.exe 99 PID 3484 wrote to memory of 1452 3484 745e543add6b5fa73b5074242ecac831c5386bf760acdd8fe5e5146be9da7192.exe 99 PID 3484 wrote to memory of 1452 3484 745e543add6b5fa73b5074242ecac831c5386bf760acdd8fe5e5146be9da7192.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\745e543add6b5fa73b5074242ecac831c5386bf760acdd8fe5e5146be9da7192.exe"C:\Users\Admin\AppData\Local\Temp\745e543add6b5fa73b5074242ecac831c5386bf760acdd8fe5e5146be9da7192.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\745e543add6b5fa73b5074242ecac831c5386bf760acdd8fe5e5146be9da7192.exe"C:\Users\Admin\AppData\Local\Temp\745e543add6b5fa73b5074242ecac831c5386bf760acdd8fe5e5146be9da7192.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1452
-